{"id":"https://openalex.org/W4400351699","doi":"https://doi.org/10.1109/smartnets61466.2024.10577653","title":"Combating Malware Traffic in Emerging Networks: A Collaborative Learning Approach","display_name":"Combating Malware Traffic in Emerging Networks: A Collaborative Learning Approach","publication_year":2024,"publication_date":"2024-05-28","ids":{"openalex":"https://openalex.org/W4400351699","doi":"https://doi.org/10.1109/smartnets61466.2024.10577653"},"language":"en","primary_location":{"id":"doi:10.1109/smartnets61466.2024.10577653","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/smartnets61466.2024.10577653","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100022236","display_name":"Harshith Vaitla","orcid":null},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Harshith Vaitla","raw_affiliation_strings":["Western University,Department of Computer Science,London,ON,Canada"],"affiliations":[{"raw_affiliation_string":"Western University,Department of Computer Science,London,ON,Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074023476","display_name":"Gad Gad","orcid":"https://orcid.org/0000-0001-9177-9950"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Gad Gad","raw_affiliation_strings":["Western University,Department of Computer Science,London,ON,Canada"],"affiliations":[{"raw_affiliation_string":"Western University,Department of Computer Science,London,ON,Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063911030","display_name":"Zubair Md. Fadlullah","orcid":"https://orcid.org/0000-0002-4785-2425"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Zubair Md Fadlullah","raw_affiliation_strings":["Western University,Department of Computer Science,London,ON,Canada"],"affiliations":[{"raw_affiliation_string":"Western University,Department of Computer Science,London,ON,Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068882573","display_name":"Mostafa M. Fouda","orcid":"https://orcid.org/0000-0003-1790-8640"},"institutions":[{"id":"https://openalex.org/I106969075","display_name":"Idaho State University","ror":"https://ror.org/0162z8b04","country_code":"US","type":"education","lineage":["https://openalex.org/I106969075"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mostafa M. Fouda","raw_affiliation_strings":["Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA"],"affiliations":[{"raw_affiliation_string":"Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA","institution_ids":["https://openalex.org/I106969075"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100022236"],"corresponding_institution_ids":["https://openalex.org/I125749732"],"apc_list":null,"apc_paid":null,"fwci":0.3653,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58478985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9667999744415283,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7622256278991699},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7131606936454773},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3755805492401123},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3643907308578491},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33692437410354614},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3281645178794861}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7622256278991699},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7131606936454773},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3755805492401123},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3643907308578491},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33692437410354614},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3281645178794861}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartnets61466.2024.10577653","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/smartnets61466.2024.10577653","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2559752671","https://openalex.org/W2606697812","https://openalex.org/W2617931713","https://openalex.org/W2912213068","https://openalex.org/W2989289980","https://openalex.org/W2998045710","https://openalex.org/W3021654819","https://openalex.org/W3212010319","https://openalex.org/W4200150912","https://openalex.org/W4205875715","https://openalex.org/W4212907893","https://openalex.org/W4297687186","https://openalex.org/W4300427714","https://openalex.org/W4311457546","https://openalex.org/W4318619660","https://openalex.org/W4387517534","https://openalex.org/W4387870645","https://openalex.org/W4388087488","https://openalex.org/W4390492902","https://openalex.org/W4392175543","https://openalex.org/W6728757088","https://openalex.org/W6738383168","https://openalex.org/W6758757267","https://openalex.org/W6765541894"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453","https://openalex.org/W3152891574","https://openalex.org/W4316881845"],"abstract_inverted_index":{"Identifying":[0],"and":[1,22,79,87,108,136],"mitigating":[2],"malicious":[3],"traffic":[4,49],"poses":[5],"a":[6,37,52,64,134],"major":[7],"challenge":[8],"in":[9,44,151,164],"the":[10,29,45,71,96,106,114,120,147],"evolving":[11],"field":[12],"of":[13,40,47,110,116,123,149],"network":[14,59,101,142,153],"security.":[15,80],"As":[16,51],"threat":[17],"profiles":[18],"rapidly":[19],"evolve,":[20],"dynamic":[21],"adaptive":[23],"methods":[24],"are":[25],"needed":[26],"to":[27,61,118,140],"match":[28],"swiftly":[30],"changing":[31],"attack":[32],"patterns.":[33],"This":[34],"paper":[35,104],"introduces":[36],"novel":[38],"application":[39],"Federated":[41],"Learning":[42],"(FL)":[43],"realm":[46],"malware":[48,85],"detection.":[50],"distributed":[53,99],"training":[54,72],"framework,":[55],"FL":[56,97,117,150],"allows":[57],"multiple":[58],"nodes":[60],"collaboratively":[62],"learn":[63],"shared":[65],"prediction":[66],"model":[67],"while":[68],"keeping":[69],"all":[70],"data":[73,77,125,129],"localized,":[74],"thus":[75],"ensuring":[76],"privacy":[78],"We":[81],"present":[82],"an":[83,165],"effective":[84],"identification":[86],"classification":[88],"architecture":[89],"utilizing":[90],"Convolutional":[91],"Neural":[92],"Networks":[93],"(CNN)":[94],"within":[95],"framework":[98],"among":[100],"nodes.":[102],"The":[103,144],"details":[105],"design":[107],"implementation":[109],"this":[111],"system,":[112],"highlighting":[113],"integration":[115],"harness":[119],"collective":[121],"intelligence":[122],"diverse":[124,141],"sources":[126],"without":[127],"compromising":[128],"privacy.":[130],"Our":[131],"approach":[132],"provides":[133],"scalable":[135],"efficient":[137],"solution":[138],"adaptable":[139],"environments.":[143],"results":[145],"showcase":[146],"potential":[148],"enhancing":[152],"security":[154],"mechanisms,":[155],"opening":[156],"new":[157],"avenues":[158],"for":[159],"combatting":[160],"sophisticated":[161],"cyber":[162],"threats":[163],"increasingly":[166],"connected":[167],"world.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
