Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Masahiko Kato
@article{DBLP:journals/ijnc/DeguchiKK23, author = {Mutsuki Deguchi and Masahiko Katoh and Ryotaro Kobayashi}, title = {Low Resource and Power Consumption and Improved Classification Accuracy for IoT Implementation of a Malware Detection Mechanism using Processor Information}, journal = {Int. J. Netw. Comput.}, volume = {13}, number = {2}, pages = {149--172}, year = {2023}, url = {http://www.ijnc.org/index.php/ijnc/article/view/304}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnc/DeguchiKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/candar/MatunakaKK23, author = {Yutaro Matunaka and Ryotaro Kobayashi and Masahiko Kato}, title = {Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information}, booktitle = {Eleventh International Symposium on Computing and Networking, {CANDAR} 2023 - Workshops, Matsue, Japan, November 27-30, 2023}, pages = {253--259}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CANDARW60564.2023.00049}, doi = {10.1109/CANDARW60564.2023.00049}, timestamp = {Thu, 22 Feb 2024 20:44:52 +0100}, biburl = {https://dblp.org/rec/conf/candar/MatunakaKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/candar/SudoKK23, author = {Taku Sudo and Ryotaro Kobayashi and Masahiko Kato}, title = {Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices}, booktitle = {Eleventh International Symposium on Computing and Networking, {CANDAR} 2023 - Workshops, Matsue, Japan, November 27-30, 2023}, pages = {279--285}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CANDARW60564.2023.00053}, doi = {10.1109/CANDARW60564.2023.00053}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/candar/SudoKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KoikeKK22, author = {Kazuki Koike and Ryotaro Kobayashi and Masahiko Katoh}, title = {IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {4}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.1007/s10207-021-00577-0}, doi = {10.1007/S10207-021-00577-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KoikeKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnc/DeguchiKK22, author = {Mutsuki Deguchi and Masahiko Katoh and Ryotaro Kobayashi}, title = {Evaluation of implementability in a malware detection mechanism using processor information}, journal = {Int. J. Netw. Comput.}, volume = {12}, number = {2}, pages = {253--269}, year = {2022}, url = {http://www.ijnc.org/index.php/ijnc/article/view/282}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnc/DeguchiKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/DeguchiKK22, author = {Mutsuki Deguchi and Masahiko Katoh and Ryotaro Kobayashi}, title = {Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoT}, booktitle = {2022 Tenth International Symposium on Computing and Networking, {CANDAR} 2022 - Workshops, Himeji, Japan, November 21-24, 2022}, pages = {288--294}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CANDARW57323.2022.00012}, doi = {10.1109/CANDARW57323.2022.00012}, timestamp = {Thu, 23 Mar 2023 08:30:32 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/DeguchiKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/KatoT22, author = {Masahiko Kato and Kenji Tanaka}, title = {Estimation of Driver Excitement by Semantic Differential Method and Correlation with Arousal Levels in Advanced Driver Assistance}, booktitle = {{IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2022, Prague, Czech Republic, October 9-12, 2022}, pages = {712--717}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SMC53654.2022.9945229}, doi = {10.1109/SMC53654.2022.9945229}, timestamp = {Thu, 01 Dec 2022 15:59:35 +0100}, biburl = {https://dblp.org/rec/conf/smc/KatoT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/DeguchiKK21, author = {Mutsuki Deguchi and Masahiko Katoh and Ryotaro Kobayashi}, title = {Evaluation of implementability in a malware detection mechanism using processor information}, booktitle = {Ninth International Symposium on Computing and Networking, {CANDAR} 2021 - Workshops, Matsue, Japan, 23-26 November 2021}, pages = {313--319}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CANDARW53999.2021.00060}, doi = {10.1109/CANDARW53999.2021.00060}, timestamp = {Fri, 18 Feb 2022 10:36:44 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/DeguchiKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/TakaseKKO20, author = {Hayate Takase and Ryotaro Kobayashi and Masahiko Kato and Ren Ohmura}, title = {A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information}, journal = {Int. J. Inf. Sec.}, volume = {19}, number = {1}, pages = {71--81}, year = {2020}, url = {https://doi.org/10.1007/s10207-019-00437-y}, doi = {10.1007/S10207-019-00437-Y}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/TakaseKKO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/KoikeKK19, author = {Kazuki Koike and Ryotaro Kobayashi and Masahiko Katoh}, title = {Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism Using Processor Information}, booktitle = {Seventh International Symposium on Computing and Networking Workshops, {CANDAR} 2019 Workshops, Nagasaki, Japan, November 26-29, 2019}, pages = {339--345}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CANDARW.2019.00066}, doi = {10.1109/CANDARW.2019.00066}, timestamp = {Tue, 04 Feb 2020 15:59:02 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/KoikeKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/YoshidaKKKOK17, author = {Takuro Yoshida and Kento Kawakami and Ryotaro Kobayashi and Masahiko Kato and Masayuki Okada and Hiroyuki Kishimoto}, title = {Detection and Filtering System for {DNS} Water Torture Attacks Relying Only on Domain Name Information}, journal = {J. Inf. Process.}, volume = {25}, pages = {854--865}, year = {2017}, url = {https://doi.org/10.2197/ipsjjip.25.854}, doi = {10.2197/IPSJJIP.25.854}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/YoshidaKKKOK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/TakeuchiYKKK16, author = {Yuya Takeuchi and Takuro Yoshida and Ryotaro Kobayashi and Masahiko Kato and Hiroyuki Kishimoto}, title = {Detection of the {DNS} Water Torture Attack by Analyzing Features of the Subdomain Name}, journal = {J. Inf. Process.}, volume = {24}, number = {5}, pages = {793--801}, year = {2016}, url = {https://doi.org/10.2197/ipsjjip.24.793}, doi = {10.2197/IPSJJIP.24.793}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/TakeuchiYKKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KobayashiOYK16, author = {Ryotaro Kobayashi and Genki Otani and Takuro Yoshida and Masahiko Kato}, title = {Defense Method of {HTTP} {GET} Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity}, journal = {J. Inf. Process.}, volume = {24}, number = {5}, pages = {802--815}, year = {2016}, url = {https://doi.org/10.2197/ipsjjip.24.802}, doi = {10.2197/IPSJJIP.24.802}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/KobayashiOYK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/WatanabeKK15, author = {Mizuki Watanabe and Ryotaro Kobayashi and Masahiko Kato}, title = {{HTTP-GET} Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources}, journal = {J. Inf. Process.}, volume = {23}, number = {5}, pages = {655--663}, year = {2015}, url = {https://doi.org/10.2197/ipsjjip.23.655}, doi = {10.2197/IPSJJIP.23.655}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/WatanabeKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/HigurashiKKO13, author = {Ichita Higurashi and Akira Kanaoka and Masahiko Kato and Eiji Okamoto}, title = {Detection of Unexpected Services and Communication Paths in Networked Systems}, journal = {J. Inf. Process.}, volume = {21}, number = {4}, pages = {632--639}, year = {2013}, url = {https://doi.org/10.2197/ipsjjip.21.632}, doi = {10.2197/IPSJJIP.21.632}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/HigurashiKKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/HigurashiKKO12, author = {Ichita Higurashi and Akira Kanaoka and Masahiko Kato and Eiji Okamoto}, editor = {Ehab Al{-}Shaer and Xinming Ou and Geoffrey G. Xie}, title = {Discovery of Unexpected Services and Communication Paths in Networked Systems}, booktitle = {Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, {USA]}}, pages = {169--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-319-01433-3\_10}, doi = {10.1007/978-3-319-01433-3\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/HigurashiKKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/KatoMKKO12, author = {Masahiko Kato and Takumi Matsunami and Akira Kanaoka and Hiroshi Koide and Eiji Okamoto}, editor = {Ehab Al{-}Shaer and Xinming Ou and Geoffrey G. Xie}, title = {Tracing Advanced Persistent Threats in Networked Systems}, booktitle = {Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, {USA]}}, pages = {179--187}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-319-01433-3\_11}, doi = {10.1007/978-3-319-01433-3\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/KatoMKKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/KoedaK11, author = {Masanao Koeda and Masahiko Kato}, editor = {Constantine Stephanidis}, title = {Pen Tip Position Estimation Using Least Square Sphere Fitting for Customized Attachments of Haptic Device}, booktitle = {{HCI} International 2011 - Posters' Extended Abstracts - International Conference, {HCI} International 2011, Orlando, FL, USA, July 9-14, 2011, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {174}, pages = {340--344}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22095-1\_69}, doi = {10.1007/978-3-642-22095-1\_69}, timestamp = {Wed, 24 May 2017 08:28:59 +0200}, biburl = {https://dblp.org/rec/conf/hci/KoedaK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/HaradaKOK10, author = {Toshiki Harada and Akira Kanaoka and Eiji Okamoto and Masahiko Kato}, title = {Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using {CVSS}}, booktitle = {Tenth Annual International Symposium on Applications and the Internet, {SAINT} 2010, Seoul, Korea, 19-23 July, 2010, Proceedings}, pages = {367--370}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SAINT.2010.105}, doi = {10.1109/SAINT.2010.105}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/HaradaKOK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.