Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RanSAP: An open dataset of ransomware storage access patterns for training machine learning models., , and . Digit. Investig., 40 (Supplement): 301314 (2022)LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments., , , and . J. Cloud Comput., (2018)Low Resource and Power Consumption and Improved Classification Accuracy for IoT Implementation of a Malware Detection Mechanism using Processor Information., , and . Int. J. Netw. Comput., 13 (2): 149-172 (2023)Safe Route Carpooling to Avoid Accident Locations and Small-Scale Proof of Concept in Japan., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (7): 4239-4250 (July 2023)Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information., , and . CANDARW, page 253-259. IEEE, (2023)Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor., and . IoTSMS, page 393-398. IEEE, (2019)FIMAR: Fast incremental memory acquisition and restoration system for temporal-dimension forensic analysis., and . Forensic Sci. Int. Digit. Investig., (September 2023)IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core., , and . Int. J. Inf. Sec., 21 (4): 1-19 (2022)Energy Reduction of BTB by Focusing on Number of Branches per Cache Line., , and . J. Inf. Process., 24 (3): 492-503 (2016)Evaluation of implementability in a malware detection mechanism using processor information., , and . Int. J. Netw. Comput., 12 (2): 253-269 (2022)