​
Login / Signup
Masahiko Kato
Publication Activity (10 Years)
Years Active: 2010-2023
Publications (10 Years): 7
Top Topics
Countermeasures
Multiple Types
Detection Mechanism
Information Sources
Top Venues
J. Inf. Process.
CANDARW
SMC
Int. J. Inf. Sec.
</>
Publications
</>
Yutaro Matunaka
,
Ryotaro Kobayashi
,
Masahiko Kato
Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information.
CANDARW
(2023)
Taku Sudo
,
Ryotaro Kobayashi
,
Masahiko Kato
Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices.
CANDARW
(2023)
Masahiko Kato
,
Kenji Tanaka
Estimation of Driver Excitement by Semantic Differential Method and Correlation with Arousal Levels in Advanced Driver Assistance.
SMC
(2022)
Hayate Takase
,
Ryotaro Kobayashi
,
Masahiko Kato
,
Ren Ohmura
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information.
Int. J. Inf. Sec.
19 (1) (2020)
Takuro Yoshida
,
Kento Kawakami
,
Ryotaro Kobayashi
,
Masahiko Kato
,
Masayuki Okada
,
Hiroyuki Kishimoto
Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information.
J. Inf. Process.
25 (2017)
Yuya Takeuchi
,
Takuro Yoshida
,
Ryotaro Kobayashi
,
Masahiko Kato
,
Hiroyuki Kishimoto
Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name.
J. Inf. Process.
24 (5) (2016)
Ryotaro Kobayashi
,
Genki Otani
,
Takuro Yoshida
,
Masahiko Kato
Defense Method of HTTP GET Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity.
J. Inf. Process.
24 (5) (2016)
Mizuki Watanabe
,
Ryotaro Kobayashi
,
Masahiko Kato
HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources.
J. Inf. Process.
23 (5) (2015)
Ichita Higurashi
,
Akira Kanaoka
,
Masahiko Kato
,
Eiji Okamoto
Detection of Unexpected Services and Communication Paths in Networked Systems.
J. Inf. Process.
21 (4) (2013)
Ichita Higurashi
,
Akira Kanaoka
,
Masahiko Kato
,
Eiji Okamoto
Detection of Unexpected Services and Communication Paths in Networked Systems.
Inf. Media Technol.
8 (4) (2013)
Ichita Higurashi
,
Akira Kanaoka
,
Masahiko Kato
,
Eiji Okamoto
Discovery of Unexpected Services and Communication Paths in Networked Systems.
SafeConfig
(2012)
Masahiko Kato
,
Takumi Matsunami
,
Akira Kanaoka
,
Hiroshi Koide
,
Eiji Okamoto
Tracing Advanced Persistent Threats in Networked Systems.
SafeConfig
(2012)
Masanao Koeda
,
Masahiko Kato
Pen Tip Position Estimation Using Least Square Sphere Fitting for Customized Attachments of Haptic Device.
HCI (23)
(2011)
Toshiki Harada
,
Akira Kanaoka
,
Eiji Okamoto
,
Masahiko Kato
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS.
SAINT
(2010)