Masahiko Kato

According to our database1, Masahiko Kato authored at least 18 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Low Resource and Power Consumption and Improved Classification Accuracy for IoT Implementation of a Malware Detection Mechanism using Processor Information.
Int. J. Netw. Comput., 2023

Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

2022
Evaluation of implementability in a malware detection mechanism using processor information.
Int. J. Netw. Comput., 2022

IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.
Int. J. Inf. Sec., 2022

Estimation of Driver Excitement by Semantic Differential Method and Correlation with Arousal Levels in Advanced Driver Assistance.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoT.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2020
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information.
Int. J. Inf. Sec., 2020

2019
Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism Using Processor Information.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

2017
Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information.
J. Inf. Process., 2017

2016
Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name.
J. Inf. Process., 2016

Defense Method of HTTP GET Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity.
J. Inf. Process., 2016

2015
HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources.
J. Inf. Process., 2015

2013
Detection of Unexpected Services and Communication Paths in Networked Systems.
J. Inf. Process., 2013

2012
Tracing Advanced Persistent Threats in Networked Systems.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Discovery of Unexpected Services and Communication Paths in Networked Systems.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

2011
Pen Tip Position Estimation Using Least Square Sphere Fitting for Customized Attachments of Haptic Device.
Proceedings of the HCI International 2011 - Posters' Extended Abstracts, 2011

2010
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010


  Loading...