{"id":"https://openalex.org/W4414184213","doi":"https://doi.org/10.32604/cmc.2025.068257","title":"Transfer Learning-Based Approach with an Ensemble Classifier for Detecting Keylogging Attack on the Internet of Things","display_name":"Transfer Learning-Based Approach with an Ensemble Classifier for Detecting Keylogging Attack on the Internet of Things","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414184213","doi":"https://doi.org/10.32604/cmc.2025.068257"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.068257","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068257","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.068257","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093860868","display_name":"Yahya Alhaj Maz","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yahya Alhaj Maz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015229013","display_name":"Mohammed Anbar","orcid":"https://orcid.org/0000-0002-7026-6408"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammed Anbar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042044177","display_name":"Selvakumar Manickam","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Selvakumar Manickam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059723303","display_name":"Mosleh M. Abualhaj","orcid":"https://orcid.org/0000-0002-7465-8038"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mosleh M. Abualhaj","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058549100","display_name":"Sultan Ahmed Almalki","orcid":"https://orcid.org/0000-0003-4534-2461"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sultan Ahmed Almalki","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5061134870","display_name":"Basim Ahmad Alabsi","orcid":"https://orcid.org/0000-0003-2987-8856"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Basim Ahmad Alabsi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5093860868"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":13.8903,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.99194847,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"85","issue":"3","first_page":"5287","last_page":"5307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.7753000259399414},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5952000021934509},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5902000069618225},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5884000062942505},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5584999918937683},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.4625999927520752},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.45840001106262207},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.4138000011444092},{"id":"https://openalex.org/keywords/ensemble-forecasting","display_name":"Ensemble forecasting","score":0.38040000200271606}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.785099983215332},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.7753000259399414},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.65829998254776},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6032000184059143},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5952000021934509},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5902000069618225},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5884000062942505},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5584999918937683},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.4625999927520752},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.45840001106262207},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.4138000011444092},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.38040000200271606},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3788999915122986},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.36079999804496765},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.3571000099182129},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3273000121116638},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3160000145435333},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31360000371932983},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.29739999771118164},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2856999933719635},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27889999747276306},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C93959086","wikidata":"https://www.wikidata.org/wiki/Q6888345","display_name":"Model selection","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2599000036716461}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.068257","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068257","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.068257","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068257","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2601005640","https://openalex.org/W2792186710","https://openalex.org/W2883753518","https://openalex.org/W2948009788","https://openalex.org/W2980874176","https://openalex.org/W2992270489","https://openalex.org/W3014601769","https://openalex.org/W3034181669","https://openalex.org/W3035037193","https://openalex.org/W3041133507","https://openalex.org/W3179054875","https://openalex.org/W3179423215","https://openalex.org/W3214829575","https://openalex.org/W4224331011","https://openalex.org/W4225146420","https://openalex.org/W4288081073","https://openalex.org/W4324142429","https://openalex.org/W4378084132","https://openalex.org/W4384824609","https://openalex.org/W4387556984","https://openalex.org/W4400150395","https://openalex.org/W4401249215","https://openalex.org/W4402433570"],"related_works":[],"abstract_inverted_index":{"The":[0,92,126,149,167],"Internet":[1],"of":[2,21,26,34,74,84,121,132,197,222,229],"Things":[3],"(IoT)":[4],"is":[5],"an":[6,173],"innovation":[7],"that":[8,97,129,214],"combines":[9,98],"imagined":[10],"space":[11],"with":[12,101,145],"the":[13,22,72,82,112,119,130,195,215],"actual":[14],"world":[15],"on":[16,49,65,71],"a":[17,32,38,95,157,186,203,219,225],"single":[18],"platform.":[19],"Because":[20],"recent":[23],"rapid":[24],"rise":[25],"IoT":[27,50,66,90],"devices,":[28],"there":[29],"has":[30],"been":[31],"lack":[33],"standards,":[35],"leading":[36,105],"to":[37,45,106,178,208],"massive":[39],"increase":[40],"in":[41,80,143],"unprotected":[42],"devices":[43],"connecting":[44],"networks.":[46,67],"Consequently,":[47],"cyberattacks":[48],"are":[51,59],"becoming":[52],"more":[53],"common,":[54],"particularly":[55],"keylogging":[56,85,198,209],"attacks,":[57,199],"which":[58],"often":[60],"caused":[61],"by":[62],"security":[63],"vulnerabilities":[64],"This":[68],"research":[69],"focuses":[70],"role":[73],"transfer":[75,99,120,133,192,204],"learning":[76,100,134,165,189,193],"and":[77,114,135,156,200,224,238],"ensemble":[78,102,136,174],"classifiers":[79,137],"enhancing":[81],"detection":[83,108,140,196,220],"attacks":[86],"within":[87],"small,":[88],"imbalanced":[89],"datasets.":[91],"authors":[93],"propose":[94],"model":[96,152,190,206,217],"classification":[103],"methods,":[104],"improved":[107],"accuracy.":[109],"By":[110],"leveraging":[111],"BoT-IoT":[113],"keylogger_detection":[115],"datasets,":[116],"they":[117],"facilitate":[118],"knowledge":[122],"across":[123,182],"various":[124],"domains.":[125],"results":[127],"reveal":[128],"integration":[131],"significantly":[138],"improves":[139],"capabilities,":[141],"even":[142],"scenarios":[144],"limited":[146],"data":[147],"availability.":[148],"proposed":[150],"TRANS-ENS":[151,216],"showcases":[153],"exceptional":[154],"accuracy":[155,221],"minimal":[158],"false":[159,226],"positive":[160],"rate,":[161],"outperforming":[162],"current":[163],"deep":[164,188],"approaches.":[166],"primary":[168],"objectives":[169],"include:":[170],"(i)":[171],"introducing":[172],"feature":[175],"selection":[176],"technique":[177],"identify":[179],"common":[180],"features":[181],"models,":[183],"(ii)":[184],"creating":[185],"pre-trained":[187],"through":[191],"for":[194],"(iii)":[201],"developing":[202],"learning-ensemble":[205],"dedicated":[207],"detection.":[210],"Experimental":[211],"findings":[212],"indicate":[213],"achieves":[218],"96.06%":[223],"alarm":[227],"rate":[228],"0.12%,":[230],"surpassing":[231],"existing":[232],"models":[233],"such":[234],"as":[235],"CNN,":[236],"RNN,":[237],"LSTM.":[239]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-23T07:41:27.035349","created_date":"2025-10-10T00:00:00"}
