{"id":"https://openalex.org/W4412387804","doi":"https://doi.org/10.32604/cmc.2025.066551","title":"A Novel Malware Detection Framework for Internet of Things Applications","display_name":"A Novel Malware Detection Framework for Internet of Things Applications","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412387804","doi":"https://doi.org/10.32604/cmc.2025.066551"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.066551","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066551","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.066551","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065179238","display_name":"Muhammad Adil","orcid":"https://orcid.org/0000-0003-4494-8576"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Muhammad Adil","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051158911","display_name":"Mona Jamjoom","orcid":"https://orcid.org/0000-0001-9149-2810"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mona M. Jamjoom","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5030346209","display_name":"Zahid Ullah","orcid":"https://orcid.org/0000-0001-6574-9969"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zahid Ullah","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065179238"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24459784,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"3","first_page":"4363","last_page":"4380"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8488149046897888},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6281338930130005},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6203543543815613},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49478667974472046},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4688989222049713},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3643149733543396},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3082878589630127}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8488149046897888},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6281338930130005},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6203543543815613},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49478667974472046},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4688989222049713},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3643149733543396},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3082878589630127}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.066551","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066551","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.066551","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066551","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2795995661","https://openalex.org/W2964450831","https://openalex.org/W3027431742","https://openalex.org/W3027678336","https://openalex.org/W3048726132","https://openalex.org/W3169330763","https://openalex.org/W4205132420","https://openalex.org/W4210988783","https://openalex.org/W4214575608","https://openalex.org/W4289544758","https://openalex.org/W4308862656","https://openalex.org/W4313325293","https://openalex.org/W4319349994","https://openalex.org/W4319777770","https://openalex.org/W4319796488","https://openalex.org/W4320009754","https://openalex.org/W4322773728","https://openalex.org/W4323567873","https://openalex.org/W4367296576","https://openalex.org/W4372342980","https://openalex.org/W4377000627","https://openalex.org/W4377691173","https://openalex.org/W4379514871","https://openalex.org/W4383340358","https://openalex.org/W4385236985","https://openalex.org/W4386951843","https://openalex.org/W4387967760","https://openalex.org/W4388914801","https://openalex.org/W4390562648","https://openalex.org/W4393851365","https://openalex.org/W4396691285","https://openalex.org/W4400043036","https://openalex.org/W4401054291","https://openalex.org/W4410610054"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W2975527072"],"abstract_inverted_index":{"In":[0],"today\u2019s":[1],"digital":[2],"world,":[3],"the":[4,30,40,44,60,113,172,188,193,202,205,240,245,269,310],"Internet":[5],"of":[6,47,150,204,234,291,305],"Things":[7],"(IoT)":[8],"plays":[9],"an":[10,116,137,288,302],"important":[11],"role":[12],"in":[13,24,39,127,154,160,180,244,255,274],"both":[14,171],"local":[15],"and":[16,67,73,100,109,152,167,174,195,210,229,253,298],"global":[17],"economies":[18],"due":[19],"to":[20,32,70,156,190,266],"its":[21],"widespread":[22],"adoption":[23],"different":[25],"applications.":[26,129,162],"This":[27,111,163],"technology":[28,49],"has":[29],"potential":[31,45],"offer":[33],"several":[34,212],"advantages":[35],"over":[36,309],"conventional":[37],"technologies":[38],"near":[41],"future.":[42],"However,":[43],"growth":[46],"this":[48],"also":[50],"attracts":[51],"attention":[52],"from":[53,65],"hackers,":[54],"which":[55,247,300],"introduces":[56],"new":[57],"challenges":[58],"for":[59,115,216],"research":[61],"community":[62],"that":[63,83,121,147,219,282],"range":[64],"hardware":[66],"software":[68],"security":[69,81,276],"user":[71],"privacy":[72],"authentication.":[74],"Therefore,":[75],"we":[76,135,208,261,280],"focus":[77],"on":[78,97,141],"a":[79,181,263],"particular":[80],"concern":[82],"is":[84,148,237,301],"associated":[85],"with":[86],"malware":[87,125,158],"detection.":[88],"The":[89,184,232],"literature":[90],"presents":[91],"many":[92],"countermeasures,":[93],"but":[94],"inconsistent":[95,241],"results":[96,179,242],"identical":[98],"datasets":[99],"algorithms":[101,215,236],"raise":[102],"concerns":[103],"about":[104,250],"model":[105,189],"biases,":[106],"training":[107,173],"quality,":[108],"complexity.":[110],"highlights":[112],"need":[114],"adaptive,":[117],"real-time":[118,155],"learning":[119,151,214],"framework":[120,139,164,271],"can":[122],"effectively":[123,191],"mitigate":[124],"threats":[126,159],"IoT":[128,161,257],"To":[130,200],"address":[131],"these":[132,235],"challenges,":[133],"(i)":[134],"propose":[136],"intelligent":[138],"based":[140],"Two-step":[142],"Deep":[143],"Reinforcement":[144],"Learning":[145],"(TwStDRL)":[146],"capable":[149],"adapting":[153],"counter":[157],"uses":[165],"exploration":[166],"exploitation":[168],"phenomena":[169],"during":[170],"testing":[175],"phases":[176],"by":[177,239],"storing":[178],"replay":[182],"memory.":[183],"stored":[185],"knowledge":[186],"allows":[187],"navigate":[192],"environment":[194],"maximize":[196],"cumulative":[197],"rewards.":[198],"(ii)":[199],"demonstrate":[201],"superiority":[203],"TwStDRL":[206,270,285],"framework,":[207],"implement":[209],"evaluate":[211],"machine":[213],"comparative":[217],"analysis":[218],"include":[220],"Support":[221],"Vector":[222],"Machines":[223],"(SVM),":[224],"Multi-Layer":[225],"Perceptron,":[226],"Random":[227],"Forests,":[228],"k-means":[230],"Clustering.":[231],"selection":[233],"driven":[238],"reported":[243],"literature,":[246],"create":[248],"doubt":[249],"their":[251],"robustness":[252],"reliability":[254],"real-world":[256],"deployments.":[258],"(iii)":[259],"Finally,":[260],"provide":[262],"comprehensive":[264],"evaluation":[265],"justify":[267],"why":[268],"outperforms":[272],"them":[273],"mitigating":[275],"threats.":[277],"During":[278],"analysis,":[279],"noted":[281],"our":[283],"proposed":[284],"scheme":[286],"achieves":[287],"average":[289],"performance":[290],"99.45":[292],"%":[293,308],"across":[294],"accuracy,":[295],"precision,":[296],"recall,":[297],"F1-score,":[299],"absolute":[303],"improvement":[304],"roughly":[306],"3":[307],"existing":[311],"malware-detection":[312],"models.":[313]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
