Masahiko Kato
According to our database1,
Masahiko Kato
authored at least 18 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Low Resource and Power Consumption and Improved Classification Accuracy for IoT Implementation of a Malware Detection Mechanism using Processor Information.
Int. J. Netw. Comput., 2023
Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
2022
Evaluation of implementability in a malware detection mechanism using processor information.
Int. J. Netw. Comput., 2022
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.
Int. J. Inf. Sec., 2022
Estimation of Driver Excitement by Semantic Differential Method and Correlation with Arousal Levels in Advanced Driver Assistance.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022
Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoT.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
2020
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information.
Int. J. Inf. Sec., 2020
2019
Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism Using Processor Information.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
2017
Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information.
J. Inf. Process., 2017
2016
Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name.
J. Inf. Process., 2016
Defense Method of HTTP GET Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity.
J. Inf. Process., 2016
2015
HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources.
J. Inf. Process., 2015
2013
J. Inf. Process., 2013
2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
2011
Pen Tip Position Estimation Using Least Square Sphere Fitting for Customized Attachments of Haptic Device.
Proceedings of the HCI International 2011 - Posters' Extended Abstracts, 2011
2010
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010