{"id":"https://openalex.org/W3115135515","doi":"https://doi.org/10.1109/kse50997.2020.9287373","title":"IoT Malware Detection based on Latent Representation","display_name":"IoT Malware Detection based on Latent Representation","publication_year":2020,"publication_date":"2020-11-12","ids":{"openalex":"https://openalex.org/W3115135515","doi":"https://doi.org/10.1109/kse50997.2020.9287373","mag":"3115135515"},"language":"en","primary_location":{"id":"doi:10.1109/kse50997.2020.9287373","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse50997.2020.9287373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 12th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Cuong Nguyen Van","orcid":null},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Cuong Nguyen Van","raw_affiliation_strings":["Le Quy Don Technical University, HaNoi, VietNam"],"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University, HaNoi, VietNam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084370571","display_name":"Anh Viet Phan","orcid":"https://orcid.org/0000-0002-1113-9935"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Viet Anh Phan","raw_affiliation_strings":["Le Quy Don Technical University, HaNoi, VietNam"],"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University, HaNoi, VietNam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082857079","display_name":"Van Loi Cao","orcid":"https://orcid.org/0000-0002-3637-9230"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Van Loi Cao","raw_affiliation_strings":["Le Quy Don Technical University, HaNoi, VietNam"],"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University, HaNoi, VietNam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101639120","display_name":"Khanh Nguyen","orcid":"https://orcid.org/0000-0002-0684-9406"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Khanh Duy Tung Nguyen","raw_affiliation_strings":["Le Quy Don Technical University, HaNoi, VietNam"],"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University, HaNoi, VietNam","institution_ids":["https://openalex.org/I131359167"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I131359167"],"apc_list":null,"apc_paid":null,"fwci":0.4855,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69688838,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"177","last_page":"182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.8454927206039429},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8345299363136292},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6946607828140259},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5766374468803406},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5584041476249695},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5120506882667542},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5027034282684326},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4776824116706848},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47259077429771423},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.417780339717865},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.36652374267578125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14675363898277283}],"concepts":[{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.8454927206039429},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8345299363136292},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6946607828140259},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5766374468803406},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5584041476249695},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5120506882667542},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5027034282684326},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4776824116706848},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47259077429771423},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.417780339717865},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.36652374267578125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14675363898277283},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/kse50997.2020.9287373","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse50997.2020.9287373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 12th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309617","display_name":"National Foundation for Science and Technology Development","ror":"https://ror.org/04rw64z44"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W82771173","https://openalex.org/W273955616","https://openalex.org/W1503432700","https://openalex.org/W1876967670","https://openalex.org/W1971673042","https://openalex.org/W2089468765","https://openalex.org/W2100495367","https://openalex.org/W2101234009","https://openalex.org/W2119046642","https://openalex.org/W2119812052","https://openalex.org/W2123070675","https://openalex.org/W2142145056","https://openalex.org/W2180970301","https://openalex.org/W2187089797","https://openalex.org/W2340896621","https://openalex.org/W2516866958","https://openalex.org/W2564566221","https://openalex.org/W2808472075","https://openalex.org/W2897514040","https://openalex.org/W2961448107","https://openalex.org/W2992705528","https://openalex.org/W4236137412","https://openalex.org/W4239510810","https://openalex.org/W6610017368","https://openalex.org/W6630210095","https://openalex.org/W6675354045","https://openalex.org/W6678042037","https://openalex.org/W6730999400"],"related_works":["https://openalex.org/W3013693939","https://openalex.org/W2159052453","https://openalex.org/W2566616303","https://openalex.org/W3131327266","https://openalex.org/W2734887215","https://openalex.org/W4297051394","https://openalex.org/W2752972570","https://openalex.org/W4386815338","https://openalex.org/W2145836866","https://openalex.org/W4321789545"],"abstract_inverted_index":{"This":[0,34,76],"paper":[1],"proposes":[2],"a":[3,38,54],"new":[4,117],"approach":[5],"for":[6],"IoT":[7,16,44,84,101,121],"malware":[8,48,102],"detection":[9],"system":[10],"based":[11],"on":[12],"the":[13,31,73,83,91,129],"analysis":[14],"of":[15,30,57,119],"network":[17,25,45,80,85,122],"traffic":[18,46,86],"features.":[19,75,94],"First,":[20],"we":[21],"use":[22],"an":[23,43],"autoencoder":[24,79],"to":[26,40],"gather":[27],"latent":[28,67,97],"presentation":[29],"input":[32,59],"data.":[33],"is":[35,47,69,110],"followed":[36],"by":[37],"classifier":[39],"identify":[41],"whether":[42],"or":[49],"benign.":[50],"We":[51],"carry":[52],"out":[53,64],"comprehensive":[55],"comparison":[56],"different":[58],"feature":[60],"sets":[61],"and":[62,88,99,103],"figure":[63],"that":[65,78,111],"using":[66],"representation":[68,98],"more":[70],"effective":[71],"than":[72],"original":[74],"proves":[77],"can":[81,115],"compress":[82],"features":[87],"keep":[89],"only":[90],"most":[92],"meaningful":[93],"The":[95],"model":[96,114],"classifies":[100],"benign":[104],"with":[105],"high":[106],"performance.":[107],"Another":[108],"finding":[109],"our":[112],"trained":[113],"detect":[116],"types":[118],"abnormal":[120],"traffics":[123],"which":[124],"do":[125],"not":[126],"appear":[127],"in":[128],"training":[130],"process.":[131]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
