Masahiko Kato
According to our database1,
Masahiko Kato
authored at least 21 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
1
2
1
1
2
1
1
3
2
2
1
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Small-Scale Implementation of a Hardware Detector for Malicious Communications and Malware Targeting the IoT.
Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024
Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024
Hardware Mechanism for Detecting Malicious Communication in IoT Devices by using Time-Series Processor Information.
Proceedings of the Twelfth International Symposium on Computing and Networking, 2024
2023
Low Resource and Power Consumption and Improved Classification Accuracy for IoT Implementation of a Malware Detection Mechanism using Processor Information.
Int. J. Netw. Comput., 2023
Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
2022
Evaluation of implementability in a malware detection mechanism using processor information.
Int. J. Netw. Comput., 2022
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.
Int. J. Inf. Sec., 2022
Estimation of Driver Excitement by Semantic Differential Method and Correlation with Arousal Levels in Advanced Driver Assistance.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022
Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoT.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
2020
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information.
Int. J. Inf. Sec., 2020
2019
Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism Using Processor Information.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
2017
Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information.
J. Inf. Process., 2017
2016
Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name.
J. Inf. Process., 2016
Defense Method of HTTP GET Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity.
J. Inf. Process., 2016
2015
HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources.
J. Inf. Process., 2015
2013
J. Inf. Process., 2013
2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
2011
Pen Tip Position Estimation Using Least Square Sphere Fitting for Customized Attachments of Haptic Device.
Proceedings of the HCI International 2011 - Posters' Extended Abstracts, 2011
2010
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010