Ryotaro Kobayashi
Orcid: 0000-0001-5956-3455
According to our database1,
Ryotaro Kobayashi
authored at least 41 papers
between 1999 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
2025
0
1
2
3
4
5
6
7
8
9
10
2
1
3
3
1
1
1
4
2
1
4
6
4
2
2
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Real-time open-file backup system with machine-learning detection model for ransomware.
Int. J. Inf. Sec., February, 2025
RanSMAP: Open dataset of Ransomware Storage and Memory Access Patterns for creating deep learning based ransomware detectors.
Comput. Secur., 2025
2024
Is ChatGPT the Future of Causal Text Mining? A Comprehensive Evaluation and Analysis.
CoRR, 2024
Small-Scale Implementation of a Hardware Detector for Malicious Communications and Malware Targeting the IoT.
Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024
Reducing Testing Time in Penetration Test Automation by Using EPSS and Parallelization.
Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024
Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024
Hardware Mechanism for Detecting Malicious Communication in IoT Devices by using Time-Series Processor Information.
Proceedings of the Twelfth International Symposium on Computing and Networking, 2024
2023
FIMAR: Fast incremental memory acquisition and restoration system for temporal-dimension forensic analysis.
Forensic Sci. Int. Digit. Investig., September, 2023
Safe Route Carpooling to Avoid Accident Locations and Small-Scale Proof of Concept in Japan.
IEEE Trans. Syst. Man Cybern. Syst., July, 2023
Low Resource and Power Consumption and Improved Classification Accuracy for IoT Implementation of a Malware Detection Mechanism using Processor Information.
Int. J. Netw. Comput., 2023
Proceedings of the 14th IIAI International Congress on Advanced Applied Informatics, 2023
Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Real-Time Defense System using eBPF for Machine Learning-Based Ransomware Detection Method.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Poisoning Attacks against Network Intrusion Detection Systems Using Shapley Values to Identify Trends in Poisoning Data.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Evaluation of implementability in a malware detection mechanism using processor information.
Int. J. Netw. Comput., 2022
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.
Int. J. Inf. Sec., 2022
RanSAP: An open dataset of ransomware storage access patterns for training machine learning models.
Digit. Investig., 2022
Proceedings of the IECON 2022, 2022
Koga2022 Dataset: Comprehensive Dataset with Detailed Classification for Network Intrusion Detection Systems.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoT.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
2021
A machine learning-based NIDS that collects training data from within the organization and updates the discriminator periodically and automatically.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Motion-Copying System with Compensation of Environmental Changes for Calligraphy Robot.
Proceedings of the 17th IEEE International Conference on Advanced Motion Control, 2021
2020
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information.
Int. J. Inf. Sec., 2020
2019
Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism Using Processor Information.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
2018
LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments.
J. Cloud Comput., 2018
2017
Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information.
J. Inf. Process., 2017
WaybackVisor: Hypervisor-Based Scalable Live Forensic Architecture for Timeline Analysis.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
2016
Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name.
J. Inf. Process., 2016
J. Inf. Process., 2016
Defense Method of HTTP GET Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity.
J. Inf. Process., 2016
Improvement of Data Utilization Efficiency for Cache Memory by Compressing Frequent Bit Sequences.
IEICE Trans. Electron., 2016
2015
HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources.
J. Inf. Process., 2015
2008
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
2006
Inf. Media Technol., 2006
2002
Proceedings of the 2002 International Symposium on Low Power Electronics and Design, 2002
1999
An On-Chip Multiprocessor Architecture with a Non-Blocking Synchronization Mechanism.
Proceedings of the 25th EUROMICRO '99 Conference, 1999