Hirokazu Hasegawa
According to our database1,
Hirokazu Hasegawa
authored at least 28 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning.
IEEE Access, 2024
2023
Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA.
IEEE Access, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
2022
Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network.
IEEE Access, 2022
IEEE Access, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 5th International Conference on Information Science and Systems, 2022
Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism Network.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
2021
Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function.
Proceedings of the International Conference on Information Networking, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Assessment System for Residual Risks of Information Leakage in Incident Countermeasures.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021
Incident Response Support System for Multi-Located Network by Correlation Analysis of Individual Events.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2020
J. Inf. Process., 2020
Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph.
IEEE Access, 2020
Proceedings of the 2020 International Conference on Information Networking, 2020
Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2019
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes.
J. Inf. Process., 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
2018
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
2016
Proceedings of the 2016 International Conference on Information Networking, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2014
A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2000
Proceedings of the ACM 2000 Java Grande Conference, San Francisco, CA, USA, 2000