Ministry of Education - Saudi Arabia Logo

A Systematic Literature Review and Quality Analysis of Javascript Malware Detection

  • College of Computer and Information Systems

Umm Al Qura University

Research output : Contribution to journal › Review article › peer-review

Context: JavaScript (JS) is an often-used programming language by millions of web pages and is also affected by thousands of malicious attacks. Objective: In this investigation, we provided a general view and a quick understanding of JavaScript Malware Detection (JSMD) research reported in the scientific literature from several perspectives. Method: We performed a Systematic Literature Review (SLR) and quality analysis of published research articles on the topic. We investigated 32 articles published between the year 2009 to the year 2019. Results: Selected 32 papers explained in this article refiect the outline of what was published so far. One of our key findings is the performance of Machine Learning (ML) based detection models were relatively higher than others. We also found that only a few papers were able to achieve high scores according to the quality assessment criteria. Conclusion: In this SLR, we summarized and synthesized the existing JSMD studies to identify the previous research practices and also to shed light on future guidelines in the malware detection space. This study will guide and help future researchers to investigate the previous literature efficiently and effectively.

Original languageEnglish
Pages (from-to)190539-190552
Number of pages14
Journal
Volume8
DOIs
StatePublished - 2020
  • Cybersecurity
  • Javascript attacks
  • Javascript malware detection
  • Malicious code detection
  • Systematic literature review

Access to Document

  • https://doi.org/10.1109/ACCESS.2020.3031690

Other files and links

  • Link to publication in Scopus

Fingerprint

  • Malware Engineering & Materials Science 100%
  • Computer programming languages Engineering & Materials Science 27%
  • Websites Engineering & Materials Science 26%
  • Machine learning Engineering & Materials Science 22%

T1 - A Systematic Literature Review and Quality Analysis of Javascript Malware Detection

AU - Sohan, Md Fahimuzzman

AU - Basalamah, Anas

N1 - Publisher Copyright: © 2020 Institute of Electrical and Electronics Engineers Inc.. All rights reserved.

N2 - Context: JavaScript (JS) is an often-used programming language by millions of web pages and is also affected by thousands of malicious attacks. Objective: In this investigation, we provided a general view and a quick understanding of JavaScript Malware Detection (JSMD) research reported in the scientific literature from several perspectives. Method: We performed a Systematic Literature Review (SLR) and quality analysis of published research articles on the topic. We investigated 32 articles published between the year 2009 to the year 2019. Results: Selected 32 papers explained in this article refiect the outline of what was published so far. One of our key findings is the performance of Machine Learning (ML) based detection models were relatively higher than others. We also found that only a few papers were able to achieve high scores according to the quality assessment criteria. Conclusion: In this SLR, we summarized and synthesized the existing JSMD studies to identify the previous research practices and also to shed light on future guidelines in the malware detection space. This study will guide and help future researchers to investigate the previous literature efficiently and effectively.

AB - Context: JavaScript (JS) is an often-used programming language by millions of web pages and is also affected by thousands of malicious attacks. Objective: In this investigation, we provided a general view and a quick understanding of JavaScript Malware Detection (JSMD) research reported in the scientific literature from several perspectives. Method: We performed a Systematic Literature Review (SLR) and quality analysis of published research articles on the topic. We investigated 32 articles published between the year 2009 to the year 2019. Results: Selected 32 papers explained in this article refiect the outline of what was published so far. One of our key findings is the performance of Machine Learning (ML) based detection models were relatively higher than others. We also found that only a few papers were able to achieve high scores according to the quality assessment criteria. Conclusion: In this SLR, we summarized and synthesized the existing JSMD studies to identify the previous research practices and also to shed light on future guidelines in the malware detection space. This study will guide and help future researchers to investigate the previous literature efficiently and effectively.

KW - Cybersecurity

KW - Javascript attacks

KW - Javascript malware detection

KW - Malicious code detection

KW - Systematic literature review

UR - http://www.scopus.com/inward/record.url?scp=85102811264&partnerID=8YFLogxK

U2 - https://doi.org/10.1109/ACCESS.2020.3031690

DO - https://doi.org/10.1109/ACCESS.2020.3031690

M3 - Review article

SN - 2169-3536

SP - 190539

EP - 190552

JO - IEEE Access

JF - IEEE Access

Android Malware Detection: A Literature Review

  • Conference paper
  • First Online: 16 February 2023
  • Cite this conference paper

a systematic literature review and quality analysis of javascript malware detection

  • Ahmed Sabbah   ORCID: orcid.org/0000-0001-5034-8038 9 ,
  • Adel Taweel   ORCID: orcid.org/0000-0003-0240-9857 9 &
  • Samer Zein   ORCID: orcid.org/0000-0003-3720-4384 9  

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1768))

Included in the following conference series:

  • International Conference on Ubiquitous Security

763 Accesses

1 Citations

Mobile applications are increasingly being used to support critical domains such as health, logistics, and banking, to name a few. These mobile apps, hence, became a target for malware attackers. Android is an open-source operating system, which runs apps that can be downloaded from official or third-party app stores. Malware exploits these applications to penetrate mobile devices in different ways for different purposes. To address this, different approaches for malware analysis have been proposed for the detection of malware, ranging from pre-installation to post-installation. This paper presents a literature review of recent malware detection approaches and methods. 21 prominent studies, that report three most common approaches, are identified and reviewed. Challenges, limitations, and research directions are identified and discussed. Findings show most studies focus on malware classification and detection, but lack studies that investigate securing apps and detecting vulnerabilities that malware exploits to stealth into mobile apps and devices. They also show that most studies focused on enhancing machine learning models rather than the malware analysis process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

A threat analysis of sideloading. https://www.apple.com/privacy/docs/Building_a_Trusted_Ecosystem_for_Millions_of_Apps_A_Threat_Analysis_of_Sideloading.pdf . (Accessed 28 August 2022)

Alzubaidi, A.: Recent advances in android mobile malware detection: A systematic literature review. IEEE Access 9 (2021). https://ieeexplore.ieee.org/document/9585476/ , https://ieeexplore.ieee.org/stamp/stamp.jsp?tp= &arnumber=9585476

Android vs. ios security comparison (2022). https://www.kaspersky.com/resource-center/threats/android-vs-iphone-mobile-security . (Accessed 28 August 2022)

Arora, A., Peddoju, S.K., Conti, M.: Permpair: Android malware detection using permission pairs. IEEE Trans. Inf. Forensics Sec. 15 , 1968–1982 (2019)

Google Scholar  

Bai, H., Liu, G., Liu, W., Quan, Y., Huang, S.: N-gram, semantic-based neural network for mobile malware network traffic detection. Sec. Commun. Netw. 2021 (2021)

Bhatia,T., Kaushal, R.: Malware detection in android based on dynamic analysis. In: 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), pp. 1–6. IEEE (2017)

Cai, H., Meng, N., Ryder, B., Yao, D.: Droidcat: Effective android malware detection and categorization via app-level profiling. IEEE Trans. Inf. Forensics Secur. 14 (6), 1455–1470 (2018)

Chen, Y.-C., Chen, H.-Y., Takahashi, T., Sun, B., Lin, T.-N.: Impact of code deobfuscation and feature interaction in android malware detection. IEEE Access 9 , 123208–123219 (2021)

Feng, P., Ma, J., Sun, C., Xinpeng, X., Ma, Y.: A novel dynamic android malware detection system with ensemble learning. IEEE Access 6 , 30996–31011 (2018)

Garg, S., Peddoju, S.K., Sarje, A.K.: Network-based detection of android malicious apps. Int. J. Inf. Sec. 16 (4), 385–400 (2017)

Guerra-Manzanares, A., Bahsi, H., Nõmm, S.: Kronodroid: Time-based hybrid-featured dataset for effective android malware detection and characterization. Comput. Sec. 110 (2021)

Hadiprakoso, R.B., Kabetta, H., Buana, I.K.S.: Hybrid-based malware analysis for effective and efficiency android malware detection. In: 2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), pp. 8–12. IEEE (2020)

Ilham, S., Abderrahim, G., Abdelhakim, B.A.: Permission based malware detection in android devices. In: Proceedings of the 3rd International Conference on Smart City Applications, pp. 1–6(2018)

Kambar, M.E.Z.N., Esmaeilzadeh, A., Kim, Y., Taghva, K.: A survey on mobile malware detection methods using machine learning. IEEE (2022). https://ieeexplore.ieee.org/document/9720753/

Karbab, E.B., Debbabi, M., Derhab, A., Mouheb, D.: Data-driven fingerprinting and threat intelligence. In: Springer, Android Malware Detection Using Machine Learning (2021)

Karbab, E.B., Debbabi, M., Derhab, A., Mouheb, D.: Maldozer: Automatic framework for android malware detection using deep learning. Digital Investigation 24 , S48–S59 (2018)

Kato, H., Sasaki, T., Sasase, I.: Android malware detection based on composition ratio of permission pairs. IEEE Access 9 , 130006–130019 (2021)

Kim, Y.-k., Lee, J.J., Go, M.-H., Kang, H.-Y., Lee, K.: A systematic overview of the machine learning methods for mobile malware detection. In: Security and Communication Networks, vol. 2022 (2022)

Li, W., Cai, J., Wang, Z., Cheng, S.: A robust malware detection approach for android system based on ensemble learning. In Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B., (eds.) Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers, volume 1557. CCIS, pages 309–321. Springer (2022). https://doi.org/10.1007/978-981-19-0468-4_23

McLaughlin, N., et al.: Deep android malware detection. In: Proceedings of the seventh ACM on Conference On Data And Application Security And Privacy, pp. 301–308 (2017)

Meijin, L., et al.: A systematic overview of android malware detection. Appl. Artif. Intell. 36 (1), 2007327 (2022)

Millar, S., McLaughlin, N., del Rincon, J.M., Miller, P.: Multi-view deep learning for zero-day android malware detection. J. Inf. Sec. Appli. 58 (2021)

Mobile malware statistics for q1 2022 | securelist. https://securelist.com/it-threat-evolution-in-q1-2022-mobile-statistics/106589/ . (Accessed 28 June 2022)

Mobile operating system market share worldwide | statcounter global stats. https://gs.statcounter.com/os-market-share/mobile/worldwide . (Accessed 28 June 2022)

Arif, J.M., et al.: Android mobile malware detection using fuzzy ahp. J. Inf. Sec. Appli. 61 (2021)

Muttoo, S.K., Badhani, S.: Android malware detection: state of the art. Int. J. Inf. Technol. 9 (1), 111–117 (2017). https://doi.org/10.1007/s41870-017-0010-2

Article   Google Scholar  

Muzaffar, A., Hassen, H.R., Lones, M.A., Zantout, H.: An in-depth review of machine learning based android malware detection. Comput. Sec. 102833 (2022)

Ngamwitroj, S., Limthanmaphon, B.: Adaptive android malware signature detection. In: Proceedings of the 2018 International Conference on Communication Engineering and Technology, pp. 22–25 (2018)

Qiu, J., Zhang, J., Luo,W., Pan, L., Nepal, S., Xiang, Y.: A survey of android malware detection with deep neural models. ACM Comput. Surv. 53 , 1–36 (2021–11). ISSN 0360–0300. https://doi.org/10.1145/3417978 , https://dl.acm.org/doi/10.1145/3417978 , https://sci-hub.se/10.1145/3417978

Rani, S.S., Eric, P.V., Sahithya, P., Priyadharshini, S., Ramyashree, S.: Pro-shield protect: Survey paper for malware detection in android application. IEEE (2022). https://ieeexplore.ieee.org/document/9743038/

Razgallah, A., Khoury, R., Hallé, S., Khanmohammadi, K.: A survey of malware detection in android apps: Recommendations and perspectives for future research. Comput. Sci. Rev. 39 (2021–02). ISSN 15740137. https://doi.org/10.1016/J.COSREV.2020.100358

Sihag, V., Swami, A., Vardhan, M., Singh, P.: Signature based malicious behavior detection in android. In: International Conference on Computing Science, Communication and Security, pp. 251–262. Springer (2020). https://doi.org/10.1007/978-981-15-6648-6_20

Heena Kauser, S.k., Maria Anu, V.: A literature review on android mobile malware detection using machine learning techniques. IEEE (2022). https://ieeexplore.ieee.org/document/9753746/

Somarriba, O., Zurutuza, U.: A collaborative framework for android malware detection using dns & dynamic analysis. In: 2017 IEEE 37th Central America and Panama Convention (CONCAPAN XXXVII), pp 1–6. IEEE (2017)

Tidke, S.K., Karde, P.P., Thakare, V.: Detection and prevention of android malware thru permission analysis. In: 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 1–6. IEEE (2018)

Ünver, H.M., Bakour, K.: Android malware detection based on image-based features and machine learning techniques. SN Appli. Sci. 2 (7), 1–15 (2020). https://doi.org/10.1007/s42452-020-3132-2

Urooj, B., Shah, M.A., Maple, C., Abbasi, M.K., Riasat, S.: Malware detection: A framework for reverse engineered android applications through machine learning algorithms. IEEE Access (2022). https://ieeexplore.ieee.org/document/9703375/

Wang, H., Zhang, W., He, H.: You are what the permissions told me! android malware detection based on hybrid tactics. J. Inf. Sec. Appli. 66 (2022)

Wang, S., Yan, Q., Chen, Z., Yang, B., Zhao, C., Conti, M.: Detecting android malware leveraging text semantics of network flows. IEEE Trans. Inf. Forensics Secur. 13 (5), 1096–1109 (2017)

Wu, Q., Zhu, X., Liu, B.: A survey of android malware static detection technology based on machine learning. Mobile Inf. Syst. 2021 (2021)

Xing, X., et al.: A Malware Detection Approach Using Autoencoder in Deep Learning". In: IEEE Access 10 (2022). https://ieeexplore.ieee.org/document/9723074/ , https://ieeexplore.ieee.org/stamp/stamp.jsp?tp= &arnumber=9723074

Yadav, P., Menon, N., Ravi, V., Vishvanathan, S., Pham, T.D.: Efficientnet convolutional neural networks-based android malware detection. Comput. Sec. 115 (2022)

Zhang, H., Luo, S., Zhang, Y., Pan, L.: An efficient android malware detection system based on method-level behavioral semantic analysis. IEEE Access 7 , 69246–69256 (2019)

Zhang, N., Xue, J., Ma, Y., Zhang, R., Liang, T., Tan, Y.: Hybrid sequence-based android malware detection using natural language processing. Int. J. Intell. Syst. 36 (10), 5770–5784 (2021)

Download references

Author information

Authors and affiliations.

Department of Computer Science, Birzeit University, Birzeit, Palestine

Ahmed Sabbah, Adel Taweel & Samer Zein

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Ahmed Sabbah .

Editor information

Editors and affiliations.

Guangzhou University, Guangzhou, China

Guojun Wang

University of Texas at San Antonio, San Antonio, TX, USA

Kim-Kwang Raymond Choo

Temple University, Philadelphia, PA, USA

Khalifa University of Science and Technology, Abu Dhabi, United Arab Emirates

Ernesto Damiani

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper.

Sabbah, A., Taweel, A., Zein, S. (2023). Android Malware Detection: A Literature Review. In: Wang, G., Choo, KK.R., Wu, J., Damiani, E. (eds) Ubiquitous Security. UbiSec 2022. Communications in Computer and Information Science, vol 1768. Springer, Singapore. https://doi.org/10.1007/978-981-99-0272-9_18

Download citation

DOI : https://doi.org/10.1007/978-981-99-0272-9_18

Published : 16 February 2023

Publisher Name : Springer, Singapore

Print ISBN : 978-981-99-0271-2

Online ISBN : 978-981-99-0272-9

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research
  • DOI: 10.1109/ACCESS.2020.3031690
  • Corpus ID: 226230804

A Systematic Literature Review and Quality Analysis of Javascript Malware Detection

  • Md. Fahimuzzman Sohan , Anas Basalamah

Published in IEEE Access 2020

  • Computer Science

Figures and Tables from this paper

figure 1

9 Citations

Software risk prediction: systematic literature review on machine learning techniques, digital transformation and cybersecurity challenges, covid-19 detection using machine learning: a large scale assessment of x-ray and ct image datasets, machine learning for software engineering: a tertiary study, a systematic review on federated learning in medical image analysis.

  • Highly Influenced

Malware Static Analysis on Microsoft Macro Attack

Requirement dependency extraction based on improved stacking ensemble machine learning, iot-based solutions to monitor water level, leakage, and motor control for smart water tanks, role of behavioural factors in cyber threat intelligence, 59 references, static analysis of android apps: a systematic literature review, detection and classification of malicious javascript via attack behavior modelling, jspre: a large-scale detection of malicious javascript code based on pre-filter, pdf scrutinizer: detecting javascript-based attacks in pdf documents, a state-of-the-art survey of malware detection approaches using data mining techniques, a practical guide for detecting the java script-based malware using hidden markov models and linear classifiers, a machine learning approach to malicious javascript detection using fixed length vector representation, malicious javascript code detection based on hybrid analysis, detecting malicious javascript in pdf through document instrumentation, detecting obfuscated javascript malware using sequences of internal function calls, related papers.

Showing 1 through 3 of 0 Related Papers

a systematic literature review and quality analysis of javascript malware detection

Md. Fahimuzzman Sohan Anas Basalamah

ACM Digital Library home

  • Advanced Search

A systematic literature review on Windows malware detection: Techniques, research issues, and future directions

Department of Computer Science and Information Technology, La Trobe University, Melbourne, VIC, Australia

New Citation Alert added!

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

  • Publisher Site

Journal of Systems and Software

ACM Digital Library

The aim of this systematic literature review (SLR) is to provide a comprehensive overview of the current state of Windows malware detection techniques, research issues, and future directions. The SLR was conducted by analyzing scientific literature on Windows malware detection based on executable files (.EXE file format) published between 2009 and 2022. The study presents new insights into the categorization of malware detection techniques based on datasets, features, machine learning and deep learning algorithms. It identifies ten experimental biases that could impact the performance of malware detection techniques. We provide insights on performance evaluation metrics and discuss several research issues that impede the effectiveness of existing techniques. The study also provides recommendations for future research directions and is a valuable resource for researchers and practitioners working in the field of Windows malware detection.

Types of malware detection techniques and their deployment methods are presented.

We present existing public benchmark datasets and their limitations.

Deep learning and machine learning algorithms for malware detection are identified.

We present eighteen performance metrics for evaluating malware detection models.

We identified ten experimental biases from the existing works on malware detection.

Index Terms

Computing methodologies

  • Machine learning

Security and privacy

Intrusion/anomaly detection and malware mitigation

Malware and its mitigation

Systems security

Operating systems security

Social and professional topics

Computing / technology policy

Computer crime

Software and its engineering

Recommendations

A study on malicious software behaviour analysis and detection techniques: taxonomy, current trends and challenges.

There has been an increasing trend of malware release, which raises the alarm for security professionals worldwide. It is often challenging to stay on top of different types of malware and their detection techniques, which are ...

  • Malicious software behaviour analysis.
  • Machine learning and deep learning ...

A comprehensive survey on deep learning based malware detection techniques

Recent theoretical and practical studies have revealed that malware is one of the most harmful threats to the digital world. Malware mitigation techniques have evolved over the years to ensure security. Earlier, several classical ...

Malware detection using adaptive data compression

A popular approach in current commercial anti-malware software detects malicious programs by searching in the code of programs for scan strings that are byte sequences indicative of malicious code. The scan strings, also known as the signatures of ...

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

  • Information
  • Contributors

Published in

The Author(s)

In-Cooperation

Elsevier Science Inc.

United States

Publication History

  • Published: 14 March 2024

Author Tags

  • Malware analysis
  • Malware detection
  • Malware dataset
  • Windows malware
  • Deep learning
  • research-article

Funding Sources

Other metrics.

  • Bibliometrics
  • Citations 0

Article Metrics

  • 0 Total Citations View Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

This publication has not been cited yet

Digital Edition

View this article in digital edition.

Share this Publication link

https://dl.acm.org/doi/10.1016/j.jss.2023.111921

Share on Social Media

  • 0 References

Export Citations

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

electricity-logo

Article Menu

a systematic literature review and quality analysis of javascript malware detection

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Electricity theft detection and prevention using technology-based models: a systematic literature review.

a systematic literature review and quality analysis of javascript malware detection

1. Introduction

2. literature review, 2.1. the impact of electricity theft on society, 2.2. electricity theft prevention solutions, 3. methodology, 3.1. search for empirical studies, 3.2. quality assessment of articles, 3.3. data extraction and synthesis of results, 4. results and discussion, 4.1. existence of empirical studies to address electricity-related problems, 4.2. the effectiveness of the existing solutions in addressing electricity-related problems, 4.2.1. classification models, 4.2.2. classification with clustering models, 4.2.3. regression models, 5. conclusions, author contributions, data availability statement, conflicts of interest.

  • Arkorful, V.E. Unravelling Electricity Theft Whistleblowing Antecedents Using the Theory of Planned Behavior and Norm Activation Model. Energy Policy 2022 , 160 , 112680. [ Google Scholar ] [ CrossRef ]
  • Mujuzi, J. Electricity Theft in South Africa: Examining the Need to Clarify the Offence and Pursue Private Prosecution? Obiter 2020 , 40 , 78–87. [ Google Scholar ] [ CrossRef ]
  • Yurtseven, Ç. The Causes of Electricity Theft: An Econometric Analysis of the Case of Turkey. Util. Policy 2015 , 37 , 70–78. [ Google Scholar ] [ CrossRef ]
  • Shahid, M.B.; Shahid, M.O.; Tariq, H.; Saleem, S. Design and Development of an Efficient Power Theft Detection and Prevention System through Consumer Load Profiling. In Proceedings of the 2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), Swat, Pakistan, 24–25 July 2019; pp. 1–6. [ Google Scholar ]
  • Savian, F.d.S.; Siluk, J.C.M.; Garlet, T.B.; do Nascimento, F.M.; Pinheiro, J.R.; Vale, Z. Non-Technical Losses: A Systematic Contemporary Article Review. Renew. Sustain. Energy Rev. 2021 , 147 , 111205. [ Google Scholar ] [ CrossRef ]
  • Chetty, V.G. The Combating of Unauthorised Electrical Connections in Kwazulu-Natal, South Africa ; Magister Technologiae, University of South Africa: Pretoria, South Africa, 2018. [ Google Scholar ]
  • Adongo, C.A.; Taale, F.; Bukari, S.; Suleman, S.; Amadu, I. Electricity Theft Whistleblowing Feasibility in Commercial Accommodation Facilities. Energy Policy 2021 , 155 , 112347. [ Google Scholar ] [ CrossRef ]
  • Yan, Z.; Wen, H. Electricity Theft Detection Base on Extreme Gradient Boosting in AMI. IEEE Trans. Instrum. Meas. 2021 , 70 , 2504909. [ Google Scholar ] [ CrossRef ]
  • Tanwar, S.; Kumari, A.; Vekaria, D.; Raboaca, M.S.; Alqahtani, F.; Tolba, A.; Neagu, B.-C.; Sharma, R. GrAb: A Deep Learning-Based Data-Driven Analytics Scheme for Energy Theft Detection. Sensors 2022 , 22 , 4048. [ Google Scholar ] [ CrossRef ]
  • Zheng, K.; Chen, Q.; Wang, Y.; Kang, C.; Xia, Q. A Novel Combined Data-Driven Approach for Electricity Theft Detection. IEEE Trans. Ind. Inform. 2019 , 15 , 1809–1819. [ Google Scholar ] [ CrossRef ]
  • Ballal, M.S.; Suryawanshi, H.; Mishra, M.K.; Jaiswal, G. Online Electricity Theft Detection and Prevention Scheme for Smart Cities. IET Smart Cities 2020 , 2 , 155–164. [ Google Scholar ] [ CrossRef ]
  • Mohanty, S.; Iqbal, M.; Thampi, P. Controlling and Monitoring of Power Theft Using Internet of Things. In Proceedings of the 2021 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C), Bangalore, India, 11–12 June 2021. [ Google Scholar ] [ CrossRef ]
  • Leninpugalhanthi, P.; Janani, R.; Nidheesh, S.; Mamtha, R.V.; Keerthana, I.; Kumar, R.S. Power Theft Identification System Using Iot. In Proceedings of the 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India, 15–16 March 2019. [ Google Scholar ]
  • Munn, Z.; Peters, M.D.J.; Stern, C.; Tufanaru, C.; McArthur, A.; Aromataris, E. Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach. BMC Med. Res. Methodol. 2018 , 18 , 143. [ Google Scholar ] [ CrossRef ]
  • Khonjelwayo, B.; Nthakheni, T. Determining the causes of electricity losses and the role of management in curbing them: A case study of City of Tshwane Metropolitan Municipality, South Africa. J. Energy S. Afr. 2021 , 32 , 45–57. [ Google Scholar ] [ CrossRef ]
  • Jawale, P.; Jain, A.; Deokate, S.; Kapse, A. Iot Based Smart Energy Meter Monitoring with Identification of Electricity Theft. In Proceedings of the 3rd International Conference on Communication & Information Processing (ICCIP) 2021, Haldia, India, 25 May 2021. [ Google Scholar ]
  • Bhalshankar, S.; Thorat, C. Direct Hooking Electric Theft: Silicone Rubber Piping over Bear Overhead Electric Conductors Technical Enforcement Mechanisms. Int. J. Sci. Res. 2018 , 7 , 739–740. [ Google Scholar ]
  • Chandel, P.; Thakur, T.; Sawale, B.A. Energy Meter Tampering: Major Cause of Non-Technical Losses in Indian Distribution Sector. In Proceedings of the International Conference on Electrical Power and Energy Systems (ICEPES), Bhopal, India, 14–16 December 2016; pp. 368–371. [ Google Scholar ]
  • Afridi, A.; Wahab, A.; Khan, S.; Ullah, W.; Khan, S.; Islam, S.Z.U.; Hussain, K. An Efficient and Improved Model for Power Theft Detection in Pakistan. Bull. Electr. Eng. Inform. 2021 , 10 , 1828–1837. [ Google Scholar ] [ CrossRef ]
  • Gehringer, C.; Rode, H.; Schomaker, M. The Effect of Electrical Load Shedding on Pediatric Hospital Admissions in South Africa. Epidemiol. Author Manuscr. 2018 , 29 , 841–847. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Khwela, H. An Exploratory Study on Electricity Theft in Staram Informal Settlement in Tongaat in Durban, KwaZulu-Natal Province. Ph.D. Thesis, University of Kwazulu-natal, Durban, South Africa, 2019. [ Google Scholar ]
  • Saini, S. Social and Behavioral Aspects of Electricity Theft—An Explorative Review. Int. J. Res. Econ. Soc. Sci. 2017 , 7 , 26–37. [ Google Scholar ]
  • Depuru, S.S.S.R.; Wang, L.; Devabhaktuni, V. Electricity Theft: Overview, Issues, Prevention and a Smart Meter Based Approach to Control Theft. Energy Policy 2011 , 39 , 1007–1015. [ Google Scholar ] [ CrossRef ]
  • Yakubu, O.; Babu, C.N.; Adjei, O. Electricity Theft: Analysis of the Underlying Contributory Factors in Ghana. Energy Policy 2018 , 123 , 611–618. [ Google Scholar ] [ CrossRef ]
  • Althobaiti, A.; Jindal, A.; Marnerides, A.K.; Roedig, U. Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods. IEEE Access 2021 , 9 , 159291–159312. [ Google Scholar ] [ CrossRef ]
  • Mutebi, R.; Otim, J.; Sebitosi, A. Towards a Persuasive Technology for Electricity Theft Reduction in Uganda. In Proceedings of the eInfrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, 11–12 December 2017. [ Google Scholar ] [ CrossRef ]
  • Landie, C. Power up against Electricity Theft. Inst. Munic. Eng. S. Afr. 2011 , 36 , 63. [ Google Scholar ]
  • Shokoya, O.; Raji, A. Electricity Theft: A Reason to Deploy Smart Grid in South Africa. In Proceedings of the 2019 International Conference on the Domestic Use of Energy (DUE), Wellington, South Africa, 25–27 March 2019. [ Google Scholar ]
  • IOL. Cape Izinyoka-Nyoka Cost Eskom Millions. Available online: https://www.iol.co.za/capetimes/news/cape-izinyoka-nyoka-cost-eskom-millions-73538605-296d-47cc-8f8c-381119b68cb4 (accessed on 14 June 2023).
  • Mbanjwa, T. An Analysis of Electricity Theft: The Case Study of Kwaximba in Ethekwini, Kwazulu-Natal. Ph.D. Thesis, University of Kwazulu-Natali, Durban, South Africa, 2017. [ Google Scholar ]
  • Davidson, O.; Mwakasonda, S.A. Electricity Access for the Poor: A Study of South Africa and Zimbabwe. Energy Sustain. Dev. 2004 , 8 , 26–40. [ Google Scholar ] [ CrossRef ]
  • Okpoudhu, U.; Oniemola, P.K.; Wifa, E.L. The Dilemma of Electricity Pricing and Cost Recovery in Nigeria: Repositioning the Law to Balance the Interests of Investors and Consumers. Afr. Nazarene Univ. Law J. 2019 , 7 , 115–137. [ Google Scholar ]
  • Sahoo, S.; Nikovski, D.N.; Muso, T.; Tsuru, K. Electricity Theft Detection Using Smart Meter Data. In Proceedings of the 2015 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Montevideo, Uruguay, 5–7 October 2015. [ Google Scholar ]
  • Kumarana, K.; Ananthib, N.; Saranyac, G.; Priyadharshinid, S.; Thiviyabalae, T.; Vaishnavif, K. Power Theft Detection and Alert System Using Iot. Turk. J. Comput. Math. Educ. 2021 , 12 , 1135–1139. [ Google Scholar ]
  • Yakubu, O.; Babu, N. Electricity Consumption Forecasting Using Dft Decomposition Based Hybrid Arima-Dlstm Model. Indones. J. Electr. Eng. Comput. Sci. 2021 , 24 , 1107–1120. [ Google Scholar ] [ CrossRef ]
  • Munikoti, S.; Jhala, K.; Lai, K.; Natarajan, B. Analytical Voltage Sensitivity Analysis for Unbalanced Power Distribution System. In Proceedings of the 2020 IEEE Power & Energy Society General Meeting (PESGM), Montreal, QC, Canada, 2–6 August 2020; pp. 1–5. [ Google Scholar ]
  • Page, M.J.; Moher, D.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E. Prisma 2020 Explanation and Elaboration: Updated Guidance and Exemplars for Reporting Systematic Reviews. Bmj 2021 , 372 , n160. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Xiao, Y.; Watson, M. Guidance on Conducting a Systematic Literature Review. J. Plan. Educ. Res. 2019 , 31 , 93–112. [ Google Scholar ] [ CrossRef ]
  • Thyer, B. The Importance of Journal Articles. Oxf. Acad. 2008 , 1–12. [ Google Scholar ] [ CrossRef ]
  • Palmatier, R.W.; Houston, M.B.; Hulland, J. Review Articles: Purpose, Process, and Structure. J. Acad. Mark. Sci. 2018 , 46 , 1–5. [ Google Scholar ] [ CrossRef ]
  • Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering ; Keele University: Keele, UK, 2007; Volume 2. [ Google Scholar ]
  • Yao, D.; Wen, M.; Liang, X.; Fu, Z.; Zhang, K.; Yang, B. Energy Theft Detection with Energy Privacy Preservation in the Smart Grid. IEEE Internet Things J. 2018 , 6 , 7659–7669. [ Google Scholar ] [ CrossRef ]
  • Wisetsri, W.; Qamar, S.; Verma, G.; Verma, D.; Kakar, V.K.; Chansongpol, T.; Somtawinpongsai, C.; Tan, C.C. Electricity Theft Detection and Localization in Smart Grids for Industry 4.0. Intell. Autom. Soft Comput. 2022 , 33 , 1473–1483. [ Google Scholar ] [ CrossRef ]
  • Ballal, M.S. Online electrical energy theft detection and prevention scheme for direct hook-line activity. J. Inst. Eng. (India) Ser. B 2021 , 102 , 1007–1018. [ Google Scholar ] [ CrossRef ]
  • Xia, X.; Xiao, Y.; Liang, W.; Cui, J. Detection Methods in Smart Meters for Electricity Thefts: A Survey. Proc. IEEE 2022 , 110 , 273–319. [ Google Scholar ] [ CrossRef ]
  • Takiddin, A.; Ismail, M.; Zafar, U.; Serpedin, E. Robust electricity theft detection against data poisoning attacks in smart grids. IEEE Trans. Smart Grid 2020 , 12 , 2675–2684. [ Google Scholar ] [ CrossRef ]
  • Gupta, A.K.; Routray, A.; Naikan, V.A. Detection of power theft in low voltage distribution systems: A review from the Indian perspective. IETE J. Res. 2020 , 68 , 4180–4197. [ Google Scholar ] [ CrossRef ]
  • Glauner, P.; Meira, J.A.; Valtchev, P.; State, R.; Bettinger, F. The challenge of non-technical loss detection using artificial intelligence: A survey. Int. J. Comput. Intell. Syst. 2017 , 10 , 760–775. [ Google Scholar ] [ CrossRef ]
  • Dash, S.K.; Roccotelli, M.; Khansama, R.R.; Fanti, M.P.; Mangini, A.M. Long Term Household Electricity Demand Forecasting Based on RNN-GBRT Model and a Novel Energy Theft Detection Method. Appl. Sci. 2021 , 11 , 8612. [ Google Scholar ] [ CrossRef ]
  • Abdulaal, M.J.; Ibrahem, M.I.; Mahmoud, M.M.E.A.; Khalid, J.; Aljohani, A.J.; Milyani, A.H.; Abusorrah, A.M. Real-Time Detection of False Readings in Smart Grid Ami Using Deep and Ensemble Learning. IEEE Access 2022 , 10 , 47541–47556. [ Google Scholar ] [ CrossRef ]
  • Ahmed, M.; Khan, A.; Ahmed, M.; Tahir, M.; Jeon, G.; Fortino, G.; Piccialli, F. Energy theft detection in smart grids: Taxonomy, comparative analysis, challenges, and future research directions. IEEE/CAA J. Autom. Sin. 2022 , 9 , 578–600. [ Google Scholar ] [ CrossRef ]
  • Arif, A.; Alghamdi, T.A.; Khan, Z.A.; Javaid, N. Towards Efficient Energy Utilization Using Big Data Analytics in Smart Cities for Electricity Theft Detection. Big Data Res. 2022 , 27 , 100285. [ Google Scholar ] [ CrossRef ]
  • Ibrahim, N.M.; Al-Janabi, S.T.F.; Al-Khateeb, B. Electricity-Theft Detection in Smart Grids Based on Deep Learning. Bull. Electr. Eng. Inform. 2021 , 10 , 2285–2292. [ Google Scholar ] [ CrossRef ]
  • Jain, S.; Choksi, K.A.; Pindoriya, N.M. Rule-Based Classification of Energy Theft and Anomalies in Consumers Load Demand Profile. IET Smart Grid 2019 , 2 , 612–624. [ Google Scholar ] [ CrossRef ]
  • Javaid, N.; Jan, N.; Javed, M.U. An Adaptive Synthesis to Handle Imbalanced Big Data with Deep Siamese Network for Electricity Theft Detection in Smart Grids. J. Parallel Distrib. Comput. 2021 , 153 , 44–52. [ Google Scholar ] [ CrossRef ]
  • Lepolesa, L.J.; Achari, S.; Cheng, L. Electricity Theft Detection in Smart Grids Based on Deep Neural Network. IEEE Access 2022 , 10 , 39638–39655. [ Google Scholar ] [ CrossRef ]
  • Li, S.; Han, Y.; Yao, X.; Yingchen, S.; Wang, J.; Zhao, Q. Electricity Theft Detection in Power Grids with Deep Learning and Random Forests. J. Electr. Comput. Eng. 2019 , 2019 , 4136874. [ Google Scholar ] [ CrossRef ]
  • Micheli, G.; Soda, E.; Vespucci, M.T.; Gobbi, M.; Bertani, A. Big Data Analytics: An Aid to Detection of Non-Technical Losses in Power Utilities. Comput. Manag. Sci. 2019 , 16 , 329–343. [ Google Scholar ] [ CrossRef ]
  • Shaaban, M.; Tariq, U.; Ismail, M.; Almadani, N.; Ahmed, M. Data-Driven Detection of Electricity Theft Cyberattacks in Pv Generation. IEEE Syst. J. 2021 , 16 , 3349–3359. [ Google Scholar ] [ CrossRef ]
  • Ullah, A.; Javaid, N.; Yahaya, A.S.; Sultana, T.; Al-Zahrani, F.A.; Zaman, F. A Hybrid Deep Neural Network for Electricity Theft Detection Using Intelligent Antenna-Based Smart Meters. Wirel. Commun. Mob. Comput. 2021 , 2021 , 9933111. [ Google Scholar ] [ CrossRef ]
  • Zheng, Z.; Yang, Y.; Niu, X.; Dai, H.N.; Zhou, Y. Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids. IEEE Trans. Ind. Inform. 2018 , 14 , 1606–1615. [ Google Scholar ] [ CrossRef ]
  • Jindal, A.; Dua, A.; Kaur, K.; Singh, M.; Kumar, N.; Mishra, S. Decision tree and SVM-based data analytics for theft detection in smart grid. IEEE Trans. Ind. Inform. 2016 , 12 , 1005–1016. [ Google Scholar ] [ CrossRef ]
  • Otuoze, A.O.; Mustafa, M.W.; Sofimieari, I.E.; Dobi, A.M.; Sule, A.H.; Abioye, A.E.; Saeed, M.S. Electricity Theft Detection Framework Based on Universal Prediction Algorithm. Indones. J. Electr. Eng. Comput. Sci. 2019 , 15 , 758–768. [ Google Scholar ] [ CrossRef ]
  • Huang, Y.; Xu, Q. Electricity Theft Detection Based on Stacked Sparse Denoising Autoencoder. Int. J. Electr. Power Energy Syst. 2021 , 125 , 106448. [ Google Scholar ] [ CrossRef ]
  • Lin, G.Y.; Feng, X.F.; Guo, W.C.; Cui, X.Y.; Liu, S.Y.; Jin, W.C.; Lin, Z.Z.; Ding, Y. Electricity Theft Detection Based on Stacked Autoencoder and the Undersampling and Resampling Based Random Forest Algorithm. IEEE Access 2021 , 9 , 124044–124058. [ Google Scholar ] [ CrossRef ]
  • Saeed, M.S.; Mustafa, M.W.; Hamadneh, N.N.; Alshammari, N.A.; Sheikh, U.U.; Jumani, T.A.; Khalid, S.B.A.; Khan, I. Detection of Non-Technical Losses in Power Utilities—A Comprehensive Systematic Review. Energies 2020 , 13 , 4727. [ Google Scholar ] [ CrossRef ]
Search StringsArticles Returned per Database
Science DirectWeb of ScienceSCOPUSTOTAL
(“Electricity” OR “Power” OR “Energy”) AND (“theft OR “fraud”) AND “detection” OR (“detection” AND “prevention”) 1112896171017
Quality Assessment Criteria
Q1. Is the study empirical?
Q2. Is the research method clearly defined (data collection and analysis)?
Q3. Are the study’s objectives clearly stated and addressed?
Q4. Is there a clear link between data analysis and the study findings that lead to a sound conclusion?
#Author(s)YearQ1Q2Q3Q4Total
1Abdulaal et al. [ ]2022YYYY4
2Arif et al. [ ]2022YYYY4
3Ibrahim et al. [ ]2021YYYY4
4Jain et al. [ ]2019YYYY4
5Javaid et al. [ ]2021YYYY4
6Lepolesa et al. [ ]2022YYYY4
7Li et al. [ ]2019YYYY4
8Micheli et al. [ ]2019YYYY4
9Shaaban et al. [ ]2021YYYY4
10Ullah at al. [ ]2021YYYY4
11Zheng et al. [ ]2018YYYY4
12Jindal et al. [ ]2016YNYY3
13Ahmed et al. [ ]2022NYYY3
14Althobaiti et al. [ ]2021NYYY3
15Dash et al. [ ]2021NYYY3
16Glauner et al. [ ]2017NYYY3
17Gupta et al. [ ]2020NYYY3
18Takiddin [ ]2021NYYY3
29Xia et al. [ ]2022NYYY3
20Afridi et al. [ ]2021YNYN2
21Ballal [ ]2021YNYN2
22Ballal et al. [ ]2020YNYN2
23Wisetsri et al. [ ]2022YNNN1
24Yao et al. [ ]2019YNNN1
Author(s)TitlePublicationPublisherStudy
ID
[ ]“Real-Time Detection of False Readings in Smart Grid AMI Using Deep and Ensemble Learning”Journal (IEEE Access)Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, United StatesA
[ ] “Towards Efficient Energy Utilization Using Big Data Analytics in Smart Cities for Electricity Theft Detection”Journal (Big Data Research)Elsevier Inc.: Amsterdam, The NetherlandsB
[ ]“Electricity-theft detection in Smart Grids based on deep learning”Journal (Bulletin of Electrical Engineering and Informatics)Institute of Advanced Engineering and Science: Yogyakarta City, IndonesiaC
[ ]“Rule-based classification of energy theft and anomalies in consumers load demand profile”Journal (IET Smart Grid)Institution of Engineering and Technology: Lucknow, IndiaD
[ ]“An adaptive synthesis to handle imbalanced big data with deep Siamese network for electricity theft detection in smart grids”Journal (Journal of Parallel and Distributed Computing)Academic Press Inc.: Cambridge, MA, United StatesE
[ ]SJournal (IEEE Access)Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, United StatesF
[ ]“Electricity Theft Detection in Power Grids with Deep Learning and Random Forests”Journal (Journal of Electrical and Computer Engineering)Hindawi Limited: London, United KingdomG
[ ]“Big data analytics: an aid to detection of non-technical losses in power utilities”Journal (Computational Management Science)Springer Verlag: Berlin, GermanyH
[ ]“Data-Driven Detection of Electricity Theft Cyberattacks in PV Generation”Journal (IEEE Systems Journal)Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, United StatesI
[ ]“A Hybrid Deep Neural Network for Electricity Theft Detection Using Intelligent Antenna-Based Smart Meters”Journal (Wireless Communications and Mobile Computing)Hindawi Limited: London, United KingdomJ
[ ]“Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids”Journal (IEEE Transactions on Industrial Informatics)IEEE Computer Society: London, United KingdomK
Study
ID
Proposed SolutionDataset + Performance Measurement + ResultsTechnology Used Category
AEnsemble-based deep-learning detector that enables the System Operator to detect false readings in real time. The dataset comprises of real consumption readings from honest users recorded at one-minute intervals. The authors generated a new dataset using 10-min intervals for training their model.

The detector (equipped with GRU and a fully connected neural network) was able to identify false readings after only about 15 readings, which is significantly fewer than what is required by daily detection methods (144 readings) or weekly detection methods (1008 readings).
Gated Recurrent Unit (GRU)Classification
BTomek Link Borderline Synthetic Minority Oversampling Technique with Support Vector Machine and Temporal Convolutional Network with Enhanced Multi-Layer Perceptron electricity theft detection. is labelled and consists of honest and fraudulent consumption data recorded over a period of 3 years on a daily basis (has imbalanced data).
consumption data of 43 users recorded every minute over a period of a year (contains consumption and auxiliary data). The data was converted to one day intervals for training the model.

The TCN-EMPL model obtained a higher AUC (83%) reading in low computational resources when compared with other deep learning models such as MLP combined with LSTM (82%—second best). After using auxiliary data, the model improved by 2%.
Temporal Convolutional Network (TCN) + Enhanced Multi-Layer Perceptron (EMLP)Classification
CA convolutional neural network (CNN) model for automatic electricity theft detection. The authors filled the missing data with zero values for training their model.

In terms of reducing features to improve performance, the authors applied the blue monkey (BM) algorithm that reduced the number of features from 1035 to 666 and obtained an accuracy score of 92%.
CNN + BM Classification
DRule-based classification of energy theft and anomalies in consumers’ load demand profile. : The dataset utilized in this study belongs to Gujarat Urja Vikas Nigam Limited. It is made up of 15-min interval consumption recordings over a period of a year.
 
The proposed model addresses user privacy by only using consumer consumption patterns and low sampling rate, while adequately predicting electricity theft.
Hierarchical Clustering + Decision Tree (DT) +Clustering + Classification
EAn adaptive synthesis to handle imbalanced big data with a deep Siamese network for electricity theft detection in Smart Grids The authors used recommended metrics such as AUC and mAP to understand the imbalanced data.

The combination of CNN-LSTM and DSN outperforms benchmark methods such as LR, SVM, RF, etc., in terms of AUC and mean average precision (MAP). The model reached the score of 90% for MAP and 93% for AUC, outperforming the benchmark methods who fall in the 70% range and below. This model proved to a better classifier of honest and fraudulent electricity users.
Adaptive Synthesis + CNN + Long Short-Term Memory (LSTM) + Deep Siamese Network (DSN) Classification
FTheft detection method, which uses comprehensive features in time and frequency domains in a deep neural network-based classification Data interpolation methods were used to fill out missing and zero values from the dataset.

Compared to models in other studies using the same dataset, the proposed model reached 91.8% accuracy (second best) and 97% AUC. The model detects electricity theft slightly better (1%) than others in literature.
Deep Neural Network (DNN)Classification
G A novel hybrid convolutional neural network-random forest (CNN-RF) model for automatic electricity theft detection. smart meter data recorded in 30 min intervals over 525 days. one-hour interval data were generated for training the model.
: consumption readings over a period of 525 days. The authors used one-hour sampling rate.

Classifiers such as SVM, RF, and GBDT were created and compared to CNN-RF on the same two datasets for electricity theft detection. The CNN-RF model achieved an AUC of 99% and 97% on datasets one and two, respectively, while the runner-up model scored 98% and 96% for the different datasets.
CNN + Random Forest (RF)Classification
H An AMI intrusion detection system that uses information fusion to combine the sensors and consumption data from a smart meter to accurately detect energy theft. : References a utility database with 96 days’ worth of consumption readings recorded in 15 min’ intervals.
 
–In case of incomplete data from meter readings; the proposed multi-linear regression model outperforms classification models in terms of detecting fraudulent users. The model reached 100% accuracy, sensitivity, and specificity when using a very big dataset; for lower dataset sizes, the model prediction is in the 80% range.
Multiple Linear RegressionRegression
I A data-driven approach based on machine learning to detect electricity thefts. : generated from historical records of temperature and solar irradiance data.
 
The TDU detects cyber-attacks in distributed generators. When compared with SVM, ARIMA, and LSE detectors in the same context. ARIMA and SVM performed better in terms of NPV and Sensitivity whereas the TDU outperformed them in the other metrics.
Regression TreeRegression
JA hybrid deep neural network, which combines convolutional neural network, particle swarm optimization, and gated recurrent unit. The authors used SMOTE to balance data.
 
Several models were trained to resolve data imbalance when predicting electricity theft. The CNN-GRU-PSO model was tested against SVM, LR, LSTM, CNN-LSTM, and CNN-GRU. SVM was 1% higher than the proposed CNN-GRU-PSO model in terms of accuracy (94%). The proposed model outperformed all the other models in all the remaining performance matrices recording 94% for Precision and F1-Score, and 95% for Recall and AUC.
CNN + GRU + Particle swarm optimization (PSO)Classification
KA novel electricity-theft detection method based on wide and deep convolutional neural networks (CNN). : The dataset was balanced using data interpolation. Data were analysed using one-week intervals.
 
Detects the periodic patterns of electricity consumption and non-periodic consumption to classify dishonest (non-periodic) and honest (periodic) users of electricity. For this challenge, the proposed model outperformed LR, SVM, RF, and CNN in predicting electricity theft.
Wide and deep CNNClassification
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Kgaphola, P.M.; Marebane, S.M.; Hans, R.T. Electricity Theft Detection and Prevention Using Technology-Based Models: A Systematic Literature Review. Electricity 2024 , 5 , 334-350. https://doi.org/10.3390/electricity5020017

Kgaphola PM, Marebane SM, Hans RT. Electricity Theft Detection and Prevention Using Technology-Based Models: A Systematic Literature Review. Electricity . 2024; 5(2):334-350. https://doi.org/10.3390/electricity5020017

Kgaphola, Potego Maboe, Senyeki Milton Marebane, and Robert Toyo Hans. 2024. "Electricity Theft Detection and Prevention Using Technology-Based Models: A Systematic Literature Review" Electricity 5, no. 2: 334-350. https://doi.org/10.3390/electricity5020017

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals
  • Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • Review Article
  • Published: 31 May 2024

A systematic review and meta-analysis to evaluate the diagnostic accuracy of PSMA PET/CT in the initial staging of prostate cancer

  • Andrea Mari   ORCID: orcid.org/0000-0001-9070-5706 1   na1 ,
  • Anna Cadenar   ORCID: orcid.org/0000-0001-7782-2318 1   na1 ,
  • Sofia Giudici 1 ,
  • Gemma Cianchi   ORCID: orcid.org/0009-0000-2835-1345 1 ,
  • Simone Albisinni   ORCID: orcid.org/0000-0001-5529-3064 2 ,
  • Riccardo Autorino   ORCID: orcid.org/0000-0001-7045-7725 3 ,
  • Fabrizio Di Maida   ORCID: orcid.org/0000-0003-1885-4808 1 ,
  • Giorgio Gandaglia 4 ,
  • M. Carmen Mir   ORCID: orcid.org/0000-0002-1391-1378 5 ,
  • Massimo Valerio 6 ,
  • Giancarlo Marra 7 ,
  • Fabio Zattoni 8 ,
  • Lorenzo Bianchi   ORCID: orcid.org/0000-0001-7321-1536 9 ,
  • Riccardo Lombardo   ORCID: orcid.org/0000-0003-2890-3159 10 ,
  • Shahrokh F. Shariat   ORCID: orcid.org/0000-0002-6627-6179 11 , 12 , 13 , 14 , 15 , 16 , 17 ,
  • Morgan Roupret 18 ,
  • Matteo Bauckneht   ORCID: orcid.org/0000-0002-1937-9116 19 , 20 ,
  • Luca Vaggelli 21 ,
  • Cosimo De Nunzio   ORCID: orcid.org/0000-0002-2190-512X 10 &
  • Andrea Minervini 1  

Prostate Cancer and Prostatic Diseases ( 2024 ) Cite this article

74 Accesses

5 Altmetric

Metrics details

  • Cancer screening
  • Prostate cancer

Positron Emission Tomography-Computed Tomography using Prostate-Specific Membrane Antigen (PSMA PET/CT) is notable for its superior sensitivity and specificity in detecting recurrent PCa and is under investigation for its potential in pre-treatment staging. Despite its established efficacy in nodal and metastasis staging in trial setting, its role in primary staging awaits fuller validation due to limited evidence on oncologic outcomes. This systematic review and meta-analysis aims to appraise the diagnostic accuracy of PSMA PET/CT compared to CI for comprehensive PCa staging.

Medline, Scopus and Web of science databases were searched till March 2023. Preferred Reporting Items for Systematic Reviews and Meta-analysis (PRISMA) guidelines were followed to identify eligible studies. Primary outcomes were specificity, sensitivity, positive predictive value (PPV) and negative predictive value (NPV) of PSMA PET/CT for local, nodal and metastatic staging in PCa patients. Due to the unavailability of data, a meta-analysis was feasible only for detection of seminal vesicles invasion (SVI) and LNI.

A total of 49 studies, comprising 3876 patients, were included. Of these, 6 investigated accuracy of PSMA PET/CT in detection of SVI. Pooled sensitivity, specificity, PPV and NPV were 42.29% (95%CI: 29.85–55.78%), 87.59% (95%CI: 77.10%–93.67%), 93.39% (95%CI: 74.95%–98.52%) and 86.60% (95%CI: 58.83%–96.69%), respectively. Heterogeneity analysis revealed significant variability for PPV and NPV. 18 studies investigated PSMA PET/CT accuracy in detection of LNI. Aggregate sensitivity, specificity, PPV and NPV were 43.63% (95%CI: 34.19–53.56%), 85.55% (95%CI: 75.95%–91.74%), 67.47% (95%CI: 52.42%–79.6%) and 83.61% (95%CI: 79.19%–87.24%). No significant heterogeneity was found between studies.

Conclusions

The present systematic review and meta-analysis highlights PSMA PET-CT effectiveness in detecting SVI and its good accuracy in LNI compared to CI. Nonetheless, it also reveals a lack of high-quality research on its performance in clinical T staging, extraprostatic extension and distant metastasis evaluation, emphasizing the need for further rigorous studies.

This is a preview of subscription content, access via your institution

Access options

Subscribe to this journal

Receive 4 print issues and online access

251,40 € per year

only 62,85 € per issue

Buy this article

  • Purchase on Springer Link
  • Instant access to full article PDF

Prices may be subject to local taxes which are calculated during checkout

a systematic literature review and quality analysis of javascript malware detection

Similar content being viewed by others

a systematic literature review and quality analysis of javascript malware detection

Prediction of tumor origin in cancers of unknown primary origin with cytology-based deep learning

a systematic literature review and quality analysis of javascript malware detection

Large-scale pancreatic cancer detection via non-contrast CT and deep learning

a systematic literature review and quality analysis of javascript malware detection

Radiopharmaceutical therapy in cancer: clinical advances and challenges

Data availability.

The data presented in this study are available in this article and Supplementary Materials.

Baas DJH, Schilham M, Hermsen R, de Baaij JMS, Vrijhof HJEJ, Hoekstra RJ, et al. Preoperative PSMA-PET/CT as a predictor of biochemical persistence and early recurrence following radical prostatectomy with lymph node dissection. Prostate Cancer Prostat Dis. 2022;25:65–70.

Article   CAS   Google Scholar  

Dekalo S, Kuten J, Mintz I, Fahoum I, Gitstein G, Keizman D, et al. Preoperative 68Ga-PSMA PET/CT defines a subgroup of high-risk prostate cancer patients with favorable outcomes after radical prostatectomy and lymph node dissection. Prostate Cancer Prostat Dis. 2021;24:910–6.

Meyrick DP, Asokendaran M, Skelly LA, Lenzo NP, Henderson A The role of 68Ga-PSMA-I&T PET/CT in the pretreatment staging of primary prostate cancer. Nuclear Medicine Communications [Internet]. 2017;38. Available from: https://journals.lww.com/nuclearmedicinecomm/fulltext/2017/11000/the_role_of_68ga_psma_i_t_pet_ct_in_the.10.aspx .

Emmett et al. 2022 The PRIMARY Score Using intra-prostatic PSMA PET.pdf.

Ditonno F, Franco A, Manfredi C, Veccia A, Valerio M, Bukavina L, et al. Novel non-MRI imaging techniques for primary diagnosis of prostate cancer: micro-ultrasound, contrast-enhanced ultrasound, elastography, multiparametric ultrasound, and PSMA PET/CT. Prostate Cancer Prostatic Dis. 2023.

Hofman MS, Lawrentschuk N, Francis RJ, Tang C, Vela I, Thomas P, et al. Prostate-specific membrane antigen PET-CT in patients with high-risk prostate cancer before curative-intent surgery or radiotherapy (proPSMA): a prospective, randomised, multicentre study. Lancet. 2020;395:1208–16.

Article   CAS   PubMed   Google Scholar  

Mottet N, van den Bergh RCN, Briers E, den Broeck TV, Cumberbatch MG, Santis MD, et al. EAU-EANM-ESTRO-ESUR-SIOG Guidelines on Prostate Cancer—2020 Update. Part 1: Screening, Diagnosis, and Local Treatment with Curative Intent. Eur Urol. 2021;79:243–62.

Page MJ, McKenzie JE, Bossuyt PM, Boutron I, Hoffmann TC, Mulrow CD, et al. The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. BMJ. 2021;372:n71.

Article   PubMed   PubMed Central   Google Scholar  

Sterne JA, Hernán MA, Reeves BC, Savović J, Berkman ND, Viswanathan M, et al. ROBINS-I: a tool for assessing risk of bias in non-randomised studies of interventions. BMJ. 2016;355:i4919.

Brauchli D, Singh D, Chabert C, Somasundaram A, Collie L. Tumour-capsule interface measured on 18F-DCFPyL PSMA positron emission tomography/CT imaging comparable to multi-parametric MRI in predicting extra-prostatic extension of prostate cancer at initial staging. J Med Imaging Radiat. Oncol. 2020;64:829–38.

Article   PubMed   Google Scholar  

Rajwa P, Pfister D, Rieger C, Heidenreich J, Drzezga A, Persigehl T, et al. Importance of magnetic resonance imaging and prostate-specific membrane antigen PET-CT in patients treated with salvage radical prostatectomy for radiorecurrent prostate cancer. Prostate. 2023;83:385–91.

Harsini S, Fallahi B, Karamzade Ziarati N, Razi A, Amini E, Emami-Ardekani A, et al. A Prospective Study on [(68)Ga]-PSMA PET/CT Imaging in Newly Diagnosed Intermediate- and High-Risk Prostate Cancer. Asia Ocean J Nucl. Med Biol. 2021;9:101–10.

PubMed   PubMed Central   Google Scholar  

Grubmüller B, Baltzer P, Hartenbach S, D’Andrea D, Helbich TH, Haug AR, et al. PSMA Ligand PET/MRI for Primary Prostate Cancer: Staging Performance and Clinical Impact. Clin. Cancer Res 2018;24:6300–7.

Muehlematter UJ, Burger IA, Becker AS, Schawkat K, Hötker AM, Reiner CS, et al. Diagnostic Accuracy of Multiparametric MRI versus (68)Ga-PSMA-11 PET/MRI for Extracapsular Extension and Seminal Vesicle Invasion in Patients with Prostate Cancer. Radiology. 2019;293:350–8.

Hijazi S, Meller B, Leitsmann C, Strauss A, Meller J, Ritter CO, et al. Pelvic lymph node dissection for nodal oligometastatic prostate cancer detected by 68Ga-PSMA-positron emission tomography/computerized tomography. Prostate. 2015;75:1934–40.

Klingenberg S, Jochumsen MR, Ulhøi BP, Fredsøe J, Sørensen KD, Borre M, et al. (68)Ga-PSMA PET/CT for Primary Lymph Node and Distant Metastasis NM Staging of High-Risk Prostate Cancer. J Nucl Med 2021;62:214–20.

Kubilay E, Akpinar Ç, Oǧuz ES, Araz MS, Soydal Ç, Baltacı S, et al. Significance of metabolic tumor volume and total lesion uptake measured using Ga-68 labelled prostate-specific membrane antigen PET/CT in primary staging of prostate cancer. Urol Oncol. 2022;40:408.e19–408.e25.

Moreira LF, Mussi TC, Cunha MLda, Filippi RZ, Baroni RH. Accuracy of (68)Ga-PSMA PET/CT for lymph node and bone primary staging in prostate cancer. Urol. Oncol. 2022;40:104.e17–104.e21.

Anttinen M, Ettala O, Malaspina S, Jambor I, Sandell M, Kajander S, et al. A Prospective Comparison of 18F-prostate-specific Membrane Antigen-1007 Positron Emission Tomography Computed Tomography, Whole-body 1.5 T Magnetic Resonance Imaging with Diffusion-weighted Imaging, and Single-photon Emission Computed Tomography/Computed Tomography with Traditional Imaging in Primary Distant Metastasis Staging of Prostate Cancer (PROSTAGE). Eur Urol Oncol. 2021;4:635–44.

Lenis AT, Pooli A, Lec PM, Sadun TY, Johnson DC, Lebacle C, et al. Prostate-specific Membrane Antigen Positron Emission Tomography/Computed Tomography Compared with Conventional Imaging for Initial Staging of Treatment-naïve Intermediate- and High-risk Prostate Cancer: A Retrospective Single-center Study. Eur. Urol. Oncol. 2022;5:544–52.

Dyrberg E, Hendel HW, Huynh THV, Klausen TW, Løgager VB, Madsen C, et al. 68Ga-PSMA-PET/CT in comparison with 18F-fluoride-PET/CT and whole-body MRI for the detection of bone metastases in patients with prostate cancer: a prospective diagnostic accuracy study. Eur. Radio. 2019;29:1221–30.

Article   Google Scholar  

Lengana T, Lawal IO, Boshomane TG, Popoola GO, Mokoala KMG, Moshokoa E, et al. 68Ga-PSMA PET/CT Replacing Bone Scan in the Initial Staging of Skeletal Metastasis in Prostate Cancer: A Fait Accompli? Clin Genitourin Cancer 2018;16:392–401.

Zacho HD, Ravn S, Afshar-Oromieh A, Fledelius J, Ejlersen JA, Petersen LJ. Added value of 68Ga-PSMA PET/CT for the detection of bone metastases in patients with newly diagnosed prostate cancer and a previous 99mTc bone scintigraphy. EJNMMI Res 2020;10:31.

Madsen C, Østergren P, Haarmark C. The Value of 68Ga-PSMA PET/CT Following Equivocal 18F-NaF PET/CT in Prostate Cancer Patients. Diagnostics. 2020;10:352.

Mattoni S, Farolfi A, Formaggio F, Bruno G, Caroli P, Cerci JJ, et al. PSMA PET for the Evaluation of Liver Metastases in Castration-Resistant Prostate Cancer Patients: A Multicenter Retrospective Study. Cancers (Basel). 2022;14:5680.

Bauckneht M, Checcucci E, Cisero E, Rizzo A, Racca M, De Cillis S, et al. The prognostic role of next-generation imaging-driven upstaging in newly diagnosed prostate cancer patients. Eur. J. Nucl. Med Mol. Imaging 2024;51:864–70.

Hofman MS, Murphy DG, Williams SG, Nzenza T, Herschtal A, Lourenco RDA, et al. A prospective randomized multicentre study of the impact of gallium-68 prostate-specific membrane antigen (PSMA) PET/CT imaging for staging high-risk prostate cancer prior to curative-intent surgery or radiotherapy (proPSMA study): clinical trial protocol. BJU Int 2018;122:783–93.

Koerber SA, Stach G, Kratochwil C, Haefner MF, Rathke H, Herfarth K, et al. Lymph Node Involvement in Treatment-Naïve Prostate Cancer Patients: Correlation of PSMA PET/CT Imaging and Roach Formula in 280 Men in Radiotherapeutic Management. J Nucl Med 2020;61:46–50.

Article   CAS   PubMed   PubMed Central   Google Scholar  

Chow KM, So WZ, Lee HJ, Lee A, Yap DWT, Takwoingi Y, et al. Head-to-head Comparison of the Diagnostic Accuracy of Prostate-specific Membrane Antigen Positron Emission Tomography and Conventional Imaging Modalities for Initial Staging of Intermediate- to High-risk Prostate Cancer: A Systematic Review and Meta-analysis. Eur Urol. 2023;84:36–48.

Grünig H, Maurer A, Thali Y, Kovacs Z, Strobel K, Burger IA, et al. Focal unspecific bone uptake on [18F]-PSMA-1007 PET: a multicenter retrospective evaluation of the distribution, frequency, and quantitative parameters of a potential pitfall in prostate cancer imaging. Eur J Nucl Med Mol Imaging. 2021;48:4483–94.

Anttinen M, Ettala O, Malaspina S, Jambor I, Sandell M, Kajander S, et al. A Prospective Comparison of (18)F-prostate-specific Membrane Antigen-1007 Positron Emission Tomography Computed Tomography, Whole-body 1.5 T Magnetic Resonance Imaging with Diffusion-weighted Imaging, and Single-photon Emission Computed Tomography/Computed Tomography with Traditional Imaging in Primary Distant Metastasis Staging of Prostate Cancer (PROSTAGE). Eur Urol Oncol. 2021;4:635–44.

Arslan A, Karaarslan E, Güner AL, Sağlıcan Y, Tuna MB, Özışık O, et al. Comparison of MRI, PSMA PET/CT, and Fusion PSMA PET/MRI for Detection of Clinically Significant Prostate Cancer. J Comput Assist Tomogr. 2021;45:210–7.

Budäus L, Leyh-Bannurah SR, Salomon G, Michl U, Heinzer H, Huland H, et al. Initial Experience of 68Ga-PSMA PET/CT Imaging in High-risk Prostate Cancer Patients Prior to Radical Prostatectomy. Eur. Urol. [Internet] 2016;69:393–6. https://linkinghub.elsevier.com/retrieve/pii/S0302283815005138 .

Barbosa ÁRG, Amaral BS, Lourenço DB, Bianco B, Gushiken FA, Apezzato M, et al. Accuracy of 68Ga-PSMA PET-CT and PET-MRI in lymph node staging for localized prostate cancer. Einstein (Sao Paulo). 2022;20:eAO6599.

Chen M, Zhang Q, Zhang C, Zhao X, Marra G, Gao J, et al. Combination of (68)Ga-PSMA PET/CT and Multiparametric MRI Improves the Detection of Clinically Significant Prostate Cancer: A Lesion-by-Lesion Analysis. J Nucl Med 2019;60:944–9.

Corona-Montes VE, González-Cuenca E, Fernández-Noyola G, Olarte-Casas MA, Bobadilla-Salazar D, Medrano-Urtecho HM, et al. Primary lymph-node staging with (68)Ga-PSMA PET in high-risk prostate cancer: pathologic correlation with extended pelvic lymphadenectomy specimens. Urol Oncol. 2021;39:494.e1–e6.

Dekalo S, Kuten J, Campbell J, Mintz I, Bar-Yosef Y, Keizman D., et al. (68)Ga-prostate-specific membrane antigen positron emission tomography/computed tomography for patients with favorable intermediate-risk prostate cancer.Can Urol Assoc J. 2022;16:E381–5.

Donato P, Roberts MJ, Morton A, Kyle S, Coughlin G, Esler R, et al. Improved specificity with (68)Ga PSMA PET/CT to detect clinically significant lesions “invisible” on multiparametric MRI of the prostate: a single institution comparative analysis with radical prostatectomy histology. Eur J Nucl Med Mol Imaging 2019;46:20–30.

Dyrberg E, Hendel HW, Huynh THV, Klausen TW, Løgager VB, Madsen C., et al. 68)Ga-PSMA-PET/CT in comparison with (18)F-fluoride-PET/CT and whole-body MRI for the detection of bone metastases in patients with prostate cancer: a prospective diagnostic accuracy study. Eur Radiol.2019;29:1221–30.

El Hajj A, Yacoub B, Mansour M, Khauli R, Bulbul M, Nassif S, et al. Diagnostic performance of Gallium-68 prostate-specific membrane antigen positron emission tomography-computed tomography in intermediate and high risk prostate cancer. Med (Balt.) 2019;98:e17491.

Erdem S, Simsek DH, Degirmenci E, Aydin R, Bagbudar S, Ozluk Y, et al. How accurate is (68)Gallium-prostate specific membrane antigen positron emission tomography / computed tomography ((68)Ga-PSMA PET/CT) on primary lymph node staging before radical prostatectomy in intermediate and high risk prostate cancer? A study of patient- and lymph node- based analyses. Urol Oncol. 2022;40:6.e1–e9.

Esen T, Falay O, Tarim K, Armutlu A, Koseoglu E, Kilic M. et al. (68)Ga-PSMA-11 Positron Emission Tomography/Computed Tomography for Primary Lymph Node Staging Before Radical Prostatectomy: Central Review of Imaging and Comparison with Histopathology of Extended Lymphadenectomy. Eur Urol Focus.2021;7:288–93.

Fendler WP, Reinhardt S, Ilhan H, Delker A, Böning G, Gildehaus FJ, et al. Preliminary experience with dosimetry, response and patient reported outcome after 177Lu-PSMA-617 therapy for metastatic castration-resistant prostate cancer. Oncotarget. 2017;8:3581–90.

Frumer M, Milk N, Rinott Mizrahi G, Bistritzky S, Sternberg I, Leibovitch I, et al. A comparison between (68)Ga-labeled prostate-specific membrane antigen-PET/CT and multiparametric MRI for excluding regional metastases prior to radical prostatectomy. Abdom Radio (NY) 2020;45:4194–201.

Gao J, Zhang C, Zhang Q, Fu Y, Zhao X, Chen M, et al. Diagnostic performance of (68)Ga-PSMA PET/CT for identification of aggressive cribriform morphology in prostate cancer with whole-mount sections. Eur J Nucl Med Mol Imaging 2019;46:1531–41.

Gupta M, Choudhury PS, Hazarika D, Rawal S. A Comparative Study of (68)Gallium-Prostate Specific Membrane Antigen Positron Emission Tomography-Computed Tomography and Magnetic Resonance Imaging for Lymph Node Staging in High Risk Prostate Cancer Patients: An Initial Experience. World J Nucl Med. 2017;16:186–91.

Gupta M, Choudhury PS, Rawal S, Goel HC, Talwar V, Singh A, et al. Initial risk stratification and staging in prostate cancer with prostatic-specific membrane antigen positron emission tomography/computed tomography: A first-stop-shop. World J Nucl Med. 2018;17:261–9.

Herlemann A, Wenter V, Kretschmer A, Thierfelder KM, Bartenstein P, Faber C, et al. (68)Ga-PSMA Positron Emission Tomography/Computed Tomography Provides Accurate Staging of Lymph Node Regions Prior to Lymph Node Dissection in Patients with Prostate Cancer. Eur Urol. 2016;70:553–7.

Hinsenveld FJ, Wit EMK, van Leeuwen PJ, Brouwer OR, Donswijk ML, Tillier CN, et al. Prostate-Specific Membrane Antigen PET/CT Combined with Sentinel Node Biopsy for Primary Lymph Node Staging in Prostate Cancer. J Nucl Med. 2020;61:540–5.

Kopp D, Kopp J, Bernhardt E, Manka L, Beck A, Gerullis H, et al. 68 Ga-Prostate-Specific Membrane Antigen Positron Emission Tomography-Computed Tomography-Based Primary Staging and Histological Correlation after Extended Pelvic Lymph Node Dissection in Intermediate-Risk Prostate Cancer. Urol Int. [Internet] 2021;106:56–62. https://www.karger.com/Article/FullText/515651 .

Kopp J, Kopp D, Bernhardt E, Manka L, Beck A, Gerullis H, et al. (68)Ga-PSMA PET/CT based primary staging and histological correlation after extended pelvic lymph node dissection at radical prostatectomy. World J Urol. 2020;38:3085–90.

Kulkarni SC, Sundaram PS, Padma S. In primary lymph nodal staging of patients with high-risk and intermediate-risk prostate cancer, how critical is the role of Gallium-68 prostate-specific membrane antigen positron emission tomography-computed tomography? Nucl Med Commun. 2020;41:139–46.

Kumar S, Singh H, Das CK, Kumar R, Mittal BR. Docetaxel-Induced Interstitial Pneumonitis Detected on 68Ga-PSMA PET/CT. Clin Nucl Med 2021;46:e268–9.

Kwan TN, Spremo S, Teh AYM, McHarg D, Thangasamy I, Woo HH. Performance of Ga-68 PSMA PET/CT for diagnosis and grading of local prostate cancer. Prostate Int 2021;9:107–12.

Lengana T, Lawal IO, Boshomane TG, Popoola GO, Mokoala KMG, Moshokoa E, et al. (68)Ga-PSMA PET/CT Replacing Bone Scan in the Initial Staging of Skeletal Metastasis in Prostate Cancer: A Fait Accompli? Clin Genitourin Cancer 2018;16:392–401.

Liu C, Liu T, Zhang Z, Zhang N, Du P, Yang Y, et al. (68)Ga-PSMA PET/CT Combined with PET/Ultrasound-Guided Prostate Biopsy Can Diagnose Clinically Significant Prostate Cancer in Men with Previous Negative Biopsy Results. J Nucl Med 2020;61:1314–9.

Lopci E, Lughezzani G, Castello A, Saita A, Colombo P, Hurle R, et al. Prospective Evaluation of 68Ga-labeled Prostate-specific Membrane Antigen Ligand Positron Emission Tomography/Computed Tomography in Primary Prostate Cancer Diagnosis. Eur Urol Focus 2021;7:764–71.

Rogasch JM, Cash H, Zschaeck S, Elezkurtaj S, Brenner W, Hamm B, et al. Ga-68-PSMA PET/CT in treatment-naïve patients with prostate cancer: Which clinical parameters and risk stratification systems best predict PSMA-positive metastases? Prostate. 2018.

Thalgott M, Düwel C, Rauscher I, Heck MM, Haller B, Gafita A, et al. One-Stop-Shop Whole-Body (68)Ga-PSMA-11 PET/MRI Compared with Clinical Nomograms for Preoperative T and N Staging of High-Risk Prostate Cancer. Nucl Med. 2018;59:1850–6.

van Leeuwen PJ, Donswijk M, Nandurkar R, Stricker P, Ho B, Heijmink S, et al. Gallium-68-prostate-specific membrane antigen ((68) Ga-PSMA) positron emission tomography (PET)/computed tomography (CT) predicts complete biochemical response from radical prostatectomy and lymph node dissection in intermediate- and high-risk prostate cancer. BJU Int. 2019;124:62–8.

von Klot CAJ, Merseburger AS, Böker A, Schmuck S, Ross TL, Bengel FM, et al. (68)Ga-PSMA PET/CT Imaging Predicting Intraprostatic Tumor Extent, Extracapsular Extension and Seminal Vesicle Invasion Prior to Radical Prostatectomy in Patients with Prostate Cancer. Nucl Med Mol Imaging 2017;51:314–22.

Yilmaz B, Turkay R, Colakoglu Y, Baytekin HF, Ergul N, Sahin S, et al. Comparison of preoperative locoregional Ga-68 PSMA-11 PET-CT and mp-MRI results with postoperative histopathology of prostate cancer. Prostate. 2019;79:1007–17.

Zacho HD, Ravn S, Afshar-Oromieh A, Fledelius J, Ejlersen JA, Petersen LJ. Added value of (68)Ga-PSMA PET/CT for the detection of bone metastases in patients with newly diagnosed prostate cancer and a previous (99m)Tc bone scintigraphy. EJNMMI Res. 2020;10:31.

Zhang J, Shao S, Wu P, Liu D, Yang B, Han D, et al. Diagnostic performance of (68)Ga-PSMA PET/CT in the detection of prostate cancer prior to initial biopsy: comparison with cancer-predicting nomograms. Eur J Nucl Med Mol Imaging 2019;46:908–20.

Zhou C, Tang Y, Deng Z, Yang J, Zhou M, Wang L, et al. Comparison of (68)Ga-PSMA PET/CT and multiparametric MRI for the detection of low- and intermediate-risk prostate cancer. EJNMMI Res 2022;12:10.

Download references

Author information

These authors contributed equally: Andrea Mari, Anna Cadenar.

Authors and Affiliations

Oncologic Minimally Invasive Urology and Andrology Unit, Department of Experimental and Clinical Medicine, Careggi Hospital, University of Florence, 50121, Florence, Italy

Andrea Mari, Anna Cadenar, Sofia Giudici, Gemma Cianchi, Fabrizio Di Maida & Andrea Minervini

Urology Unit, Department of Surgical Sciences, Tor Vergata University Hospital, University of Rome Tor Vergata, Rome, Italy

Simone Albisinni

Department of Urology, Rush University Medical Center, Chicago, IL, USA

Riccardo Autorino

Department of Urology and Division of Experimental Oncology, URI, Urological Research Institute, IRCCS San Raffaele Scientific Institute, 20132, Milan, Italy

Giorgio Gandaglia

Department of Urology, Hospital Universitario La Ribera, Valencia, Spain

M. Carmen Mir

Department of Urology, University Hospital of Geneva, Geneva, Switzerland

Massimo Valerio

Division of Urology, Department of Surgical Sciences, University of Turin and Città della Salute e della Scienza, Turin, Italy

Giancarlo Marra

Department Surgery, Oncology and Gastroenterology, Urologic Unit, University of Padova, Padova, Italy

Fabio Zattoni

Division of Urology, IRCCS Azienda Ospedaliero-Universitaria di Bologna, Bologna, Italy

Lorenzo Bianchi

Department of Urology, Sant’Andrea Hospital, Sapienza University, Rome, Italy

Riccardo Lombardo & Cosimo De Nunzio

Department of Urology, Medical University of Vienna, Vienna, Austria

Shahrokh F. Shariat

Karl Landsteiner Institute of Urology and Andrology, Vienna, Austria

Department of Urology, University of Texas Southwestern, Dallas, TX, USA

Department of Urology, Weill Cornell Medical College, New York, NY, 10065, USA

Department of Urology, Second Faculty of Medicine, Charles University, Prague, Czech Republic

European Association of Urology Research Foundation, Arnhem, The Netherlands

Hourani Center for Applied Scientific Research, Al-Ahliyya Amman University, Amman, Jordanien

Urology, Predictive Onco-Urology, AP-HP, Urology Hôpital Pitié-Salpêtrière, Sorbonne Université, Paris, France

Morgan Roupret

Nuclear Medicine, IRCCS Ospedale Policlinico San Martino, Genoa, Italy

Matteo Bauckneht

Department of Health Sciences (DISSAL), University of Genoa, Genoa, Italy

Nuclear Medicine Division, Careggi University Hospital, Florence, Italy

Luca Vaggelli

You can also search for this author in PubMed   Google Scholar

Contributions

AM and AC: Conceptualization, data analysis, original draft preparation; SG and GC: Data collection and curation; SA, RA, FDM, GG, MCM, MV, GM, FZ, LB, RL, SFS, MR, MB, LV: Manuscript revision and editing; CDM, AM: Supervision, conceptualization.

Corresponding author

Correspondence to Andrea Mari .

Ethics declarations

Competing interests.

Cosimo De Nunzio, Editor in Chief of prostate Cancer and Prostatic Disease.

Additional information

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary information

Supplementary figure 1, supplementary figure 2, supplementary table 1, supplementary table 2, supplementary table 3, supplemental figure legends, rights and permissions.

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Cite this article.

Mari, A., Cadenar, A., Giudici, S. et al. A systematic review and meta-analysis to evaluate the diagnostic accuracy of PSMA PET/CT in the initial staging of prostate cancer. Prostate Cancer Prostatic Dis (2024). https://doi.org/10.1038/s41391-024-00850-y

Download citation

Received : 12 February 2024

Revised : 04 May 2024

Accepted : 20 May 2024

Published : 31 May 2024

DOI : https://doi.org/10.1038/s41391-024-00850-y

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

a systematic literature review and quality analysis of javascript malware detection

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

IMAGES

  1. (PDF) A Systematic Literature Review and Quality Analysis of JavaScript

    a systematic literature review and quality analysis of javascript malware detection

  2. Figure 1 from A Systematic Literature Review and Quality Analysis of

    a systematic literature review and quality analysis of javascript malware detection

  3. (PDF) A Systematic Literature Review and Quality Analysis of JavaScript

    a systematic literature review and quality analysis of javascript malware detection

  4. (PDF) Taxonomy of Malware Detection Techniques: A Systematic Literature

    a systematic literature review and quality analysis of javascript malware detection

  5. (PDF) A Systematic Literature Review and Quality Analysis of JavaScript

    a systematic literature review and quality analysis of javascript malware detection

  6. (PDF) A Comprehensive Review on Malware Detection Approaches

    a systematic literature review and quality analysis of javascript malware detection

VIDEO

  1. Simple Javascript Decoding and C2 Extraction (Redline Stealer)

  2. Building an Object Detection App with Tensorflow.JS and React.JS

  3. Literature Review, Systematic Literature Review, Meta

  4. Malware Analysis

  5. Malware Analysis: 001_JavaScript Deobfuscation: Manually Deobfuscating Random Sample

  6. A Comprehensive Systematic Literature Review on Intrusion Detection Systems

COMMENTS

  1. A Systematic Literature Review and Quality Analysis of Javascript

    Context: JavaScript (JS) is an often-used programming language by millions of web pages and is also affected by thousands of malicious attacks. Objective: In this investigation, we provided a general view and a quick understanding of JavaScript Malware Detection (JSMD) research reported in the scientific literature from several perspectives. Method: We performed a Systematic Literature Review ...

  2. A Systematic Literature Review and Quality Analysis of JavaScript

    Mal-. ware refers to software that is written with malicious intent; viruses, worms, ransomware, spyware, etc. are the parts of. malware [36]. The attackers use different vulnerabilities (e.g ...

  3. PDF A Systematic Literature Review and Quality Analysis of JavaScript

    Method: We performed a Systematic Literature Review (SLR) and quality analysis of published research articles on the topic. We investigated 32 articles published between the year 2009 to the year ...

  4. A Systematic Literature Review and Quality Analysis of Javascript

    A Systematic Literature Review (SLR) was performed and synthesized the existing JSMD studies to identify the previous research practices and also to shed light on future guidelines in the malware detection space. Context: JavaScript (JS) is an often-used programming language by millions of web pages and is also affected by thousands of malicious attacks. Objective: In this investigation, we ...

  5. A Systematic Literature Review and Quality Analysis of Javascript

    A Systematic Literature Review and Quality Analysis of Javascript Malware Detection @article{Sohan2020ASL, title={A Systematic Literature Review and Quality Analysis of Javascript Malware Detection}, author={Md. Fahimuzzman Sohan and Anas Basalamah}, journal={IEEE Access}, year={2020}, volume={8}, pages={190539-190552} }

  6. A Systematic Literature Review and Quality Analysis of Javascript

    Objective: In this investigation, we provided a general view and a quick understanding of JavaScript Malware Detection (JSMD) research reported in the scientific literature from several perspectives. Method: We performed a Systematic Literature Review (SLR) and quality analysis of published research articles on the topic.

  7. Malware Detection with Artificial Intelligence: A Systematic Literature

    In this survey, we review the key developments in the field of malware detection using AI and analyze core challenges. We systematically survey state-of-the-art methods across five critical aspects of building an accurate and robust AI-powered malware-detection model: malware sophistication, analysis techniques, malware repositories, feature selection, and machine learning vs. deep learning.

  8. Deep Learning Methods for Malware and Intrusion Detection: A Systematic

    To assess the applications and impact of deep learning methods for malware and intrusion detection systems, a systematic literature review (SLR) is conducted. In an SRL, a systematic approach is followed to identify and analyze relevant studies regarding a specific area of interest . There are a number of guidelines defined by experts for ...

  9. Malware Detection with Artificial Intelligence: A Systematic Literature

    the quality and quantity of the features it is ... including spam detection, intrusion detection, and malware detection. The dataset, analysis technique, AI model, and results are identified for the surveyed ... Ucci et al. [90 ] have provided the most complete systematic literature review, considering mal- ware sophistication, static and ...

  10. PDF Deep Learning for Vulnerability and Attack Detection on Web

    web attacks detection. We performed a Systematic Literature Review (SLR) and quality analysis of 63 Primary Studies (PS) on DL-based web applications security published between 2010 and September ...

  11. A systematic literature review on Windows malware detection: Techniques

    Review protocol—We employed the systematic literature review approach to conduct our review on malware detection. Thus, the SLR presented in this work is an in-depth/detailed structured literature review that answers specific questions relevant to malware detection in Windows.

  12. DOCX dspace.daffodilvarsity.edu.bd:8080

    A Systematic Literature Review and Quality Analysis of Javascript Malware Detection. Md. Fahimuzzman Sohan. Abstract: Context: JavaScript (JS) is an often-used programming language by millions of web pages and is also affected by thousands of malicious attacks. Objective: In this investigation, we provided a general view and a quick ...

  13. Sensors

    The focus of this article is to analyze the identified studies that have been conducted with a focus on permission analysis for malware detection. With this perspective, a systematic literature review (SLR) has been produced. Several papers have been retrieved and selected for detailed analysis.

  14. Android Malware Detection: A Literature Review

    To be more inclusive, however, this paper conducts a literature review of the most commonly used analysis methods, as the state-of-the-art, for malware detection, identifying the most prominent studies. The differences between the contribution of this paper and previous literature review studies are shown in Table 1.

  15. A Systematic Literature Review and Quality Analysis of Javascript

    A Systematic Literature Review and Quality Analysis of Javascript Malware Detection @article{Sohan2020ASL, title={A Systematic Literature Review and Quality Analysis of Javascript Malware Detection}, author={Md. Fahimuzzman Sohan and Anas Basalamah}, journal={IEEE Access}, year={2020}, volume={8}, pages={190539-190552}, url={https://api ...

  16. A systematic literature review on Windows malware detection

    The aim of this systematic literature review (SLR) is to provide a comprehensive overview of the current state of Windows malware detection techniques, research issues, and future directions. The SLR was conducted by analyzing scientific literature on Windows malware detection based on executable files (.EXE file format) published between 2009 ...

  17. PDF Deep Learning for Android Malware Defenses: a Systematic Literature Review

    The main steps of the Systematic Literature Review (SLR) can be summarized as follows: (1) planning the review and developing a review protocol, (2) identifying research questions, (3) designing search strategies, proposing exclusion criteria, (4) data extraction, and (5) data synthesis. Table 2.

  18. JCM

    To optimise treatment and preserve lung function, there is a need for non-invasive and reliable methods of detection. Breath analysis might be such a method. Methods: We systematically reviewed the existing literature on breath analysis to detect pulmonary exacerbations in mucociliary clearance disorders.

  19. Electricity

    Electricity theft comes with various disadvantages for power utilities, governments, businesses, and the general public. This continues despite the various solutions employed to detect and prevent it. Some of the disadvantages of electricity theft include revenue loss and load shedding, leading to a disruption in business operations. This study aimed to conduct a systematic literature review ...

  20. A systematic review and meta-analysis to evaluate the ...

    This systematic review and meta-analysis aims to appraise the diagnostic accuracy of PSMA PET/CT compared to CI for comprehensive PCa staging. Medline, Scopus and Web of science databases were ...

  21. A Systematic Literature Review and Quality Analysis of Javascript

    Context: JavaScript (JS) is an often-used programming language by millions of web pages and is also affected by thousands of malicious attacks. Objective: In this investigation, we provided a general view and a quick understanding of JavaScript Malware Detection (JSMD) research reported in the scientific literature from several perspectives. Method: We performed a Systematic Literature Review ...