{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T13:29:59Z","timestamp":1764250199700,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1109\/iolts52814.2021.9486701","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T01:11:20Z","timestamp":1627348280000},"page":"1-7","source":"Crossref","is-referenced-by-count":18,"title":["Adaptive-HMD: Accurate and Cost-Efficient Machine Learning-Driven Malware Detection using Microarchitectural Events"],"prefix":"10.1109","author":[{"given":"Yifeng","family":"Gao","sequence":"first","affiliation":[]},{"given":"Hosein Mohammadi","family":"Makrani","sequence":"additional","affiliation":[]},{"given":"Mehrdad","family":"Aliasgari","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Rezaei","sequence":"additional","affiliation":[]},{"given":"Jessica","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[]},{"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465828"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052999"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3386263.3407585"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00251"},{"key":"ref17","first-page":"1","article-title":"Ensemble methods in machine learning","author":"dietterich","year":"2000","journal-title":"Multiple Classifier Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3267809.3275459"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF01238023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS48704.2020.9184539"},{"key":"ref27","first-page":"10","volume":"11","author":"hall","year":"2009","journal-title":"The WEKA Data Mining Software An Update"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2607-0_1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0086-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000015881.36452.6e"},{"journal-title":"McAfee Labs Threats Report","year":"2019","author":"labs","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011919"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0125-x"},{"key":"ref2","first-page":"85","article-title":"When machine learning meets hardware cybersecurity: Delving into accurate zero-day malware detection","author":"he","year":"0","journal-title":"2021 22nd International Symposium on Quality Electronic Design (ISQED)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116340"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"ref22","volume":"454","author":"liu","year":"2012","journal-title":"Feature Selection for Knowledge Discovery and Data Mining"},{"key":"ref21","article-title":"Lxc: Linux container tools","author":"helsely","year":"2009","journal-title":"IBM developer Works Technical Library"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_3"},{"journal-title":"On the properties of the softmax function with application in game theory and reinforcement learning","year":"2017","author":"gao","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-173493"}],"event":{"name":"2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS)","start":{"date-parts":[[2021,6,28]]},"location":"Torino, Italy","end":{"date-parts":[[2021,6,30]]}},"container-title":["2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9486678\/9486679\/09486701.pdf?arnumber=9486701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:25Z","timestamp":1652197705000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9486701\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iolts52814.2021.9486701","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]}}}