Hiroki Kuzuno
Orcid: 0000-0003-2686-2541
According to our database1,
Hiroki Kuzuno
authored at least 34 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., October, 2024
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions.
Int. J. Inf. Sec., October, 2024
Visualization Method for Open Source Software Risk Related to Vulnerability and Developmental Status Considering Dependencies.
J. Inf. Process., 2024
IACR Cryptol. ePrint Arch., 2024
2023
File Tracking and Visualization Methods Using a Network Graph to Prevent Information Leakage.
IEICE Trans. Inf. Syst., September, 2023
IEICE Trans. Inf. Syst., September, 2023
J. Inf. Process., 2023
Security Risk Indicator for Open Source Software to Measure Software Development Status.
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
2022
IEICE Trans. Inf. Syst., November, 2022
DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic.
Sensors, 2022
J. Inf. Process., 2022
J. Inf. Process., 2022
vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability.
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the Advances in Information and Computer Security, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
IEEE Access, 2021
Proceedings of the Advances in Information and Computer Security, 2021
FlushBlocker: Lightweight mitigating mechanism for CPU cache flush instruction based attacks.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
2020
Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism.
IEICE Trans. Inf. Syst., 2020
MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption.
Proceedings of the Advances in Information and Computer Security, 2020
2019
KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism.
Proceedings of the Information Security Practice and Experience, 2019
2018
IEICE Trans. Inf. Syst., 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Blockchain explorer: An analytical process and investigation environment for bitcoin.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
2016
Detecting and characterising of mobile advertisement network traffic using graph modelling.
Int. J. Space Based Situated Comput., 2016
2015
Detection of sensitive information leakage in Android applications using signature generation.
Int. J. Space Based Situated Comput., 2015
2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
2006
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006