Related references
Note: Only part of the references are listed.A Theoretical Study of Hardware Performance Counters-Based Malware Detection
Kanad Basu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Spectre Attacks: Exploiting Speculative Execution
Paul Kocher et al.
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)
Adversarial Attack on Microarchitectural Events based Malware Detectors
Sai Manoj Pudukotai Dinakarrao et al.
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2019)
CacheShield: Detecting Cache Attacks through Self-Observation
Samira Briongos et al.
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18) (2018)
Hardware-Based Malware Detection Using Low-Level Architectural Features
Meltem Ozsoy et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
A Unified Framework for Reservoir Computing and Extreme Learning Machines based on a Single Time-delayed Neuron
S. Ortin et al.
SCIENTIFIC REPORTS (2015)
An experimental unification of reservoir computing methods
D. Verstraeten et al.
NEURAL NETWORKS (2007)