Masahiko Kato

According to our database1, Masahiko Kato authored at least 21 papers between 2010 and 2024.

Collaborative distances:

Timeline

2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
1
2
1
1
2
1
1
3
2
2
1
2
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Small-Scale Implementation of a Hardware Detector for Malicious Communications and Malware Targeting the IoT.
Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024

Updatable Decision Tree in Malware Detection Hardware Using Processor Information.
Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024

Hardware Mechanism for Detecting Malicious Communication in IoT Devices by using Time-Series Processor Information.
Proceedings of the Twelfth International Symposium on Computing and Networking, 2024

2023
Low Resource and Power Consumption and Improved Classification Accuracy for IoT Implementation of a Malware Detection Mechanism using Processor Information.
Int. J. Netw. Comput., 2023

Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

2022
Evaluation of implementability in a malware detection mechanism using processor information.
Int. J. Netw. Comput., 2022

IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.
Int. J. Inf. Sec., 2022

Estimation of Driver Excitement by Semantic Differential Method and Correlation with Arousal Levels in Advanced Driver Assistance.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoT.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2020
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information.
Int. J. Inf. Sec., 2020

2019
Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism Using Processor Information.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

2017
Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information.
J. Inf. Process., 2017

2016
Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name.
J. Inf. Process., 2016

Defense Method of HTTP GET Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity.
J. Inf. Process., 2016

2015
HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources.
J. Inf. Process., 2015

2013
Detection of Unexpected Services and Communication Paths in Networked Systems.
J. Inf. Process., 2013

2012
Tracing Advanced Persistent Threats in Networked Systems.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Discovery of Unexpected Services and Communication Paths in Networked Systems.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

2011
Pen Tip Position Estimation Using Least Square Sphere Fitting for Customized Attachments of Haptic Device.
Proceedings of the HCI International 2011 - Posters' Extended Abstracts, 2011

2010
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010


  Loading...