Author of the publication

LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments.

, , , and . J. Cloud Comput., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments., , , and . J. Cloud Comput., (2018)Safe Route Carpooling to Avoid Accident Locations and Small-Scale Proof of Concept in Japan., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (7): 4239-4250 (July 2023)Low Resource and Power Consumption and Improved Classification Accuracy for IoT Implementation of a Malware Detection Mechanism using Processor Information., , and . Int. J. Netw. Comput., 13 (2): 149-172 (2023)RanSAP: An open dataset of ransomware storage access patterns for training machine learning models., , and . Digit. Investig., 40 (Supplement): 301314 (2022)Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information., , and . CANDARW, page 253-259. IEEE, (2023)IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core., , and . Int. J. Inf. Sec., 21 (4): 1-19 (2022)FIMAR: Fast incremental memory acquisition and restoration system for temporal-dimension forensic analysis., and . Forensic Sci. Int. Digit. Investig., (September 2023)Energy Reduction of BTB by Focusing on Number of Branches per Cache Line., , and . J. Inf. Process., 24 (3): 492-503 (2016)Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor., and . IoTSMS, page 393-398. IEEE, (2019)Evaluation of implementability in a malware detection mechanism using processor information., , and . Int. J. Netw. Comput., 12 (2): 253-269 (2022)