{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:08:28Z","timestamp":1775153308324,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1109\/tii.2022.3205366","type":"journal-article","created":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T20:59:44Z","timestamp":1669237184000},"page":"1495-1503","source":"Crossref","is-referenced-by-count":55,"title":["A Multilayer Deep Learning Approach for Malware Classification in 5G-Enabled IIoT"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7751-286X","authenticated-orcid":false,"given":"Imran","family":"Ahmed","sequence":"first","affiliation":[{"name":"School of Computing and Information Science, Anglia Ruskin University Cambridge, Cambridge, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5438-9467","authenticated-orcid":false,"given":"Marco","family":"Anisetti","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Universit&#x00E1; degli Studi di Milano, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5483-2732","authenticated-orcid":false,"given":"Awais","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Faculty of Computing and Artificial Intelligence, Air University, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0651-4278","authenticated-orcid":false,"given":"Gwanggil","family":"Jeon","sequence":"additional","affiliation":[{"name":"Department of Embedded Systems Engineering, Incheon National University, Incheon, Korea"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2822680"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3050391"},{"key":"ref11","first-page":"46","article-title":"Trustworthy IoT: An evidence collection approach based on smart contracts","author":"ardagna","year":"0","journal-title":"Proc IEEE SCC"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90428-9_4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS53863.2021.00068"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES55459.2022.00025"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917135"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2633228"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907965"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.064"},{"key":"ref28","first-page":"3756","article-title":"A cross-platform malware variant classification based on image representation","volume":"13","author":"naeem","year":"2019","journal-title":"KSII Trans on Internet and Inf Syst (TIIS)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3603739"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMAI.2017.8073489"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-021-01103-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s20030828"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3115697"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/JMTM-09-2019-0346"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s20195480"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107489"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107226"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2957029"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329847"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2990499"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329857"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928564"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800287"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9989328\/09882315.pdf?arnumber=9882315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:21:13Z","timestamp":1673896873000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9882315\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":31,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tii.2022.3205366","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2]]}}}