“…We have categorized malware detection existing methods for IoT devices [ 12 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 ] into two methods based on machine learning and deep learning. Researchers [ 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 ] have proposed a variety of machine learning intrusion detection methods. Table 1 critically evaluates the existing machine learning methods.…”