Ryotaro Kobayashi

Orcid: 0000-0001-5956-3455

According to our database1, Ryotaro Kobayashi authored at least 34 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Is ChatGPT the Future of Causal Text Mining? A Comprehensive Evaluation and Analysis.
CoRR, 2024

2023
FIMAR: Fast incremental memory acquisition and restoration system for temporal-dimension forensic analysis.
Forensic Sci. Int. Digit. Investig., September, 2023

Safe Route Carpooling to Avoid Accident Locations and Small-Scale Proof of Concept in Japan.
IEEE Trans. Syst. Man Cybern. Syst., July, 2023

Low Resource and Power Consumption and Improved Classification Accuracy for IoT Implementation of a Malware Detection Mechanism using Processor Information.
Int. J. Netw. Comput., 2023

Summarization of Investment Reports Using Pre-trained Model.
Proceedings of the 14th IIAI International Congress on Advanced Applied Informatics, 2023

Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Real-Time Defense System using eBPF for Machine Learning-Based Ransomware Detection Method.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Poisoning Attacks against Network Intrusion Detection Systems Using Shapley Values to Identify Trends in Poisoning Data.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

Impact Analysis of Social Events on Industries through Narrative Causal Search.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Evaluation of implementability in a malware detection mechanism using processor information.
Int. J. Netw. Comput., 2022

IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.
Int. J. Inf. Sec., 2022

RanSAP: An open dataset of ransomware storage access patterns for training machine learning models.
Digit. Investig., 2022

Environmental Modeling for Motion-Copying System Using Element Description Method.
Proceedings of the IECON 2022, 2022

Koga2022 Dataset: Comprehensive Dataset with Detailed Classification for Network Intrusion Detection Systems.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoT.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
A machine learning-based NIDS that collects training data from within the organization and updates the discriminator periodically and automatically.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Motion-Copying System with Compensation of Environmental Changes for Calligraphy Robot.
Proceedings of the 17th IEEE International Conference on Advanced Motion Control, 2021

2020
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information.
Int. J. Inf. Sec., 2020

2019
Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism Using Processor Information.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

2018
LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments.
J. Cloud Comput., 2018

2017
Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information.
J. Inf. Process., 2017

WaybackVisor: Hypervisor-Based Scalable Live Forensic Architecture for Timeline Analysis.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name.
J. Inf. Process., 2016

Energy Reduction of BTB by Focusing on Number of Branches per Cache Line.
J. Inf. Process., 2016

Defense Method of HTTP GET Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity.
J. Inf. Process., 2016

Improvement of Data Utilization Efficiency for Cache Memory by Compressing Frequent Bit Sequences.
IEICE Trans. Electron., 2016

2015
HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources.
J. Inf. Process., 2015

BTB Energy Reduction by Focusing on Useless Accesses.
IEICE Trans. Electron., 2015

2008
Power consumption reduction scheme focusing on the Depth of Speculative Execution.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2002
A preactivating mechanism for a VT-CMOS cache using address prediction.
Proceedings of the 2002 International Symposium on Low Power Electronics and Design, 2002

1999
An On-Chip Multiprocessor Architecture with a Non-Blocking Synchronization Mechanism.
Proceedings of the 25th EUROMICRO '99 Conference, 1999


  Loading...