BibTeX records: Hajime Shimada

download as .bib file

@article{DBLP:journals/access/HuHYS24,
  author       = {Zhenguo Hu and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency
                  Transformation and Machine Learning},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {2648--2659},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2023.3348234},
  doi          = {10.1109/ACCESS.2023.3348234},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HuHYS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuHYS23,
  author       = {Zhenguo Hu and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Realtime Malicious Traffic Detection Targeted for {TCP} Out-of-Order
                  Packets Based on {FPGA}},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {112212--112222},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3323853},
  doi          = {10.1109/ACCESS.2023.3323853},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuHYS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GaoHYS22,
  author       = {Yun Gao and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Malware Detection Using LightGBM With a Custom Logistic Loss Function},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {47792--47804},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3171912},
  doi          = {10.1109/ACCESS.2022.3171912},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GaoHYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GaoHYS22a,
  author       = {Yun Gao and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Malware Detection by Control-Flow Graph Level Representation Learning
                  With Graph Isomorphism Network},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {111830--111841},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3215267},
  doi          = {10.1109/ACCESS.2022.3215267},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GaoHYS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/GaoHYS22,
  author       = {Yun Gao and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  editor       = {Hong Va Leong and
                  Sahra Sedigh Sarvestani and
                  Yuuichi Teranishi and
                  Alfredo Cuzzocrea and
                  Hiroki Kashiwazaki and
                  Dave Towey and
                  Ji{-}Jiang Yang and
                  Hossain Shahriar},
  title        = {Malware Detection using Attributed {CFG} Generated by Pre-trained
                  Language Model with Graph Isomorphism Network},
  booktitle    = {46th {IEEE} Annual Computers, Software, and Applications Conferenc,
                  {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022},
  pages        = {1495--1501},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/COMPSAC54236.2022.00237},
  doi          = {10.1109/COMPSAC54236.2022.00237},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/GaoHYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KumazakiHYST22,
  author       = {Masahito Kumazaki and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Cyber Attack Stage Tracing System based on Attack Scenario Comparison},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {587--594},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010918200003120},
  doi          = {10.5220/0010918200003120},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KumazakiHYST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ShirakuraHYS21,
  author       = {Taiga Shirakura and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Potential Security Risks of Internationalized Domain Name Processing
                  for Hyperlink},
  booktitle    = {{IEEE} 45th Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2021, Madrid, Spain, July 12-16, 2021},
  pages        = {1092--1098},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/COMPSAC51774.2021.00149},
  doi          = {10.1109/COMPSAC51774.2021.00149},
  timestamp    = {Thu, 23 Sep 2021 08:33:11 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/ShirakuraHYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss2/KumazakiHYST21,
  author       = {Masahito Kumazaki and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  title        = {Incident Response Support System for Multi-Located Network by Correlation
                  Analysis of Individual Events},
  booktitle    = {{ICISS} 2021: The 4th International Conference on Information Science
                  and Systems, Edinburgh, United Kingdom, March 17-19, 2021},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3459955.3460592},
  doi          = {10.1145/3459955.3460592},
  timestamp    = {Tue, 10 Aug 2021 15:09:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss2/KumazakiHYST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/GaoHYS21,
  author       = {Yun Gao and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Malware Detection Using Gradient Boosting Decision Trees with Customized
                  Log Loss Function},
  booktitle    = {International Conference on Information Networking, {ICOIN} 2021,
                  Jeju Island, South Korea, January 13-16, 2021},
  pages        = {273--278},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICOIN50884.2021.9333999},
  doi          = {10.1109/ICOIN50884.2021.9333999},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/GaoHYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siguccs/KashiwazakiOSKS21,
  author       = {Hiroki Kashiwazaki and
                  Takuro Ozaki and
                  Hajime Shimada and
                  Yusuke Komiya and
                  Eisaku Sakane and
                  Kazuhiro Mishima and
                  Shiu Sakashita and
                  Nariyoshi Yamai and
                  Yoshiaki Kitaguchi and
                  Kensuke Miyashita},
  editor       = {Scott Trimmer and
                  Eric Handler and
                  Tom Wilk},
  title        = {Japanese Activities to bring online academic meetings against {COVID-19:}
                  How We Learned to Stop Worrying and Love the Online Meetings},
  booktitle    = {Proceedings of the 2021 {ACM} {SIGUCCS} Annual Conference, {SIGUCCS}
                  '21, Virtual Event, USA, March 14 - April 30, 2021},
  pages        = {54--59},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3419944.3441174},
  doi          = {10.1145/3419944.3441174},
  timestamp    = {Tue, 15 Jun 2021 11:31:37 +0200},
  biburl       = {https://dblp.org/rec/conf/siguccs/KashiwazakiOSKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MendsaikhanHYS20,
  author       = {Otgonpurev Mendsaikhan and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Quantifying the Significance and Relevance of Cyber-Security Text
                  Through Textual Similarity and Cyber-Security Knowledge Graph},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {177041--177052},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3027321},
  doi          = {10.1109/ACCESS.2020.3027321},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MendsaikhanHYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/MendsaikhanHYSB20,
  author       = {Otgonpurev Mendsaikhan and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Enkhbold Bataa},
  title        = {Identification of Cybersecurity Specific Content Using Different Language
                  Models},
  journal      = {J. Inf. Process.},
  volume       = {28},
  pages        = {623--632},
  year         = {2020},
  url          = {https://doi.org/10.2197/ipsjjip.28.623},
  doi          = {10.2197/IPSJJIP.28.623},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/MendsaikhanHYSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MendsaikhanHYS20,
  author       = {Otgonpurev Mendsaikhan and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Quantifying the Significance of Cybersecurity Text through Semantic
                  Similarity and Named Entity Recognition},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {325--332},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008913003250332},
  doi          = {10.5220/0008913003250332},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/MendsaikhanHYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/ZhangHYS20,
  author       = {Ziwei Zhang and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Rogue {AP} Detection using Similarity of Backbone Delay Fluctuation
                  Histogram},
  booktitle    = {2020 International Conference on Information Networking, {ICOIN} 2020,
                  Barcelona, Spain, January 7-10, 2020},
  pages        = {239--244},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICOIN48656.2020.9016480},
  doi          = {10.1109/ICOIN48656.2020.9016480},
  timestamp    = {Tue, 10 Mar 2020 14:04:26 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/ZhangHYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TobiyamaYHSAY19,
  author       = {Shun Tobiyama and
                  Yukiko Yamaguchi and
                  Hirokazu Hasegawa and
                  Hajime Shimada and
                  Mitsuaki Akiyama and
                  Takeshi Yagi},
  title        = {Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features
                  of Processes},
  journal      = {J. Inf. Process.},
  volume       = {27},
  pages        = {545--554},
  year         = {2019},
  url          = {https://doi.org/10.2197/ipsjjip.27.545},
  doi          = {10.2197/IPSJJIP.27.545},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/TobiyamaYHSAY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/MendsaikhanHYS19,
  author       = {Otgonpurev Mendsaikhan and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  editor       = {Vladimir Getov and
                  Jean{-}Luc Gaudiot and
                  Nariyoshi Yamai and
                  Stelvio Cimato and
                  J. Morris Chang and
                  Yuuichi Teranishi and
                  Ji{-}Jiang Yang and
                  Hong Va Leong and
                  Hossain Shahriar and
                  Michiharu Takemoto and
                  Dave Towey and
                  Hiroki Takakura and
                  Atilla El{\c{c}}i and
                  Susumu Takeuchi and
                  Satish Puri},
  title        = {Identification of Cybersecurity Specific Content Using the Doc2Vec
                  Language Model},
  booktitle    = {43rd {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1},
  pages        = {396--401},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMPSAC.2019.00064},
  doi          = {10.1109/COMPSAC.2019.00064},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/MendsaikhanHYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ZhangHYS19,
  author       = {Ziwei Zhang and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  editor       = {Vladimir Getov and
                  Jean{-}Luc Gaudiot and
                  Nariyoshi Yamai and
                  Stelvio Cimato and
                  J. Morris Chang and
                  Yuuichi Teranishi and
                  Ji{-}Jiang Yang and
                  Hong Va Leong and
                  Hossain Shahriar and
                  Michiharu Takemoto and
                  Dave Towey and
                  Hiroki Takakura and
                  Atilla El{\c{c}}i and
                  Susumu Takeuchi and
                  Satish Puri},
  title        = {Rogue Wireless {AP} Detection using Delay Fluctuation in Backbone
                  Network},
  booktitle    = {43rd {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1},
  pages        = {936--937},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMPSAC.2019.00149},
  doi          = {10.1109/COMPSAC.2019.00149},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/ZhangHYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CalderonHYS18,
  author       = {Paul Calderon and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Malware Detection based on {HTTPS} Characteristic via Machine Learning},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {410--417},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006654604100417},
  doi          = {10.5220/0006654604100417},
  timestamp    = {Wed, 11 Apr 2018 15:27:25 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CalderonHYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/TobiyamaYHSAY18,
  author       = {Shun Tobiyama and
                  Yukiko Yamaguchi and
                  Hirokazu Hasegawa and
                  Hajime Shimada and
                  Mitsuaki Akiyama and
                  Takeshi Yagi},
  title        = {A method for estimating process maliciousness with Seq2Seq model},
  booktitle    = {2018 International Conference on Information Networking, {ICOIN} 2018,
                  Chiang Mai, Thailand, January 10-12, 2018},
  pages        = {255--260},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICOIN.2018.8343120},
  doi          = {10.1109/ICOIN.2018.8343120},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/TobiyamaYHSAY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ItoHYS18,
  author       = {Katsutaka Ito and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Detecting Privacy Information Abuse by Android Apps from {API} Call
                  Logs},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {143--157},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_10},
  doi          = {10.1007/978-3-319-97916-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ItoHYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/OgawaYSTAY17,
  author       = {Hideki Ogawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura and
                  Mitsuaki Akiyama and
                  Takeshi Yagi},
  title        = {Malware originated {HTTP} traffic detection utilizing cluster appearance
                  ratio},
  booktitle    = {2017 International Conference on Information Networking, {ICOIN} 2017,
                  Da Nang, Vietnam, January 11-13, 2017},
  pages        = {248--253},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICOIN.2017.7899513},
  doi          = {10.1109/ICOIN.2017.7899513},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/OgawaYSTAY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KobayashiKS16,
  author       = {Ryotaro Kobayashi and
                  Ikumi Kaneko and
                  Hajime Shimada},
  title        = {Improvement of Data Utilization Efficiency for Cache Memory by Compressing
                  Frequent Bit Sequences},
  journal      = {{IEICE} Trans. Electron.},
  volume       = {99-C},
  number       = {8},
  pages        = {936--946},
  year         = {2016},
  url          = {https://doi.org/10.1587/transele.E99.C.936},
  doi          = {10.1587/TRANSELE.E99.C.936},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KobayashiKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KobayashiSS16,
  author       = {Ryotaro Kobayashi and
                  Kaoru Saito and
                  Hajime Shimada},
  title        = {Energy Reduction of {BTB} by Focusing on Number of Branches per Cache
                  Line},
  journal      = {J. Inf. Process.},
  volume       = {24},
  number       = {3},
  pages        = {492--503},
  year         = {2016},
  url          = {https://doi.org/10.2197/ipsjjip.24.492},
  doi          = {10.2197/IPSJJIP.24.492},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/KobayashiSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/HirutaYSTYA16,
  author       = {Shohei Hiruta and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura and
                  Takeshi Yagi and
                  Mitsuaki Akiyama},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Evaluation on Malware Classification by Session Sequence of Common
                  Protocols},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {521--531},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_31},
  doi          = {10.1007/978-3-319-48965-0\_31},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/HirutaYSTYA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HasegawaYST16,
  author       = {Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  title        = {An Automated {ACL} Generation System for Secure Internal Network},
  booktitle    = {40th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages        = {559--564},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMPSAC.2016.54},
  doi          = {10.1109/COMPSAC.2016.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/HasegawaYST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TobiyamaYSIY16,
  author       = {Shun Tobiyama and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Tomonori Ikuse and
                  Takeshi Yagi},
  title        = {Malware Detection with Deep Neural Network Using Process Behavior},
  booktitle    = {40th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages        = {577--582},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMPSAC.2016.151},
  doi          = {10.1109/COMPSAC.2016.151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TobiyamaYSIY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/HasegawaYST16,
  author       = {Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  title        = {An incident response support system based on seriousness of infection},
  booktitle    = {2016 International Conference on Information Networking, {ICOIN} 2016,
                  Kota Kinabalu, Malaysia, January 13-15, 2016},
  pages        = {69--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICOIN.2016.7427090},
  doi          = {10.1109/ICOIN.2016.7427090},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/HasegawaYST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShimomuraYUKS15,
  author       = {Yoshio Shimomura and
                  Hiroki Yamamoto and
                  Hayato Usui and
                  Ryotaro Kobayashi and
                  Hajime Shimada},
  title        = {{BTB} Energy Reduction by Focusing on Useless Accesses},
  journal      = {{IEICE} Trans. Electron.},
  volume       = {98-C},
  number       = {7},
  pages        = {569--579},
  year         = {2015},
  url          = {https://doi.org/10.1587/transele.E98.C.569},
  doi          = {10.1587/TRANSELE.E98.C.569},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShimomuraYUKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/HashimotoAKMSKK15,
  author       = {Masanori Hashimoto and
                  Dawood Alnajiar and
                  Hiroaki Konoura and
                  Yukio Mitsuyama and
                  Hajime Shimada and
                  Kazutoshi Kobayashi and
                  Hiroyuki Kanbara and
                  Hiroyuki Ochi and
                  Takashi Imagawa and
                  Kazutoshi Wakabayashi and
                  Takao Onoye and
                  Hidetoshi Onodera},
  title        = {Reliability-configurable mixed-grained reconfigurable array compatible
                  with high-level synthesis},
  booktitle    = {The 20th Asia and South Pacific Design Automation Conference, {ASP-DAC}
                  2015, Chiba, Japan, January 19-22, 2015},
  pages        = {14--15},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ASPDAC.2015.7058923},
  doi          = {10.1109/ASPDAC.2015.7058923},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aspdac/HashimotoAKMSKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LimYST15,
  author       = {Hyoyoung Lim and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Malware Classification Method Based on Sequence of Traffic Flow},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {230--237},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005235002300237},
  doi          = {10.5220/0005235002300237},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LimYST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KonouraAMSKKOIW14,
  author       = {Hiroaki Konoura and
                  Dawood Alnajiar and
                  Yukio Mitsuyama and
                  Hajime Shimada and
                  Kazutoshi Kobayashi and
                  Hiroyuki Kanbara and
                  Hiroyuki Ochi and
                  Takashi Imagawa and
                  Kazutoshi Wakabayashi and
                  Masanori Hashimoto and
                  Takao Onoye and
                  Hidetoshi Onodera},
  title        = {Reliability-Configurable Mixed-Grained Reconfigurable Array Supporting
                  C-Based Design and Its Irradiation Testing},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {12},
  pages        = {2518--2529},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.2518},
  doi          = {10.1587/TRANSFUN.E97.A.2518},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/KonouraAMSKKOIW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HironoYST14,
  author       = {Soshi Hirono and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  title        = {Development of a Secure Traffic Analysis System to Trace Malicious
                  Activities on Internal Networks},
  booktitle    = {{IEEE} 38th Annual Computer Software and Applications Conference,
                  {COMPSAC} 2014, Vasteras, Sweden, July 21-25, 2014},
  pages        = {305--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/COMPSAC.2014.41},
  doi          = {10.1109/COMPSAC.2014.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/HironoYST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HasegawaYST14,
  author       = {Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  title        = {A Countermeasure Recommendation System against Targeted Attacks with
                  Preserving Continuity of Internal Networks},
  booktitle    = {{IEEE} 38th Annual Computer Software and Applications Conference,
                  {COMPSAC} 2014, Vasteras, Sweden, July 21-25, 2014},
  pages        = {400--405},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/COMPSAC.2014.63},
  doi          = {10.1109/COMPSAC.2014.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/HasegawaYST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/ArakiYST14,
  author       = {Shohei Araki and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  editor       = {Chu Kiong Loo and
                  Keem Siah Yap and
                  Kok Wai Wong and
                  Andrew Teoh Beng Jin and
                  Kaizhu Huang},
  title        = {Unknown Attack Detection by Multistage One-Class {SVM} Focusing on
                  Communication Interval},
  booktitle    = {Neural Information Processing - 21st International Conference, {ICONIP}
                  2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8836},
  pages        = {325--332},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12643-2\_40},
  doi          = {10.1007/978-3-319-12643-2\_40},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/ArakiYST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoshimuraINYSN11,
  author       = {Kazuhiro Yoshimura and
                  Takuya Iwakami and
                  Takashi Nakada and
                  Jun Yao and
                  Hajime Shimada and
                  Yasuhiko Nakashima},
  title        = {An Instruction Mapping Scheme for {FU} Array Accelerator},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {94-D},
  number       = {2},
  pages        = {286--297},
  year         = {2011},
  url          = {https://doi.org/10.1587/transinf.E94.D.286},
  doi          = {10.1587/TRANSINF.E94.D.286},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoshimuraINYSN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/YaoMST11,
  author       = {Jun Yao and
                  Shinobu Miwa and
                  Hajime Shimada and
                  Shinji Tomita},
  title        = {A Fine-Grained Runtime Power/Performance Optimization Method for Processors
                  with Adaptive Pipeline Depth},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {26},
  number       = {2},
  pages        = {292--301},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11390-011-9436-3},
  doi          = {10.1007/S11390-011-9436-3},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/YaoMST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/YaoWYNSN11,
  author       = {Jun Yao and
                  Ryoji Watanabe and
                  Kazuhiro Yoshimura and
                  Takashi Nakada and
                  Hajime Shimada and
                  Yasuhiko Nakashima},
  title        = {An efficient and reliable 1.5-way processor by fusion of space and
                  time redundancies},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks
                  Workshops {(DSN-W} 2011), Hong Kong, China, June 27-30, 2011},
  pages        = {69--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DSNW.2011.5958838},
  doi          = {10.1109/DSNW.2011.5958838},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/YaoWYNSN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia2/0001SK10,
  author       = {Jun Yao and
                  Hajime Shimada and
                  Kazutoshi Kobayashi},
  editor       = {Kazuki Joe and
                  Alexander V. Veidenbaum},
  title        = {A Stage-Level Recovery Scheme in Scalable Pipeline Modules for High
                  Dependability},
  booktitle    = {International Workshop on Innovative Architecture for Future Generation
                  High Performance Processors and Systems, {IWIA} 2010, Hilo, Kohala
                  Coast, HI, USA, January 17-19, 2010},
  pages        = {21--29},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.ieeecomputersociety.org/10.1109/IWIA.2010.11},
  doi          = {10.1109/IWIA.2010.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia2/0001SK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/YaoWNSNK10,
  author       = {Jun Yao and
                  Ryoji Watanabe and
                  Takashi Nakada and
                  Hajime Shimada and
                  Yasuhiko Nakashima and
                  Kazutoshi Kobayashi},
  editor       = {Yutaka Ishikawa and
                  Dong Tang and
                  Hiroshi Nakamura},
  title        = {A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in
                  Pipeline Processors},
  booktitle    = {16th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2010, Tokyo, Japan, December 13-15, 2010},
  pages        = {237--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PRDC.2010.44},
  doi          = {10.1109/PRDC.2010.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/YaoWNSNK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YaoMST08,
  author       = {Jun Yao and
                  Shinobu Miwa and
                  Hajime Shimada and
                  Shinji Tomita},
  title        = {A Dynamic Control Mechanism for Pipeline Stage Unification by Identifying
                  Program Phases},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {91-D},
  number       = {4},
  pages        = {1010--1022},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietisy/e91-d.4.1010},
  doi          = {10.1093/IETISY/E91-D.4.1010},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YaoMST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigarch/YaoMST07,
  author       = {Jun Yao and
                  Shinobu Miwa and
                  Hajime Shimada and
                  Shinji Tomita},
  title        = {Optimal pipeline depth with pipeline stage unification adoption},
  journal      = {{SIGARCH} Comput. Archit. News},
  volume       = {35},
  number       = {5},
  pages        = {3--9},
  year         = {2007},
  url          = {https://doi.org/10.1145/1360464.1360470},
  doi          = {10.1145/1360464.1360470},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigarch/YaoMST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ishpc/YaoSNMT05,
  author       = {Jun Yao and
                  Hajime Shimada and
                  Yasuhiko Nakashima and
                  Shin{-}ichiro Mori and
                  Shinji Tomita},
  editor       = {Jes{\'{u}}s Labarta and
                  Kazuki Joe and
                  Toshinori Sato},
  title        = {Program Phase Detection Based Dynamic Control Mechanisms for Pipeline
                  Stage Unification Adoption},
  booktitle    = {High-Performance Computing - 6th International Symposium, {ISHPC}
                  2005, Nara, Japan, September 7-9, 2005, First International Workshop
                  on Advanced Low Power Systems, {ALPS} 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4759},
  pages        = {494--507},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77704-5\_46},
  doi          = {10.1007/978-3-540-77704-5\_46},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ishpc/YaoSNMT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/islped/ShimadaAS03,
  author       = {Hajime Shimada and
                  Hideki Ando and
                  Toshio Shimada},
  editor       = {Ingrid Verbauwhede and
                  Hyung Roh},
  title        = {Pipeline stage unification: a low-energy consumption technique for
                  future mobile processors},
  booktitle    = {Proceedings of the 2003 International Symposium on Low Power Electronics
                  and Design, 2003, Seoul, Korea, August 25-27, 2003},
  pages        = {326--329},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/871506.871587},
  doi          = {10.1145/871506.871587},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/islped/ShimadaAS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics