BibTeX records: Masahiko Kato

download as .bib file

@article{DBLP:journals/ijnc/DeguchiKK23,
  author       = {Mutsuki Deguchi and
                  Masahiko Katoh and
                  Ryotaro Kobayashi},
  title        = {Low Resource and Power Consumption and Improved Classification Accuracy
                  for IoT Implementation of a Malware Detection Mechanism using Processor
                  Information},
  journal      = {Int. J. Netw. Comput.},
  volume       = {13},
  number       = {2},
  pages        = {149--172},
  year         = {2023},
  url          = {http://www.ijnc.org/index.php/ijnc/article/view/304},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnc/DeguchiKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/candar/MatunakaKK23,
  author       = {Yutaro Matunaka and
                  Ryotaro Kobayashi and
                  Masahiko Kato},
  title        = {Verification of IoT Malware Match Rate Using Signatures Created Based
                  on Processor Information},
  booktitle    = {Eleventh International Symposium on Computing and Networking, {CANDAR}
                  2023 - Workshops, Matsue, Japan, November 27-30, 2023},
  pages        = {253--259},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CANDARW60564.2023.00049},
  doi          = {10.1109/CANDARW60564.2023.00049},
  timestamp    = {Thu, 22 Feb 2024 20:44:52 +0100},
  biburl       = {https://dblp.org/rec/conf/candar/MatunakaKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/candar/SudoKK23,
  author       = {Taku Sudo and
                  Ryotaro Kobayashi and
                  Masahiko Kato},
  title        = {Single-Hardware Method to Detect Malicious Communications and Malware
                  on Resource-Constrained IoT Devices},
  booktitle    = {Eleventh International Symposium on Computing and Networking, {CANDAR}
                  2023 - Workshops, Matsue, Japan, November 27-30, 2023},
  pages        = {279--285},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CANDARW60564.2023.00053},
  doi          = {10.1109/CANDARW60564.2023.00053},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/candar/SudoKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KoikeKK22,
  author       = {Kazuki Koike and
                  Ryotaro Kobayashi and
                  Masahiko Katoh},
  title        = {IoT-oriented high-efficient anti-malware hardware focusing on time
                  series metadata extractable from inside a processor core},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {4},
  pages        = {1--19},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-021-00577-0},
  doi          = {10.1007/S10207-021-00577-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KoikeKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnc/DeguchiKK22,
  author       = {Mutsuki Deguchi and
                  Masahiko Katoh and
                  Ryotaro Kobayashi},
  title        = {Evaluation of implementability in a malware detection mechanism using
                  processor information},
  journal      = {Int. J. Netw. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {253--269},
  year         = {2022},
  url          = {http://www.ijnc.org/index.php/ijnc/article/view/282},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnc/DeguchiKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/DeguchiKK22,
  author       = {Mutsuki Deguchi and
                  Masahiko Katoh and
                  Ryotaro Kobayashi},
  title        = {Evaluation of Low-cost Operation of a Malware Detection Mechanism
                  using Processor Information Targeting the IoT},
  booktitle    = {2022 Tenth International Symposium on Computing and Networking, {CANDAR}
                  2022 - Workshops, Himeji, Japan, November 21-24, 2022},
  pages        = {288--294},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CANDARW57323.2022.00012},
  doi          = {10.1109/CANDARW57323.2022.00012},
  timestamp    = {Thu, 23 Mar 2023 08:30:32 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/DeguchiKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/KatoT22,
  author       = {Masahiko Kato and
                  Kenji Tanaka},
  title        = {Estimation of Driver Excitement by Semantic Differential Method and
                  Correlation with Arousal Levels in Advanced Driver Assistance},
  booktitle    = {{IEEE} International Conference on Systems, Man, and Cybernetics,
                  {SMC} 2022, Prague, Czech Republic, October 9-12, 2022},
  pages        = {712--717},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SMC53654.2022.9945229},
  doi          = {10.1109/SMC53654.2022.9945229},
  timestamp    = {Thu, 01 Dec 2022 15:59:35 +0100},
  biburl       = {https://dblp.org/rec/conf/smc/KatoT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/DeguchiKK21,
  author       = {Mutsuki Deguchi and
                  Masahiko Katoh and
                  Ryotaro Kobayashi},
  title        = {Evaluation of implementability in a malware detection mechanism using
                  processor information},
  booktitle    = {Ninth International Symposium on Computing and Networking, {CANDAR}
                  2021 - Workshops, Matsue, Japan, 23-26 November 2021},
  pages        = {313--319},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CANDARW53999.2021.00060},
  doi          = {10.1109/CANDARW53999.2021.00060},
  timestamp    = {Fri, 18 Feb 2022 10:36:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/DeguchiKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/TakaseKKO20,
  author       = {Hayate Takase and
                  Ryotaro Kobayashi and
                  Masahiko Kato and
                  Ren Ohmura},
  title        = {A prototype implementation and evaluation of the malware detection
                  mechanism for IoT devices using the processor information},
  journal      = {Int. J. Inf. Sec.},
  volume       = {19},
  number       = {1},
  pages        = {71--81},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10207-019-00437-y},
  doi          = {10.1007/S10207-019-00437-Y},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/TakaseKKO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/KoikeKK19,
  author       = {Kazuki Koike and
                  Ryotaro Kobayashi and
                  Masahiko Katoh},
  title        = {Reduction of Classifier Size and Acceleration of Classification Algorithm
                  in Malware Detection Mechanism Using Processor Information},
  booktitle    = {Seventh International Symposium on Computing and Networking Workshops,
                  {CANDAR} 2019 Workshops, Nagasaki, Japan, November 26-29, 2019},
  pages        = {339--345},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CANDARW.2019.00066},
  doi          = {10.1109/CANDARW.2019.00066},
  timestamp    = {Tue, 04 Feb 2020 15:59:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/KoikeKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/YoshidaKKKOK17,
  author       = {Takuro Yoshida and
                  Kento Kawakami and
                  Ryotaro Kobayashi and
                  Masahiko Kato and
                  Masayuki Okada and
                  Hiroyuki Kishimoto},
  title        = {Detection and Filtering System for {DNS} Water Torture Attacks Relying
                  Only on Domain Name Information},
  journal      = {J. Inf. Process.},
  volume       = {25},
  pages        = {854--865},
  year         = {2017},
  url          = {https://doi.org/10.2197/ipsjjip.25.854},
  doi          = {10.2197/IPSJJIP.25.854},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/YoshidaKKKOK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TakeuchiYKKK16,
  author       = {Yuya Takeuchi and
                  Takuro Yoshida and
                  Ryotaro Kobayashi and
                  Masahiko Kato and
                  Hiroyuki Kishimoto},
  title        = {Detection of the {DNS} Water Torture Attack by Analyzing Features
                  of the Subdomain Name},
  journal      = {J. Inf. Process.},
  volume       = {24},
  number       = {5},
  pages        = {793--801},
  year         = {2016},
  url          = {https://doi.org/10.2197/ipsjjip.24.793},
  doi          = {10.2197/IPSJJIP.24.793},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/TakeuchiYKKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KobayashiOYK16,
  author       = {Ryotaro Kobayashi and
                  Genki Otani and
                  Takuro Yoshida and
                  Masahiko Kato},
  title        = {Defense Method of {HTTP} {GET} Flood Attack by Adaptively Controlling
                  Server Resources Depending on Different Attack Intensity},
  journal      = {J. Inf. Process.},
  volume       = {24},
  number       = {5},
  pages        = {802--815},
  year         = {2016},
  url          = {https://doi.org/10.2197/ipsjjip.24.802},
  doi          = {10.2197/IPSJJIP.24.802},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/KobayashiOYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/WatanabeKK15,
  author       = {Mizuki Watanabe and
                  Ryotaro Kobayashi and
                  Masahiko Kato},
  title        = {{HTTP-GET} Flood Prevention Method by Dynamically Controlling Multiple
                  Types of Virtual Machine Resources},
  journal      = {J. Inf. Process.},
  volume       = {23},
  number       = {5},
  pages        = {655--663},
  year         = {2015},
  url          = {https://doi.org/10.2197/ipsjjip.23.655},
  doi          = {10.2197/IPSJJIP.23.655},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/WatanabeKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HigurashiKKO13,
  author       = {Ichita Higurashi and
                  Akira Kanaoka and
                  Masahiko Kato and
                  Eiji Okamoto},
  title        = {Detection of Unexpected Services and Communication Paths in Networked
                  Systems},
  journal      = {J. Inf. Process.},
  volume       = {21},
  number       = {4},
  pages        = {632--639},
  year         = {2013},
  url          = {https://doi.org/10.2197/ipsjjip.21.632},
  doi          = {10.2197/IPSJJIP.21.632},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/HigurashiKKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/HigurashiKKO12,
  author       = {Ichita Higurashi and
                  Akira Kanaoka and
                  Masahiko Kato and
                  Eiji Okamoto},
  editor       = {Ehab Al{-}Shaer and
                  Xinming Ou and
                  Geoffrey G. Xie},
  title        = {Discovery of Unexpected Services and Communication Paths in Networked
                  Systems},
  booktitle    = {Automated Security Management [papers from SafeConfig 2012, Baltimore
                  Inner Harbor, MD, {USA]}},
  pages        = {169--178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-319-01433-3\_10},
  doi          = {10.1007/978-3-319-01433-3\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/HigurashiKKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/KatoMKKO12,
  author       = {Masahiko Kato and
                  Takumi Matsunami and
                  Akira Kanaoka and
                  Hiroshi Koide and
                  Eiji Okamoto},
  editor       = {Ehab Al{-}Shaer and
                  Xinming Ou and
                  Geoffrey G. Xie},
  title        = {Tracing Advanced Persistent Threats in Networked Systems},
  booktitle    = {Automated Security Management [papers from SafeConfig 2012, Baltimore
                  Inner Harbor, MD, {USA]}},
  pages        = {179--187},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-319-01433-3\_11},
  doi          = {10.1007/978-3-319-01433-3\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/KatoMKKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/KoedaK11,
  author       = {Masanao Koeda and
                  Masahiko Kato},
  editor       = {Constantine Stephanidis},
  title        = {Pen Tip Position Estimation Using Least Square Sphere Fitting for
                  Customized Attachments of Haptic Device},
  booktitle    = {{HCI} International 2011 - Posters' Extended Abstracts - International
                  Conference, {HCI} International 2011, Orlando, FL, USA, July 9-14,
                  2011, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {174},
  pages        = {340--344},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22095-1\_69},
  doi          = {10.1007/978-3-642-22095-1\_69},
  timestamp    = {Wed, 24 May 2017 08:28:59 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/KoedaK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/HaradaKOK10,
  author       = {Toshiki Harada and
                  Akira Kanaoka and
                  Eiji Okamoto and
                  Masahiko Kato},
  title        = {Identifying Potentially-Impacted Area by Vulnerabilities in Networked
                  Systems Using {CVSS}},
  booktitle    = {Tenth Annual International Symposium on Applications and the Internet,
                  {SAINT} 2010, Seoul, Korea, 19-23 July, 2010, Proceedings},
  pages        = {367--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SAINT.2010.105},
  doi          = {10.1109/SAINT.2010.105},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/HaradaKOK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics