{"id":"https://openalex.org/W7150998871","doi":"https://doi.org/10.1016/j.is.2026.102722","title":"CIC-YNU-IoTMal: A comprehensive multilayer dataset for static and dynamic analysis of IoT malware behavior","display_name":"CIC-YNU-IoTMal: A comprehensive multilayer dataset for static and dynamic analysis of IoT malware behavior","publication_year":2026,"publication_date":"2026-04-06","ids":{"openalex":"https://openalex.org/W7150998871","doi":"https://doi.org/10.1016/j.is.2026.102722"},"language":"en","primary_location":{"id":"doi:10.1016/j.is.2026.102722","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.is.2026.102722","pdf_url":null,"source":{"id":"https://openalex.org/S193006928","display_name":"Information Systems","issn_l":"0306-4379","issn":["0306-4379","1873-6076"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.is.2026.102722","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052766937","display_name":"Sajjad Dadkhah","orcid":"https://orcid.org/0000-0002-5582-0255"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sajjad Dadkhah","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0002-5582-0255","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058982389","display_name":"Ogobuchi Daniel Okey","orcid":"https://orcid.org/0000-0003-0686-2763"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ogobuchi Daniel Okey","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0003-0686-2763","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018155860","display_name":"Sebin Abraham Maret","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sebin Abraham Maret","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0009-0003-7766-4315","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014276019","display_name":"Yen-Wu Lo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yen-Wu Lo","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0009-0001-4869-1811","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108836522","display_name":"Amir Firouzi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amir Firouzi","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0009-0003-4234-9796","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128780750","display_name":"Ryu Kuki","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ryu Kuki","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0009-0005-8916-0661","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133049209","display_name":"Takayuki Sasaki","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Takayuki Sasaki","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0001-6771-9915","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028367744","display_name":"Katsunari Yoshioka","orcid":"https://orcid.org/0000-0003-0964-8631"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Katsunari Yoshioka","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0003-0964-8631","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133028509","display_name":"Tao Ban","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tao Ban","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0002-9616-3212","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048669520","display_name":"Seiichi Ozawa","orcid":"https://orcid.org/0000-0002-0965-0064"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Seiichi Ozawa","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0002-0965-0064","affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5133007907","display_name":"Ali A. Ghorbani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ali A. Ghorbani","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0001-9189-6268","affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":11,"corresponding_author_ids":["https://openalex.org/A5052766937"],"corresponding_institution_ids":[],"apc_list":{"value":2970,"currency":"USD","value_usd":2970},"apc_paid":{"value":2970,"currency":"USD","value_usd":2970},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66350093,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"140","issue":null,"first_page":"102722","last_page":"102722"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8899000287055969,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8899000287055969,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.06289999932050705,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.005100000184029341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7050999999046326},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6862000226974487},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.42410001158714294},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.28209999203681946}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.852400004863739},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7050999999046326},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6862000226974487},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.42410001158714294},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35519999265670776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33959999680519104},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31119999289512634},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2989000082015991},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2599000036716461}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.is.2026.102722","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.is.2026.102722","pdf_url":null,"source":{"id":"https://openalex.org/S193006928","display_name":"Information Systems","issn_l":"0306-4379","issn":["0306-4379","1873-6076"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.is.2026.102722","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.is.2026.102722","pdf_url":null,"source":{"id":"https://openalex.org/S193006928","display_name":"Information Systems","issn_l":"0306-4379","issn":["0306-4379","1873-6076"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2059700429","https://openalex.org/W2077488147","https://openalex.org/W2104927807","https://openalex.org/W2111619626","https://openalex.org/W2353267094","https://openalex.org/W2733765803","https://openalex.org/W2792450155","https://openalex.org/W3006325478","https://openalex.org/W3024340288","https://openalex.org/W3027431742","https://openalex.org/W3095718454","https://openalex.org/W3134731862","https://openalex.org/W3186605584","https://openalex.org/W3195892385","https://openalex.org/W4220885173","https://openalex.org/W4285083769","https://openalex.org/W4295928027","https://openalex.org/W4298110865","https://openalex.org/W4310386984","https://openalex.org/W4382281941","https://openalex.org/W4386701302","https://openalex.org/W4396524767","https://openalex.org/W4402035331","https://openalex.org/W4408068764"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-04-07T00:00:00"}
