Masaki Hashimoto

Orcid: 0000-0001-5596-282X

According to our database1, Masaki Hashimoto authored at least 20 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Can We Create a TLS Lie Detector?
J. Inf. Process., 2024

An Analysis of Social Bot Activity on X in Modern Japan.
IEEE Access, 2024

Motivation and Educational Effectiveness in Teaching Expert Development Project by an Educational Community.
Proceedings of the IEEE Global Engineering Education Conference, 2024

An Analysis of the Relationship Between Black-Hat SEO Malware Families Leveraging Information from Redirected Fake E-Commerce Scam Sites.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

An Analysis of Relationship Between Social Bots and Echo Chambers on X in Modern Japan.
Proceedings of the Twelfth International Symposium on Computing and Networking, 2024

The Reality and Feature Analysis of Information Diffusion in Japanese Disinformation Examples.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024

2023
An Analysis of Socialbots Activity and Influence in Modern Japanese Social Media.
CoRR, 2023

An Automatic Detection System for Fake Japanese Shopping Sites Using fastText and LightGBM.
IEEE Access, 2023

Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models.
IEEE Access, 2023


2022
SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning.
IEICE Trans. Inf. Syst., 2022

2021
Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes.
Int. J. Inf. Sec., 2021

Identification of TLS Communications Using Randomness Testing.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
An Expert System for Classifying Harmful Content on the Dark Web.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

2019
Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

2018
Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Message from the NETSAP 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Image Super Resolution from Alignment Errors of Image Sensors and Spatial Light Modulators.
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 4: VISAPP, Porto, Portugal, February 27, 2017

2009
Policy Description Language for Dynamic Access Control Models.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009


  Loading...