{"id":"https://openalex.org/W4403278752","doi":"https://doi.org/10.1109/mcna63144.2024.10703911","title":"Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches","display_name":"Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches","publication_year":2024,"publication_date":"2024-09-17","ids":{"openalex":"https://openalex.org/W4403278752","doi":"https://doi.org/10.1109/mcna63144.2024.10703911"},"language":"en","primary_location":{"id":"doi:10.1109/mcna63144.2024.10703911","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcna63144.2024.10703911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Multimedia Computing, Networking and Applications (MCNA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038179267","display_name":"Ala Mughaid","orcid":"https://orcid.org/0000-0002-1298-6933"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Ala Mughaid","raw_affiliation_strings":["The Hashemite University,Department of Computer Science,Zarqa,Jordan,13133"],"affiliations":[{"raw_affiliation_string":"The Hashemite University,Department of Computer Science,Zarqa,Jordan,13133","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072727958","display_name":"Ruba Ibrahim","orcid":"https://orcid.org/0000-0003-1096-5415"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ruba Ibrahim","raw_affiliation_strings":["The Hashemite University,Department of Computer Science,Zarqa,Jordan,13133"],"affiliations":[{"raw_affiliation_string":"The Hashemite University,Department of Computer Science,Zarqa,Jordan,13133","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108886731","display_name":"Mahmoud AlJamal","orcid":null},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mahmoud AlJamal","raw_affiliation_strings":["The Hashemite University,Department of Computer Science,Zarqa,Jordan,13133"],"affiliations":[{"raw_affiliation_string":"The Hashemite University,Department of Computer Science,Zarqa,Jordan,13133","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092815522","display_name":"Issa Al-Aiash","orcid":"https://orcid.org/0009-0003-9297-6704"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Issa Al-Aiash","raw_affiliation_strings":["The Hashemite University,Department of Computer Science,Zarqa,Jordan,13133"],"affiliations":[{"raw_affiliation_string":"The Hashemite University,Department of Computer Science,Zarqa,Jordan,13133","institution_ids":["https://openalex.org/I157392197"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5038179267"],"corresponding_institution_ids":["https://openalex.org/I157392197"],"apc_list":null,"apc_paid":null,"fwci":3.5766,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.93906829,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"35","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9347000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9347000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan-horse","display_name":"Trojan horse","score":0.9215737581253052},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6656472682952881},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6070538759231567},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5220261216163635},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.486167848110199},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3767261207103729},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3433275520801544}],"concepts":[{"id":"https://openalex.org/C2777337426","wikidata":"https://www.wikidata.org/wiki/Q14639","display_name":"Trojan horse","level":2,"score":0.9215737581253052},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6656472682952881},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6070538759231567},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5220261216163635},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.486167848110199},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3767261207103729},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3433275520801544}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mcna63144.2024.10703911","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcna63144.2024.10703911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Multimedia Computing, Networking and Applications (MCNA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2950503064","https://openalex.org/W3195170298","https://openalex.org/W4295928027","https://openalex.org/W4310386984","https://openalex.org/W4313438408","https://openalex.org/W4378420446","https://openalex.org/W4386249878","https://openalex.org/W4388729412","https://openalex.org/W4389888396","https://openalex.org/W4390859803","https://openalex.org/W4390991307","https://openalex.org/W4391655720","https://openalex.org/W4400745935","https://openalex.org/W4400858333","https://openalex.org/W4400974883"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4301007801","https://openalex.org/W2382697400","https://openalex.org/W2582980835","https://openalex.org/W2379276655","https://openalex.org/W4298158580","https://openalex.org/W2603096622","https://openalex.org/W2370551650","https://openalex.org/W2360583561","https://openalex.org/W2368130655"],"abstract_inverted_index":{"As":[0],"the":[1,15,64,93,110,125],"Internet":[2],"of":[3,71,95,117,127],"Things":[4],"(IoT)":[5],"continues":[6],"to":[7,34,57,63,77,81,90,109,138,154],"expand,":[8],"integrating":[9],"interconnected":[10],"devices":[11],"into":[12],"daily":[13],"life,":[14],"threat":[16],"landscape":[17],"similarly":[18],"evolves":[19],"with":[20],"increasing":[21],"cybercrime":[22],"activities.":[23],"Among":[24],"these":[25,151],"threats,":[26],"Trojan":[27,140],"horse":[28,141],"malware":[29,97],"poses":[30],"a":[31,103,114],"significant":[32],"risk":[33],"IoT":[35,60,111,145,162],"systems":[36],"by":[37],"disguising":[38],"itself":[39],"as":[40],"legitimate":[41],"software,":[42],"thereby":[43],"gaining":[44],"unauthorized":[45,87],"access":[46],"and":[47,66,136,158],"control":[48],"over":[49],"networked":[50],"devices.":[51,146],"These":[52],"intrusions":[53],"are":[54],"particularly":[55],"challenging":[56],"detect":[58,139],"in":[59,144,160],"environments":[61],"due":[62],"diverse":[65],"often":[67],"less":[68],"secure":[69],"nature":[70],"connected":[72],"devices,":[73],"allowing":[74],"malicious":[75],"activities":[76,142],"persist":[78],"undetected,":[79],"leading":[80],"data":[82,88],"breaches,":[83],"device":[84],"malfunction,":[85],"or":[86],"transmission":[89],"attackers.":[91],"Addressing":[92],"inadequacies":[94],"traditional":[96],"detection":[98,156],"methods,":[99,152],"this":[100],"paper":[101],"introduces":[102],"novel":[104],"machine":[105],"learning-based":[106],"approach":[107],"tailored":[108],"context.":[112],"Leveraging":[113],"detailed":[115],"dataset":[116],"177,482":[118],"instances":[119],"across":[120],"86":[121],"attributes,":[122],"we":[123],"evaluate":[124],"efficacy":[126],"various":[128],"algorithms,":[129],"including":[130],"Naive":[131],"Bayes":[132],"(NB),":[133],"J48":[134],"trees,":[135],"IBk":[137],"specifically":[143],"Our":[147],"research":[148],"comprehensively":[149],"compares":[150],"aiming":[153],"enhance":[155],"accuracy":[157],"adaptability":[159],"dynamic":[161],"settings":[163],"significantly.":[164]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
