Hirokazu Hasegawa

According to our database1, Hirokazu Hasegawa authored at least 28 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning.
IEEE Access, 2024

2023
Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA.
IEEE Access, 2023

Security Operation Support by Estimating Cyber Attacks Without Traffic Decryption.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network.
IEEE Access, 2022

Malware Detection Using LightGBM With a Custom Logistic Loss Function.
IEEE Access, 2022

Cyber Attack Stage Tracing System based on Attack Scenario Comparison.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

A Resource Importance Estimation Method Based on Proximity of Hierarchical Position.
Proceedings of the 5th International Conference on Information Science and Systems, 2022

Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism Network.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function.
Proceedings of the International Conference on Information Networking, 2021

A Dynamic Access Control System based on Situations of Users.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Assessment System for Residual Risks of Information Leakage in Incident Countermeasures.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021

Incident Response Support System for Multi-Located Network by Correlation Analysis of Individual Events.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021

Potential Security Risks of Internationalized Domain Name Processing for Hyperlink.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Identification of Cybersecurity Specific Content Using Different Language Models.
J. Inf. Process., 2020

Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph.
IEEE Access, 2020

Rogue AP Detection using Similarity of Backbone Delay Fluctuation Histogram.
Proceedings of the 2020 International Conference on Information Networking, 2020

Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes.
J. Inf. Process., 2019

Construction of Secure Internal Networks with Communication Classifying System.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Rogue Wireless AP Detection using Delay Fluctuation in Backbone Network.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Identification of Cybersecurity Specific Content Using the Doc2Vec Language Model.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Detecting Privacy Information Abuse by Android Apps from API Call Logs.
Proceedings of the Advances in Information and Computer Security, 2018

A method for estimating process maliciousness with Seq2Seq model.
Proceedings of the 2018 International Conference on Information Networking, 2018

Malware Detection based on HTTPS Characteristic via Machine Learning.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2016
An incident response support system based on seriousness of infection.
Proceedings of the 2016 International Conference on Information Networking, 2016

An Automated ACL Generation System for Secure Internal Network.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2014
A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2000
AJaPACK: experiments in performance portable parallel Java numerical libraries.
Proceedings of the ACM 2000 Java Grande Conference, San Francisco, CA, USA, 2000


  Loading...