{"id":"https://openalex.org/W7122689960","doi":"https://doi.org/10.3390/fi18010046","title":"Low-Cost Malware Detection with Artificial Intelligence on Single Board Computers","display_name":"Low-Cost Malware Detection with Artificial Intelligence on Single Board Computers","publication_year":2026,"publication_date":"2026-01-12","ids":{"openalex":"https://openalex.org/W7122689960","doi":"https://doi.org/10.3390/fi18010046"},"language":"en","primary_location":{"id":"doi:10.3390/fi18010046","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18010046","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/fi18010046","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115551270","display_name":"Phil Steadman","orcid":null},"institutions":[{"id":"https://openalex.org/I8408910","display_name":"Cardiff Metropolitan University","ror":"https://ror.org/00bqvf857","country_code":"GB","type":"education","lineage":["https://openalex.org/I8408910"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Phil Steadman","raw_affiliation_strings":["Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK"],"affiliations":[{"raw_affiliation_string":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK","institution_ids":["https://openalex.org/I8408910"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064994129","display_name":"Paul Jenkins","orcid":"https://orcid.org/0000-0002-9854-9450"},"institutions":[{"id":"https://openalex.org/I8408910","display_name":"Cardiff Metropolitan University","ror":"https://ror.org/00bqvf857","country_code":"GB","type":"education","lineage":["https://openalex.org/I8408910"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Jenkins","raw_affiliation_strings":["Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK"],"affiliations":[{"raw_affiliation_string":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK","institution_ids":["https://openalex.org/I8408910"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122796865","display_name":"Rajkumar Singh Rathore","orcid":null},"institutions":[{"id":"https://openalex.org/I8408910","display_name":"Cardiff Metropolitan University","ror":"https://ror.org/00bqvf857","country_code":"GB","type":"education","lineage":["https://openalex.org/I8408910"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rajkumar Singh Rathore","raw_affiliation_strings":["Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK"],"affiliations":[{"raw_affiliation_string":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK","institution_ids":["https://openalex.org/I8408910"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043570519","display_name":"Chaminda Hewage","orcid":"https://orcid.org/0000-0001-7593-6661"},"institutions":[{"id":"https://openalex.org/I8408910","display_name":"Cardiff Metropolitan University","ror":"https://ror.org/00bqvf857","country_code":"GB","type":"education","lineage":["https://openalex.org/I8408910"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chaminda Hewage","raw_affiliation_strings":["Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK"],"affiliations":[{"raw_affiliation_string":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK","institution_ids":["https://openalex.org/I8408910"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115551270"],"corresponding_institution_ids":["https://openalex.org/I8408910"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13829201,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"1","first_page":"46","last_page":"46"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.002300000051036477,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7542999982833862},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.4893999993801117},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.48350000381469727},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.47040000557899475},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.45730000734329224},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.4431999921798706},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.39579999446868896},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.38659998774528503},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.382999986410141}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9135000109672546},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7542999982833862},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6292999982833862},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5418000221252441},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.4893999993801117},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.48350000381469727},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.47040000557899475},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.45730000734329224},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.4431999921798706},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.39579999446868896},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.38659998774528503},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.382999986410141},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.37130001187324524},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.34779998660087585},{"id":"https://openalex.org/C157170001","wikidata":"https://www.wikidata.org/wiki/Q4781507","display_name":"Applications of artificial intelligence","level":2,"score":0.33739998936653137},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3160000145435333},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3116999864578247},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.29809999465942383},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.287200003862381},{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.2838999927043915},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.2833000123500824},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.28119999170303345},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2736999988555908},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.26660001277923584},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.2630000114440918}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi18010046","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18010046","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:723bf4dcbb17415aab71fcb221ded338","is_oa":true,"landing_page_url":"https://doaj.org/article/723bf4dcbb17415aab71fcb221ded338","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 18, Iss 1, p 46 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi18010046","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18010046","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":92,"referenced_works":["https://openalex.org/W1545528966","https://openalex.org/W1851403712","https://openalex.org/W1893133781","https://openalex.org/W1985902740","https://openalex.org/W2073914516","https://openalex.org/W2079215333","https://openalex.org/W2099053789","https://openalex.org/W2114853176","https://openalex.org/W2131523719","https://openalex.org/W2138644293","https://openalex.org/W2344380211","https://openalex.org/W2425931228","https://openalex.org/W2508015754","https://openalex.org/W2571907764","https://openalex.org/W2624989916","https://openalex.org/W2632775315","https://openalex.org/W2752533296","https://openalex.org/W2761800654","https://openalex.org/W2783284780","https://openalex.org/W2785804592","https://openalex.org/W2795033129","https://openalex.org/W2803750062","https://openalex.org/W2810450102","https://openalex.org/W2868191876","https://openalex.org/W2888505697","https://openalex.org/W2895909303","https://openalex.org/W2897795150","https://openalex.org/W2919115771","https://openalex.org/W2922073769","https://openalex.org/W2944830571","https://openalex.org/W2954476653","https://openalex.org/W2961099251","https://openalex.org/W2962802821","https://openalex.org/W2966275995","https://openalex.org/W2979795649","https://openalex.org/W2981292756","https://openalex.org/W2990788608","https://openalex.org/W2995373926","https://openalex.org/W2996806689","https://openalex.org/W2998961572","https://openalex.org/W3000371668","https://openalex.org/W3008497156","https://openalex.org/W3009034279","https://openalex.org/W3015200820","https://openalex.org/W3017217726","https://openalex.org/W3024340288","https://openalex.org/W3030218575","https://openalex.org/W3044668093","https://openalex.org/W3082063014","https://openalex.org/W3091621850","https://openalex.org/W3102768552","https://openalex.org/W3112173953","https://openalex.org/W3138102940","https://openalex.org/W3155912831","https://openalex.org/W3160611354","https://openalex.org/W3186605584","https://openalex.org/W3196064684","https://openalex.org/W3203598691","https://openalex.org/W3206577104","https://openalex.org/W3208818881","https://openalex.org/W3209034791","https://openalex.org/W3214404698","https://openalex.org/W4205473597","https://openalex.org/W4205808359","https://openalex.org/W4205875715","https://openalex.org/W4206724648","https://openalex.org/W4212861975","https://openalex.org/W4237748696","https://openalex.org/W4289549946","https://openalex.org/W4290694460","https://openalex.org/W4295088039","https://openalex.org/W4312428700","https://openalex.org/W4316466921","https://openalex.org/W4318384306","https://openalex.org/W4319796488","https://openalex.org/W4323565799","https://openalex.org/W4323655380","https://openalex.org/W4362668745","https://openalex.org/W4366415335","https://openalex.org/W4367296576","https://openalex.org/W4376142983","https://openalex.org/W4381548520","https://openalex.org/W4388419817","https://openalex.org/W4388654737","https://openalex.org/W4390831814","https://openalex.org/W4390894834","https://openalex.org/W4390991307","https://openalex.org/W4392158281","https://openalex.org/W4399920729","https://openalex.org/W4400547038","https://openalex.org/W4404355382","https://openalex.org/W4408970994"],"related_works":[],"abstract_inverted_index":{"The":[0,111],"proliferation":[1],"of":[2,4,33,82,154,173,225,233,245],"Internet":[3],"Things":[5],"(IoT)":[6],"devices":[7,143],"has":[8],"significantly":[9],"expanded":[10],"the":[11,28,74,80,115,171,208,223,230,234,243],"threat":[12],"landscape":[13],"for":[14,44],"malicious":[15],"software":[16],"(malware),":[17],"rendering":[18],"traditional":[19],"signature-based":[20],"detection":[21,51,125,256],"methods":[22],"increasingly":[23],"ineffective":[24],"in":[25,137,150,199,222],"coping":[26],"with":[27,121,144,191],"volume":[29],"and":[30,48,148,157,178,238,248],"evolving":[31],"nature":[32],"modern":[34],"threats.":[35],"In":[36,77],"response,":[37],"researchers":[38],"are":[39,194,202,211],"utilising":[40,56],"artificial":[41],"intelligence":[42],"(AI)":[43],"a":[45,134,174],"more":[46],"dynamic":[47],"robust":[49],"malware":[50,66,83,255],"solution.":[52],"An":[53],"innovative":[54],"approach":[55,117],"AI":[57,247],"is":[58,88,133,215],"focusing":[59],"on":[60,67,142,204,213,257],"image":[61,249],"classification":[62],"techniques":[63,240],"to":[64,104,185,242],"detect":[65],"resource-constrained":[68,258],"Single-Board":[69],"Computers":[70],"(SBCs)":[71],"such":[72,98],"as":[73,99,107],"Raspberry":[75],"Pi.":[76],"this":[78,161],"method":[79],"conversion":[81],"binaries":[84],"into":[85],"2D":[86],"images":[87],"examined,":[89],"which":[90,181,200],"can":[91,251],"be":[92,183],"analysed":[93],"by":[94],"deep":[95],"learning":[96],"models":[97,141,190,201],"convolutional":[100],"neural":[101],"networks":[102],"(CNNs)":[103],"classify":[105],"them":[106],"benign":[108],"or":[109],"malicious.":[110],"results":[112],"show":[113],"that":[114],"image-based":[116],"demonstrates":[118],"high":[119],"efficacy,":[120],"many":[122],"studies":[123],"reporting":[124],"accuracy":[126],"rates":[127],"exceeding":[128],"98%.":[129],"That":[130],"said,":[131],"there":[132],"significant":[135,220],"challenge":[136],"deploying":[138],"these":[139],"demanding":[140],"limited":[145],"processing":[146],"power":[147],"memory,":[149],"particular":[151],"those":[152],"involving":[153],"both":[155],"calculation":[156],"time":[158],"complexity.":[159],"Overcoming":[160],"issue":[162],"requires":[163],"critical":[164],"model":[165],"optimisation":[166,239],"strategies.":[167],"Successful":[168],"approaches":[169],"include":[170],"use":[172],"lightweight":[175],"CNN":[176],"architecture":[177],"federated":[179],"learning,":[180],"may":[182],"used":[184],"preserve":[186],"privacy":[187],"while":[188],"training":[189],"decentralised":[192],"data":[193],"processed.":[195],"This":[196,227],"hybrid":[197],"workflow":[198],"trained":[203],"powerful":[205],"servers":[206],"before":[207],"learnt":[209],"algorithms":[210],"deployed":[212],"SBCs":[214],"an":[216],"emerging":[217],"field":[218,224],"attacting":[219],"interest":[221],"cybersecurity.":[226],"paper":[228],"synthesises":[229],"current":[231],"state":[232],"art,":[235],"performance":[236],"compromises,":[237],"contributing":[241],"understanding":[244],"how":[246],"representation":[250],"enable":[252],"effective":[253],"low-cost":[254],"systems.":[259]},"counts_by_year":[],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2026-01-13T00:00:00"}
