{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:41:21Z","timestamp":1773157281642,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1109\/iccd56317.2022.00042","type":"proceedings-article","created":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T15:02:57Z","timestamp":1671462177000},"page":"231-238","source":"Crossref","is-referenced-by-count":13,"title":["Breakthrough to Adaptive and Cost-Aware Hardware-Assisted Zero-Day Malware Detection: A Reinforcement Learning-Based Approach"],"prefix":"10.1109","author":[{"given":"Zhangying","family":"He","sequence":"first","affiliation":[{"name":"California State University,Department of Computer Engineering and Computer Science,Long Beach,CA,USA"}]},{"given":"Hosein Mohammadi","family":"Makrani","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical and Computer Engineering,Davis,CA,USA"}]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"University of California,Department of Computer Science,Davis,CA,USA"}]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical and Computer Engineering,Davis,CA,USA"}]},{"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[{"name":"California State University,Department of Computer Engineering and Computer Science,Long Beach,CA,USA"}]}],"member":"263","reference":[{"key":"ref32","article-title":"Openai gym","author":"brockman","year":"2016"},{"key":"ref31","author":"papathanasiou","year":"2019","journal-title":"Multiple Criteria Decision Aid methods examples and python implementations"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106365"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196515"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2924549"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3386263.3407585"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011919"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052999"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3442696"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2017.8323570"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3418783"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI49217.2020.00-15"},{"key":"ref19","first-page":"3","article-title":"Ensemble learning for low-level hardware-supported malware detection","author":"khasawneh","year":"2015","journal-title":"RAID&#x2019;15"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0087357"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2607-0_1"},{"key":"ref27","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_6"},{"key":"ref29","first-page":"403","article-title":"Comparative study of techniques for large-scale feature selection","volume":"16","author":"ferri","year":"1994","journal-title":"Pattern Recognition in Practice IV"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS48704.2020.9184539"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056070"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465828"},{"key":"ref2","first-page":"973","article-title":"Meltdown: Reading kernel memory from user space","author":"lipp","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715080"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"ref22","article-title":"Deep reinforcement learning for cyber security","author":"nguyen","year":"2019","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1561\/2200000071"},{"key":"ref24","article-title":"Lxc: Linux container tools","author":"helsely","year":"2009","journal-title":"IBM developer Works Technical Library"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"}],"event":{"name":"2022 IEEE 40th International Conference on Computer Design (ICCD)","location":"Olympic Valley, CA, USA","start":{"date-parts":[[2022,10,23]]},"end":{"date-parts":[[2022,10,26]]}},"container-title":["2022 IEEE 40th International Conference on Computer Design (ICCD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9978287\/9978272\/09978332.pdf?arnumber=9978332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T14:32:42Z","timestamp":1673879562000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9978332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/iccd56317.2022.00042","relation":{},"subject":[],"published":{"date-parts":[[2022,10]]}}}