{"id":"https://openalex.org/W4409016264","doi":"https://doi.org/10.1186/s13677-025-00745-w","title":"AI driven IOMT security framework for advanced malware and ransomware detection in SDN","display_name":"AI driven IOMT security framework for advanced malware and ransomware detection in SDN","publication_year":2025,"publication_date":"2025-04-01","ids":{"openalex":"https://openalex.org/W4409016264","doi":"https://doi.org/10.1186/s13677-025-00745-w"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-025-00745-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00745-w","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00745-w","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00745-w","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085780043","display_name":"Sultan H. Almotiri","orcid":"https://orcid.org/0000-0003-1594-9115"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Sultan H. Almotiri","raw_affiliation_strings":["Department of Cybersecurity, College of Computing, Umm Al-Qura University, Makkah, 24211, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, College of Computing, Umm Al-Qura University, Makkah, 24211, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5085780043"],"corresponding_institution_ids":["https://openalex.org/I199693650"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":20.5618,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.99336742,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"14","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9724408388137817},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8492300510406494},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6284635066986084},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6242181062698364}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9724408388137817},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8492300510406494},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6284635066986084},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6242181062698364}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-025-00745-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00745-w","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00745-w","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e0e3cf20f2844e58834212216e6ae2ee","is_oa":true,"landing_page_url":"https://doaj.org/article/e0e3cf20f2844e58834212216e6ae2ee","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 14, Iss 1, Pp 1-22 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-025-00745-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00745-w","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00745-w","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4409016264.pdf"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W2209453414","https://openalex.org/W2741358105","https://openalex.org/W2803856670","https://openalex.org/W2910711617","https://openalex.org/W3021340023","https://openalex.org/W3045149779","https://openalex.org/W3149084432","https://openalex.org/W3178593045","https://openalex.org/W3201945250","https://openalex.org/W3205886849","https://openalex.org/W3217100588","https://openalex.org/W4200009332","https://openalex.org/W4205429872","https://openalex.org/W4280557042","https://openalex.org/W4280625283","https://openalex.org/W4292381820","https://openalex.org/W4292387506","https://openalex.org/W4296350759","https://openalex.org/W4300687693","https://openalex.org/W4307279302","https://openalex.org/W4366257082","https://openalex.org/W4380714981","https://openalex.org/W4386422441","https://openalex.org/W4386699348","https://openalex.org/W4387133686","https://openalex.org/W4387587778","https://openalex.org/W4387702349","https://openalex.org/W4391936401","https://openalex.org/W4395471110","https://openalex.org/W4400290101","https://openalex.org/W4400907136","https://openalex.org/W4401163238","https://openalex.org/W4402677668","https://openalex.org/W4403326190","https://openalex.org/W4403420454","https://openalex.org/W4403563850","https://openalex.org/W4404057000","https://openalex.org/W4404293876","https://openalex.org/W4405327534","https://openalex.org/W4406878838","https://openalex.org/W4407750235","https://openalex.org/W4407869912"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W3202245533","https://openalex.org/W4253977752","https://openalex.org/W2942879794"],"abstract_inverted_index":{"An":[0],"AI":[1],"driven":[2],"double-tier":[3],"detection":[4],"system,":[5],"means":[6],"this":[7,25,29],"is":[8,26,55,106,236],"a":[9,70,107,124,158,225],"security":[10,41,221,234],"framework":[11],"that":[12,111,223],"works":[13],"in":[14,28,44,175,227],"two":[15],"layers":[16],"to":[17,34,47,66,100,177,248],"increase":[18],"accuracy":[19,138,152,168,181,205],"and":[20,52,61,72,80,95,122,145,153,182,206,219,238,246],"reliability":[21],"of":[22,50,143,173,186,209,230,256],"threat":[23,103],"identification,":[24],"presented":[27,233],"research.":[30],"The":[31,128,232],"system":[32,110,198],"designs":[33],"tackle":[35],"rising":[36],"Software":[37],"Defined":[38],"Network":[39,196],"(SDN)":[40],"threats":[42,222,251],"especially":[43],"healthcare":[45,220,258],"environment":[46],"the":[48,81,102,147,193,228,254],"risk":[49],"malware,":[51],"ransomware":[53],"attacks,":[54],"powered":[56],"by":[57],"Deep":[58,194],"Learning":[59,63],"(DL)":[60],"Machine":[62,163],"(ML)":[64],"technologies":[65],"work":[67],"together,":[68],"as":[69],"static":[71],"dynamic":[73],"scanning":[74],"methods.":[75],"Using":[76],"this,":[77],"execution":[78],"traces":[79],"Application":[82],"Programming":[83],"Interface":[84],"(API)":[85],"call":[86],"sequences":[87],"are":[88],"integrated":[89],"with":[90,119,139,169,199],"Generative":[91],"Adversarial":[92],"Networks":[93],"(GANs)":[94],"autoencoder":[96],"based":[97],"predictive":[98],"analysis":[99],"improve":[101],"detection.":[104],"This":[105,211],"continuous":[108],"training":[109],"ensures":[112],"medical":[113],"data\u2019s":[114],"protection":[115,255],"while":[116],"maintaining":[117],"compliance":[118],"health":[120],"regulations":[121],"creates":[123],"secure":[125],"operational":[126],"environment.":[127],"double":[129],"tier":[130],"eXtreme":[131],"Gradient":[132,161],"Boosting":[133,162],"(XGBoost)":[134],"performance":[135],"reaches":[136],"99.60%":[137],"an":[140,170,183],"F1":[141,154,171,184,207],"score":[142,155,172,185,208],"0.9966":[144],"outperforming":[146],"benchmark":[148,190],"model":[149,165,235],"at":[150,179],"98.80%":[151],"0.988.":[156],"Further,":[157],"two-layer":[159],"Light":[160],"(LightGBM)":[164],"achieves":[166,203],"99.32%":[167],"0.9934,":[174],"contrast":[176],"which":[178,240],"98.96%":[180],"0.9895,":[187],"beats":[188],"its":[189],"counterpart.":[191],"Furthermore,":[192],"Neural":[195],"(DNN)":[197],"bi":[200],"layered":[201],"also":[202],"99.13%":[204],"0.9915.":[210],"study":[212],"presents":[213],"novel":[214],"countermeasures":[215],"for":[216],"these":[217],"SDN":[218],"warrant":[224],"breakthrough":[226],"field":[229],"cybersecurity.":[231],"agile":[237],"strong":[239],"offer":[241],"real":[242],"time":[243],"network":[244],"assessment":[245],"continue":[247],"detect":[249],"emerging":[250],"thus":[252],"improving":[253],"critical":[257],"infrastructure.":[259]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":12}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
