{"id":"https://openalex.org/W4391878007","doi":"https://doi.org/10.1109/comsnets59351.2024.10427143","title":"A Robust Feature Integration for Multiclass Metamorphic Malware Detection in IoT Network","display_name":"A Robust Feature Integration for Multiclass Metamorphic Malware Detection in IoT Network","publication_year":2024,"publication_date":"2024-01-03","ids":{"openalex":"https://openalex.org/W4391878007","doi":"https://doi.org/10.1109/comsnets59351.2024.10427143"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets59351.2024.10427143","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/comsnets59351.2024.10427143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/A_Robust_Feature_Integration_for_Multiclass_Metamorphic_Malware_Detection_in_IoT_Network/25413781","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092539854","display_name":"Tisha Chawla","orcid":"https://orcid.org/0009-0003-9722-5221"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]},{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["AU","IN"],"is_corresponding":true,"raw_author_name":"Tisha Chawla","raw_affiliation_strings":["School of Computer Science, Vellore Institute of Technology,India","School of Computer Science, Vellore Institute of Technology, India","School of Information Technology, Deakin University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Vellore Institute of Technology,India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Computer Science, Vellore Institute of Technology, India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100739164","display_name":"Saifur Rahman","orcid":"https://orcid.org/0000-0001-8345-0952"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Saifur Rahman","raw_affiliation_strings":["School of Information Technology, Deakin University,Melbourne,Australia","School of Information Technology, Deakin University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University,Melbourne,Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043613674","display_name":"Shantanu Pal","orcid":"https://orcid.org/0000-0002-8784-0154"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shantanu Pal","raw_affiliation_strings":["School of Information Technology, Deakin University,Melbourne,Australia","School of Information Technology, Deakin University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University,Melbourne,Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001203013","display_name":"Chandan Karmakar","orcid":"https://orcid.org/0000-0003-1814-0856"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chandan Karmakar","raw_affiliation_strings":["School of Information Technology, Deakin University,Melbourne,Australia","School of Information Technology, Deakin University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University,Melbourne,Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092539854"],"corresponding_institution_ids":["https://openalex.org/I149704539","https://openalex.org/I876193797"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01473394,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"412","last_page":"414"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.974399983882904,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7592189311981201},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7266408205032349},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5677016377449036},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5624295473098755},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.465782105922699},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.45062994956970215},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4223240613937378},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3726752996444702},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3524455428123474},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3258066475391388},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28317761421203613}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7592189311981201},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7266408205032349},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5677016377449036},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5624295473098755},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.465782105922699},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.45062994956970215},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4223240613937378},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3726752996444702},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3524455428123474},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3258066475391388},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28317761421203613},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/comsnets59351.2024.10427143","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/comsnets59351.2024.10427143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},{"id":"pmh:oai:figshare.com:article/25413781","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/A_Robust_Feature_Integration_for_Multiclass_Metamorphic_Malware_Detection_in_IoT_Network/25413781","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/25413781","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/A_Robust_Feature_Integration_for_Multiclass_Metamorphic_Malware_Detection_in_IoT_Network/25413781","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W3045322569","https://openalex.org/W3137539372","https://openalex.org/W3171309826","https://openalex.org/W4213458836","https://openalex.org/W4224264605","https://openalex.org/W4238182573","https://openalex.org/W4313216189","https://openalex.org/W4383468964","https://openalex.org/W4385076171","https://openalex.org/W4386921185","https://openalex.org/W6854365898"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W2249809453","https://openalex.org/W4316881845"],"abstract_inverted_index":{"With":[0],"the":[1,4,14,42,61,84],"increase":[2],"in":[3,57],"use":[5],"of":[6,8,17,44,63,106,113],"Internet":[7],"Things":[9],"(IoT)":[10],"services":[11],"and":[12,86,103,108],"applications,":[13],"escalating":[15],"prevalence":[16],"metamorphic":[18,54],"malware":[19,38,55],"poses":[20],"a":[21,109],"significant":[22],"challenge.":[23],"Characterized":[24],"by":[25,66],"their":[26,31],"ability":[27],"to":[28,33],"dynamically":[29],"modify":[30],"code":[32],"evade":[34],"detection,":[35],"these":[36],"advanced":[37],"variants":[39],"significantly":[40],"compromise":[41],"security":[43],"IoT":[45,58],"networks.":[46],"This":[47],"paper":[48],"presents":[49],"an":[50],"approach":[51],"for":[52,72,80,90],"multiclass":[53],"detection":[56],"networks,":[59],"emphasizing":[60],"integration":[62],"diverse":[64],"features":[65],"employing":[67],"Convolutional":[68],"Neural":[69],"Networks":[70],"(CNN)":[71],"intricate":[73],"feature":[74],"extraction,":[75],"Principal":[76],"Component":[77],"Analysis":[78],"(PCA)":[79],"eliminating":[81],"multicollinearity":[82],"between":[83],"features,":[85],"Random":[87],"Forest":[88],"(RF)":[89],"robust":[91],"classification.":[92],"Our":[93],"proposed":[94],"model":[95],"demonstrates":[96],"exceptional":[97],"performance":[98],"with":[99],"macro-accuracy,":[100],"macroprecision,":[101],"macro-recall,":[102],"macro-F1":[104],"score":[105,112],"97.44%,":[107],"distinctive":[110],"ROC-AUC":[111],"99.87%.":[114]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
