Manabu Hirano

Orcid: 0000-0001-9780-6454

According to our database1, Manabu Hirano authored at least 17 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
FIMAR: Fast incremental memory acquisition and restoration system for temporal-dimension forensic analysis.
Forensic Sci. Int. Digit. Investig., September, 2023


2022
RanSAP: An open dataset of ransomware storage access patterns for training machine learning models.
Digit. Investig., 2022

Teaching Expert Development Project by KOSEN Security Educational Community.
Proceedings of the IEEE Global Engineering Education Conference, 2022

Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2019
Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

2018
LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments.
J. Cloud Comput., 2018

2017
WaybackVisor: Hypervisor-Based Scalable Live Forensic Architecture for Timeline Analysis.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
A Log-Structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the Cloud.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Evaluation of a Sector-Hash Based Rapid File Detection Method for Monitoring Infrastructure-as-a-Service Cloud Platforms.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2013
Use of Role Based Access Control for Security-Purpose Hypervisors.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2009
BitVisor: a thin hypervisor for enforcing i/o device security.
Proceedings of the 5th International Conference on Virtual Execution Environments, 2009

A Two-Step Execution Mechanism for Thin Secure Hypervisors.
Proceedings of the Third International Conference on Emerging Security Information, 2009

T-PIM: Trusted Password Input Method against Data Stealing Malware.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Inter-device Communication Paradigm: Requirements Analysis for Its Security Mechanisms.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007


  Loading...