{"id":"https://openalex.org/W7124905917","doi":"https://doi.org/10.1016/j.array.2026.100681","title":"An automated multi-scale and multi-contextual MobileNetv3 for malware detection based on IoT","display_name":"An automated multi-scale and multi-contextual MobileNetv3 for malware detection based on IoT","publication_year":2026,"publication_date":"2026-01-20","ids":{"openalex":"https://openalex.org/W7124905917","doi":"https://doi.org/10.1016/j.array.2026.100681"},"language":"en","primary_location":{"id":"doi:10.1016/j.array.2026.100681","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2026.100681","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.array.2026.100681","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123399235","display_name":"Sidra Javed","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sidra Javed","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123444320","display_name":"Guowei Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guowei Wu","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0003-3916-7097","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102676689","display_name":"Hamza Javed","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hamza Javed","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057174588","display_name":"Osama A. Khashan","orcid":"https://orcid.org/0000-0003-1965-1869"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Osama A. Khashan","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123429153","display_name":"Haseeb Hassan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Haseeb Hassan","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5123399826","display_name":"Anwar Ghani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anwar Ghani","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0001-7474-0405","affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5123399235"],"corresponding_institution_ids":[],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12316176,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":null,"first_page":"100681","last_page":"100681"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9584000110626221,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9584000110626221,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.010900000110268593,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.0017000000225380063,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7721999883651733},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.7261000275611877},{"id":"https://openalex.org/keywords/pyramid","display_name":"Pyramid (geometry)","score":0.6105999946594238},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5116999745368958},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.46799999475479126},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4526999890804291},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.4291999936103821},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.41510000824928284}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8133000135421753},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7721999883651733},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.7261000275611877},{"id":"https://openalex.org/C142575187","wikidata":"https://www.wikidata.org/wiki/Q3358290","display_name":"Pyramid (geometry)","level":2,"score":0.6105999946594238},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5845000147819519},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5116999745368958},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.48730000853538513},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4799000024795532},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.46799999475479126},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4526999890804291},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.4291999936103821},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.41510000824928284},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3901999890804291},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3752000033855438},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.33009999990463257},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3237000107765198},{"id":"https://openalex.org/C4641261","wikidata":"https://www.wikidata.org/wiki/Q11681085","display_name":"Face detection","level":4,"score":0.30709999799728394},{"id":"https://openalex.org/C66024118","wikidata":"https://www.wikidata.org/wiki/Q1122506","display_name":"Computational model","level":2,"score":0.29679998755455017},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.25200000405311584},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.array.2026.100681","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2026.100681","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:768fb2bc69a14cf99aa19fa4906bf505","is_oa":true,"landing_page_url":"https://doaj.org/article/768fb2bc69a14cf99aa19fa4906bf505","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Array, Vol 29, Iss , Pp 100681- (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1016/j.array.2026.100681","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2026.100681","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320327695","display_name":"Nazarbayev University","ror":"https://ror.org/052bx8q98"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2412782625","https://openalex.org/W2752782242","https://openalex.org/W2931858311","https://openalex.org/W2967107104","https://openalex.org/W2982083293","https://openalex.org/W3018661398","https://openalex.org/W3186874092","https://openalex.org/W3215108294","https://openalex.org/W4289868772","https://openalex.org/W4292065896","https://openalex.org/W4303043628","https://openalex.org/W4306154842","https://openalex.org/W4311376338","https://openalex.org/W4318818900","https://openalex.org/W4378554181","https://openalex.org/W4383899490","https://openalex.org/W4384666235","https://openalex.org/W4388565648","https://openalex.org/W4392114371","https://openalex.org/W4399019769","https://openalex.org/W4405310461","https://openalex.org/W4405510957","https://openalex.org/W4410641082"],"related_works":[],"abstract_inverted_index":{"Malware":[0],"detection":[1,24,32,62,228],"is":[2,78,94,128,141],"a":[3],"crucial":[4],"aspect":[5],"of":[6,30,71,100],"cybersecurity,":[7],"aimed":[8],"at":[9],"identifying":[10],"and":[11,20,34,44,58,63,73,108,120,133,148,168,191,211,230],"mitigating":[12],"malicious":[13],"software":[14],"that":[15],"poses":[16],"threats":[17],"to":[18,46,67,80,130],"systems":[19],"networks.":[21],"Traditional":[22],"malware":[23,61],"methods":[25,225],"face":[26],"challenges":[27,70],"in":[28,48,226],"terms":[29],"both":[31,195,227],"accuracy":[33,72],"computational":[35,74,137,231],"cost,":[36],"as":[37],"deep":[38],"learning":[39],"models":[40],"can":[41],"be":[42],"resource-intensive":[43],"difficult":[45],"deploy":[47],"real-time":[49],"environments.":[50],"This":[51],"paper":[52],"introduces":[53],"the":[54,69,84,90,98,114,131,144,172,176,179,199,218],"novel":[55],"MSMC-MobileNet":[56,153,200],"(Multi-Scale":[57],"Multi-Contextual":[59],"MobileNet)":[60],"classification":[64],"model,":[65],"designed":[66],"address":[68],"cost.":[75,138,232],"First,":[76],"MobileNetv3":[77],"used":[79],"extract":[81],"features":[82,110],"from":[83],"dataset.":[85,174],"To":[86],"enhance":[87],"feature":[88],"extraction,":[89],"SE":[91],"(Squeeze-and-Excitation)":[92],"module":[93],"integrated,":[95],"focusing":[96],"on":[97,143,171],"region":[99],"interest":[101],"using":[102,113],"an":[103],"attention":[104],"mechanism.":[105],"The":[106,139,151],"multiscale":[107],"multicontextual":[109],"are":[111,197],"extracted":[112],"ASPP":[115,132],"(Atrous":[116],"Spatial":[117],"Pyramid":[118,123],"Pooling)":[119,124],"FPP":[121,134],"(Feature":[122],"modules.":[125],"Channel-wise":[126],"pruning":[127],"applied":[129],"modules,":[135],"reducing":[136],"model":[140,154,180,219],"evaluated":[142],"publicly":[145],"available":[146],"Malimg":[147,173],"MaleVis":[149,177],"datasets.":[150],"proposed":[152],"achieves":[155,201],"impressive":[156],"performance":[157,229],"with":[158],"92.37%":[159],"accuracy,":[160,183,203,217],"96.54%":[161],"precision,":[162,185,205],"95.84%":[163],"recall,":[164,187,207],"95.47%":[165],"F1":[166,189,209],"score,":[167,190,210],"98.59%":[169],"AUC":[170],"On":[175],"dataset,":[178],"yields":[181],"95.08%":[182],"98.33%":[184],"97.9%":[186],"98.15%":[188],"96.98%":[192],"AUC.":[193,213],"When":[194],"datasets":[196],"combined,":[198],"98.79%":[202],"99.84%":[204],"99.73%":[206],"99.89%":[208],"1.00":[212],"Despite":[214],"its":[215],"high":[216],"remains":[220],"computationally":[221],"efficient,":[222],"outperforming":[223],"state-of-the-art":[224]},"counts_by_year":[],"updated_date":"2026-01-22T23:29:09.771500","created_date":"2026-01-21T00:00:00"}
