<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Malware Detection in Internet of Things using Machine Learning enabled Data Science Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sunita Choudhary</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anand Sharma</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Mody University of Science and Technology</institution>
          ,
          <addr-line>Lakshmangarh, Sikar, Rajasthan</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Internet of Things (IoT) is measured as disseminated and unified arrangement of installed structures conferring by wired or mobile communication propels. With the extended use of IoT structure in every area, threats and attacks in these establishments are in like manner growing proportionately. In this way, wide considerations have been put to address the protection and security issues in IoT networks in a general sense through fundamental cryptographic techniques. Regardless, the created tools have various kinds of programming to be introduced and impression of the framework topology are not performed, so there is an issue that outwardly momentary irregularities can't be perceived. Malware detection in the IoT networks is a rising issue in the space of IoT. In this paper, machine learning enabled data science approach for malware detection in IoT has been proposed.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Internet of Things (IoT)</kwd>
        <kwd>Malware detection</kwd>
        <kwd>Machine Learning</kwd>
        <kwd>Data Science</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        IoT is deliberated as widely interconnected
and appropriated arrangements of device setup
which are connected by wired or remote
communication innovations [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. It is
additionally considered as the arrangement of
actual things or items engaged with rules and
protocols, communication capacities and
storage as per the hardware devices, network
topologies and computing capabilities that
endows these things to collect, store and
process the data.
      </p>
      <p>
        The said things and devices in the IoT
allude to the items by our daily life going from
savvy house-hold gadgets, for example, smart
meter, smart bulb, smoke alarm, temperature
sensor, AC,IP camera, to more complex
gadgets, for example, RFID (Radio Frequency
Identification) gadgets, heartbeat indicators,
sensors in garage, accelerometers, and a scope
of different sensors in vehicles and so on [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
The areas covered by the IoT incorporate,
however not restricted to, energy, buildings,
clinical, retail, supply chain, transportation,
manufacturing, etc. That huge size of IoT
networks fetches new difficulties, for example,
the executives of these gadgets and things,
sheer measure of information, communication,
storage, computation, protection and security.
There are broad explores casing these various
parts of IoT (that are design, conventions,
rules, applications, privacy and security) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
Be that as it may, the foundation of the
commercialization of IoT framework is the
privacy and security ensure just as purchaser
fulfillment. The approach that IoT utilizes to
empower the things, for example, SDN
(Software Defined Networking), fog
computing, and Cloud Computing (CC),
likewise expands the scene of threats for the
attackers.
the
      </p>
      <p>IoT</p>
      <p>
        Privacy and Security are the principle
factors in the business acknowledgment of IoT
applications and installment. Presently Internet
is the main target for cyber attacks from
hacking to access the secret information. It
penetrates the security system that have
unfavorably influenced various enterprises, for
example, medical services and other
businesses. The constraints of IoT gadgets and
the complete framework they work in,
represent extra difficulties for the devices and
applications. Until this point, privacy and
security issues have been broadly explored in
the IoT area from alternate points of view, for
example, communication security, information
security, identity management, architectural
security, malware examination, etc [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        The inadequate safety efforts and absence
of committed inconsistency location
frameworks for these heterogeneous
organizations make them defenseless against a
scope of attacks, for example, spoofing, Denial
of Service (DoS), data-leakage, and so forth.
These can prompt terrible impacts; making
harm equipment, disturbing the framework
accessibility, causing framework power
outages, and even truly harm people [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Consequently, plainly the size of effect of the
attacks executed on IoT organizations can
change essentially. For instance, a moderately
straightforward and apparently innocuous
deauthentication attack can cause no huge
harm, yet whenever performed on a gadget
with basic importance, for example, a guiding
wheel in a remote vehicle, it can represent a
danger to human existence. Subsequently,
clearly there is a significant gap in security
necessities and protection abilities of presently
accessible IoT gadgets. The primary concerns
which make these gadgets smart are their
computational power and heterogeneity
regarding equipment, software, and protocols
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. All the more explicitly, it is for the most
part not practical for smart gadgets with
limited computing capability, memory, data
transfer capacity, and battery asset to execute
computationally serious and dormancy touchy
security undertakings that produce substantial
calculation and transmission load [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
Subsequently, it is absurd to expect to utilize
intricate and hearty safety efforts. Also, given
the variety of these gadgets, it is trying to
create and send a security component that can
suffer with the scale and scope of gadgets [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>Now the Malware is characterized as
software intended to invade or harm a digital
framework without the proprietor's educated
assent. This is really a nonexclusive
delineation for all sorts of cyber threats. A
straightforward order of malware comprises of
computer files or data infectors and
independent malware. Another method of
ordering malware depends on their specific
activity: worms, rootkits, backdoors, spyware,
trojans and so on as the ascent of malware on
mobile phones has illustrated, if something is
associated with the web, it's a likely road of
cyber-attacks.</p>
      <p>In this way, while the ascent of Internet of
Things associated gadgets has carried various
advantages to clients - in industry, the work
environment and at home - it also has opened
entryways for new digital criminal plans.</p>
      <p>In contrast to mobile phones, IoT gadgets
are frequently connected and disregarded, with
the threat that the IoT camera you set up could
turn out to be effectively open to outcasts
who might actually utilize it to keep an eye on
your activities, be it in your working
environment or in your home.</p>
      <p>Such is the degree of the security stress
with the IoT, police have cautioned about the
threats presented by associated gadgets, while
government bodies are running after methods
of administering IoT gadgets in the near
future, so we're not left with a harmful
tradition of billions of gadgets that can
undoubtedly be tainted with malware.</p>
    </sec>
    <sec id="sec-2">
      <title>3. Machine Learning Approaches for malware Detection</title>
      <p>
        Signature based strategies [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] is now
getting more troublesome for detection of
malware since all recent malware applications
will in general have numerous polymorphic
layers to dodge discovery or to utilize side
components update themselves to a fresher
variant at brief timeframes to evade detection
by any specific antivirus programmer. For an
illustration of dynamic malware analysis for
detection of malware, by means of copying in
a virtual platform, the intrigued reader can
grasp [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Traditional strategies for the
discovery of transformative infections are
depicted in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        An outline on various ML techniques that
were developed to detect malware are given in
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Here we are giving a couple of references
to epitomize those strategies.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], decision trees chipping away at
ngrams are established to deliver preferable
outcomes over both the SVM (Support Vector
Machines) and Naïve-Bayes classifier.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] Hidden Markov Models are utilized
to identify whether a specified program record
is a variation of a past program document. To
achieve a comparative objective, [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] utilizes
Profile Hidden Markov Models that have been
recently utilized with extraordinary
accomplishment for grouping examination in
bioinformatics.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], Maps are utilized to recognize
examples of conduct for infections in
Windows executable records.
      </p>
    </sec>
    <sec id="sec-3">
      <title>4. Machine Learning enabled Data</title>
    </sec>
    <sec id="sec-4">
      <title>Science Approach</title>
      <p>In this section, machine learning enabled
data science approach for detection of malware
in IoT has been described. Figure 1 illustrates
the basic blocks for the proposed detection
approach.</p>
      <p>The current machine learning approaches
for malware detection roused us to propose
and define a malware detection system which
we emphatically accept will help in
moderating the present testing issues. Figure 1
demonstrates various advances and
interactions of the proposed malware detection
framework. The concise conversation of its
parts is as follows.</p>
      <p>The said malware and considerate
executable files are treated as data sources.
The pre-processing and analysis are finished
with data science. This cycle is a basic
advance and incorporates rule age and
knowledge data discovery (KDD) validation.
Further the extracted features acquired through
this phase are continually checked and
approved utilizing cross-system validation and
profound observing process. This is ended to
conquer the difficulties presented by the
adversary. Data science tools and machine
learning execution make the feature extraction
and overall process more productive and
successful.</p>
      <p>The preparation of testing and training
dataset is further processed by the ML
techniques or classifiers. Here, we applied
hostile protection and algorithmic biasness
defense to moderate the impacts on the
decision making cycle. The end-product is
further transferred to the detection and alert
system which handles the important strides to
retain the framework secured against any
cyber-attacks.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Experiment Setup and Results</title>
      <p>The test method was executed in two
different operating systems to be specific,
Linux 4.1. also, Windows 10 which introduced
8 center Core i5 processor with 8GB RAM.
Moreover, two VMs Oracle VirtualBox 4.2.16
have been utilized in this work. These VM's
are utilized to gather and analyze the malware
tests. First VM is using CentOS Linux and the
second VM is Windows 10. In addition,
different tools are additionally used to set up
the tests, for example, WEKA 3.9.4 (the data
mining and ML tool) and MATLAB 2019b.</p>
      <p>To assess the evaluation of the proposed
method, firstly the said dataset is isolated into
two different groups: Training group and
Testing group. The said training dataset has
been partitioned in some malware and some
goodware to stay away from the awkwardness.
The training dataset consisting of 2000
examples is divided in 1000 malware and 1000
goodware. The equivalent apportioned is acted
in the testing-dataset which likewise contains
2000 examples in total as 1000 malware and
1000 goodware.</p>
      <p>
        Table 1 exhibits the correlation of our
proposed technique with the current research
and work. The precision evaluation appeared
by Pajouh et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], Darabian et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and
Khammas B.M. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] are contrasted and
proposed strategy. Nonetheless, their
procedures need extra time because of the
dismantle cycle which isn't reasonable to
encounter the clients necessities of IoT
organization, while the proposed method kill
this extra preparing in light of the fact that the
highlights are extricated straightforwardly
from crude parallel document. In addition,
their outcomes are not mirroring the genuine
precision because of little dataset that they
utilized.
d
o
h
t
e
      </p>
      <p>M
ML
ML
ML
+
DS
e
r
) a
/G dw
(M oo</p>
      <p>G
tsae r/ae
t
a
D law</p>
      <p>M</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>The majority of the security issues are
perplexing and the arrangements can't be
distinct. For example, in the event of privacy
and security difficulties, like, intrusion or DoS,
there is a likelihood of false-positives which
will deliver the answers for be inadequate
contrary to those attacks. Moreover, that will
likewise diminish the customer trust and
accordingly debasing the viability of IoT
framework.</p>
      <p>Subsequently, an all-encompassing
privacy and security methodology for IoT has
been developed from the current security
arrangements as machine learning enabled
data science malware detection approach that
is evolutionary, robust, intelligent, and
scalable mechanism to address malware
detection in IoT.</p>
      <p>These days, gadgets interfacing with the
internet are broadly spread in everywhere on
the world. In this paper, we inspected the
capability of utilizing a blend of machine
learning and data science to detect IoT
malware. The best outcomes accomplished
around 98.6% of accuracy utilizing machine
learning enabled data science approach. Future
exploration will extend the proposed way to
deal with look at the other machine learning
methods with data science tools for IoT
malware detection.</p>
    </sec>
    <sec id="sec-7">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>O.</given-names>
            <surname>Novo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Beijar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ocak</surname>
          </string-name>
          ,
          <string-name>
            <surname>―Capillary</surname>
          </string-name>
          Networks - Bridging
          <source>the Cellular and loT Worlds ,‖ IEEE World Forum on Internet of Things (WF-IoT)</source>
          , vol.
          <volume>1</volume>
          , pp.
          <fpage>571</fpage>
          -
          <lpage>578</lpage>
          ,
          <year>December 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <source>Internet of Things; Building Blocks and Business Modles</source>
          . Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A</given-names>
            .
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>W.</given-names>
            <surname>Shi</surname>
          </string-name>
          , ―
          <article-title>On security challenges and open issues in internet of things,‖ Future Generation Computer Systems</article-title>
          , vol.
          <volume>83</volume>
          , pp.
          <fpage>326</fpage>
          -
          <lpage>337</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Granjal</surname>
          </string-name>
          , E. Monteiro, and
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Silva</surname>
          </string-name>
          ,
          <article-title>―Security for the internet of things: A survey of existing protocols</article-title>
          and open research issues,
          <source>‖ IEEE Communications Surveys Tutorials</source>
          , vol.
          <volume>17</volume>
          , pp.
          <fpage>1294</fpage>
          -
          <lpage>1312</lpage>
          , third quarter
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Vishu</given-names>
            <surname>Madaan</surname>
          </string-name>
          , Dimple Sethi, Prateek Agrawal, Leena Jain,
          <string-name>
            <given-names>Ranjit</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <article-title>―Public Network Security by Bluffing the Intruders Through Encryption Over Encryption Using Public Key Cryptography Method‖</article-title>
          ,
          <source>International Conference on Advanced Informatics for Computing Research (ICAICR'17)</source>
          , pp.
          <fpage>249</fpage>
          -
          <lpage>257</lpage>
          , Springer, Mar
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Cyber hackers can now harm human life through smart meters-smart grid awareness</article-title>
          . https://smartgridawareness.org/
          <year>2014</year>
          /12/3 0/hackers-can
          <article-title>-now-harm-human-life/</article-title>
          . (Accessed on 02/06/
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>[7] Securing the internet of things: A proposed framework - cisco</article-title>
          . https://www.cisco.com/c/en/us/about/sec urity-center/secure-iot-proposedframework.
          <source>html. (Accessed on 08/07/</source>
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Liang</given-names>
            <surname>Xiao</surname>
          </string-name>
          , Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, and Di Wu.
          <article-title>IoT security techniques based on machine learning</article-title>
          .
          <source>arXiv preprintarXiv:1801.06275</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Eirini</given-names>
            <surname>Anthi</surname>
          </string-name>
          , Shazaib Ahmad, Omer Rana, George Theodorakopoulos, and
          <string-name>
            <given-names>Pete</given-names>
            <surname>Burnap</surname>
          </string-name>
          .
          <article-title>Eclipseiot: A secure and adaptive hub for the internet of things</article-title>
          .
          <source>Computers &amp; Security</source>
          ,
          <volume>78</volume>
          :
          <fpage>477</fpage>
          -
          <lpage>490</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>I.</given-names>
            <surname>Santos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. K.</given-names>
            <surname>Penya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Devesa</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P. G.</given-names>
            <surname>Garcia</surname>
          </string-name>
          ,
          <article-title>―N-grams-based file signatures for malware detection</article-title>
          ,‖
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>K.</given-names>
            <surname>Rieck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Holz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Willems</surname>
          </string-name>
          , P. D¨ussel, and
          <string-name>
            <given-names>P.</given-names>
            <surname>Laskov</surname>
          </string-name>
          ,
          <article-title>―Learning and classification of malware behavior,‖</article-title>
          <source>in DIMVA '08: Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment. SpringerVerlag</source>
          , pp.
          <fpage>108</fpage>
          -
          <lpage>125</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Konstantinou</surname>
          </string-name>
          ,
          <article-title>―Metamorphic virus: Analysis and detection</article-title>
          ,‖
          <source>Technical Report RHUL-MA-2008-2, M.Sc. thesis</source>
          , 93 pages,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P. K.</given-names>
            <surname>Chan</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Lippmann</surname>
          </string-name>
          ,
          <article-title>―Machine learning for computer security</article-title>
          ,
          <source>‖ Journal of Machine Learning Research</source>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>2669</fpage>
          -
          <lpage>2672</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J. Z.</given-names>
            <surname>Kolter</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Maloof</surname>
          </string-name>
          ,
          <article-title>―Learning to detect and classify malicious executables in the wild</article-title>
          ,
          <source>‖ Journal of Machine Learning Research</source>
          , vol.
          <volume>7</volume>
          , pp.
          <fpage>2721</fpage>
          -
          <lpage>2744</lpage>
          ,
          <year>December 2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Chouchane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Walenstein</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Lakhotia</surname>
          </string-name>
          ,
          <article-title>―Using Markov Chains to filter machine-morphed variants of malicious programs</article-title>
          ,
          <source>‖ in Malicious and Unwanted Software</source>
          ,
          <year>2008</year>
          .
          <source>MALWARE</source>
          <year>2008</year>
          . 3rd International Conference, pp.
          <fpage>77</fpage>
          -
          <lpage>84</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Stamp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Attaluri</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>McGhee</surname>
          </string-name>
          ,
          <article-title>―Profile hidden markov models and metamorphic virus detection</article-title>
          ,
          <source>‖ Journal in Computer Virology</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>I.</given-names>
            <surname>Yoo</surname>
          </string-name>
          ,
          <article-title>―Visualizing Windows executable viruses using self-organizing maps</article-title>
          ,‖ in VizSEC/DMSEC '04:
          <article-title>Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security</article-title>
          . New York, NY, USA: ACM, pp.
          <fpage>82</fpage>
          -
          <lpage>89</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Haddad</given-names>
            <surname>Pajouh</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          , et al.,
          <article-title>A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting</article-title>
          .
          <source>Future Generation Computer Systems</source>
          <volume>85</volume>
          : p.
          <fpage>88</fpage>
          -
          <lpage>96</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Darabian</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , et al.,
          <article-title>An opcode- based technique for polymorphic Internet of Things malware detection</article-title>
          .
          <source>Concurrency and Computation: Practice and Experience</source>
          : p.
          <fpage>e5173</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Ban</given-names>
            <surname>Mohammed Khammas</surname>
          </string-name>
          ,
          <article-title>―The Performance of IoT Malware Detection Technique Using Feature Selection and Feature Reduction in Fog Layer‖ IOP Conf</article-title>
          .
          <source>Series: Materials Science and Engineering</source>
          <volume>928</volume>
          ,
          <issue>022047</issue>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>