default search action
Masahiko Kato
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Mutsuki Deguchi, Masahiko Katoh, Ryotaro Kobayashi:
Low Resource and Power Consumption and Improved Classification Accuracy for IoT Implementation of a Malware Detection Mechanism using Processor Information. Int. J. Netw. Comput. 13(2): 149-172 (2023) - [c10]Yutaro Matunaka, Ryotaro Kobayashi, Masahiko Kato:
Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information. CANDARW 2023: 253-259 - [c9]Taku Sudo, Ryotaro Kobayashi, Masahiko Kato:
Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices. CANDARW 2023: 279-285 - 2022
- [j9]Kazuki Koike, Ryotaro Kobayashi, Masahiko Katoh:
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core. Int. J. Inf. Sec. 21(4): 1-19 (2022) - [j8]Mutsuki Deguchi, Masahiko Katoh, Ryotaro Kobayashi:
Evaluation of implementability in a malware detection mechanism using processor information. Int. J. Netw. Comput. 12(2): 253-269 (2022) - [c8]Mutsuki Deguchi, Masahiko Katoh, Ryotaro Kobayashi:
Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoT. CANDARW 2022: 288-294 - [c7]Masahiko Kato, Kenji Tanaka:
Estimation of Driver Excitement by Semantic Differential Method and Correlation with Arousal Levels in Advanced Driver Assistance. SMC 2022: 712-717 - 2021
- [c6]Mutsuki Deguchi, Masahiko Katoh, Ryotaro Kobayashi:
Evaluation of implementability in a malware detection mechanism using processor information. CANDAR (Workshops) 2021: 313-319 - 2020
- [j7]Hayate Takase, Ryotaro Kobayashi, Masahiko Kato, Ren Ohmura:
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information. Int. J. Inf. Sec. 19(1): 71-81 (2020)
2010 – 2019
- 2019
- [c5]Kazuki Koike, Ryotaro Kobayashi, Masahiko Katoh:
Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism Using Processor Information. CANDAR Workshops 2019: 339-345 - 2017
- [j6]Takuro Yoshida, Kento Kawakami, Ryotaro Kobayashi, Masahiko Kato, Masayuki Okada, Hiroyuki Kishimoto:
Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information. J. Inf. Process. 25: 854-865 (2017) - 2016
- [j5]Yuya Takeuchi, Takuro Yoshida, Ryotaro Kobayashi, Masahiko Kato, Hiroyuki Kishimoto:
Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name. J. Inf. Process. 24(5): 793-801 (2016) - [j4]Ryotaro Kobayashi, Genki Otani, Takuro Yoshida, Masahiko Kato:
Defense Method of HTTP GET Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity. J. Inf. Process. 24(5): 802-815 (2016) - 2015
- [j3]Mizuki Watanabe, Ryotaro Kobayashi, Masahiko Kato:
HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources. J. Inf. Process. 23(5): 655-663 (2015) - 2013
- [j2]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Detection of Unexpected Services and Communication Paths in Networked Systems. Inf. Media Technol. 8(4): 1251-1258 (2013) - [j1]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Detection of Unexpected Services and Communication Paths in Networked Systems. J. Inf. Process. 21(4): 632-639 (2013) - 2012
- [c4]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Discovery of Unexpected Services and Communication Paths in Networked Systems. SafeConfig 2012: 169-178 - [c3]Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto:
Tracing Advanced Persistent Threats in Networked Systems. SafeConfig 2012: 179-187 - 2011
- [c2]Masanao Koeda, Masahiko Kato:
Pen Tip Position Estimation Using Least Square Sphere Fitting for Customized Attachments of Haptic Device. HCI (23) 2011: 340-344 - 2010
- [c1]Toshiki Harada, Akira Kanaoka, Eiji Okamoto, Masahiko Kato:
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS. SAINT 2010: 367-370
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint