关注
Hiroki Kuzuno
Hiroki Kuzuno
 Kobe University
在 m.ieice.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Blockchain explorer: An analytical process and investigation environment for bitcoin
H Kuzuno, C Karam
2017 APWG symposium on electronic crime research (eCrime), 9-16, 2017
812017
Signature generation for sensitive information leakage in android applications
H Kuzuno, S Tonami
2013 IEEE 29th international conference on data engineering workshops (ICDEW …, 2013
272013
DOC-IDS: a deep learning-based method for feature extraction and anomaly detection in network traffic
N Yoshimura, H Kuzuno, Y Shiraishi, M Morii
Sensors 22 (12), 4405, 2022
122022
Detection of sensitive information leakage in Android applications using signature generation
H Kuzuno, S Tonami
International Journal of Space-Based and Situated Computing 5 (1), 53-62, 2015
92015
Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks
S Enomoto, H Kuzuno, H Yamada
IEICE TRANSACTIONS on Information and Systems 105 (11), 1890-1899, 2022
72022
Ad-hoc analytical framework of bitcoin investigations for law enforcement
H Kuzuno, G Tziakouris
IEICE TRANSACTIONS on Information and Systems 101 (11), 2644-2657, 2018
72018
A nonoutsourceable puzzle under ghost rule
G Zeng, SM Yiu, J Zhang, H Kuzuno, MH Au
2017 15th Annual Conference on Privacy, Security and Trust (PST), 35-358, 2017
72017
Android アプリケーションに対する情報フロー制御機構の提案
葛野弘樹
コンピュータセキュリティシンポジウム 2011 論文集 2011 (3), 155-160, 2011
72011
Detecting advertisement module network behavior with graph modeling
H Kuzuno, K Magata
2014 Ninth Asia Joint Conference on Information Security, 1-10, 2014
52014
Mitigation of kernel memory corruption using multiple kernel memory mechanism
H Kuzuno, T Yamauchi
IEEE Access 9, 111651-111665, 2021
42021
Detecting and characterising of mobile advertisement network traffic using graph modelling
H Kuzuno, K Magata
International Journal of Space-Based and Situated Computing 6 (2), 90-101, 2016
42016
AWide Area Log Analyzing System Based on Mobile Agents
T Katoh, H Kuzuno, T Kawahara, A Watanabe, Y Nakai, BB Bista, ...
2006 International Conference on Computational Inteligence for Modelling …, 2006
42006
KMO: kernel memory observer to identify memory corruption by secret inspection mechanism
H Kuzuno, T Yamauchi
International Conference on Information Security Practice and Experience, 75-94, 2019
32019
モバイルエージェントを用いた分散型インターネット観測システムの提案
葛野弘樹, 中井優志, 渡邊集, 川原卓也, 加藤貴司, 高田豊雄
情報処理学会論文誌 47 (5), 1393-1405, 2006
32006
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key
H Kuzuno, T Yamauchi
International Workshop on Security, 66-84, 2022
22022
Mitigating Foreshadow Side-channel Attack Using Dedicated Kernel Memory Mechanism
H Kuzuno, T Yamauchi
Journal of Information Processing 30, 796-806, 2022
22022
FlushBlocker: Lightweight mitigating mechanism for CPU cache flush instruction based attacks
S Enomoto, H Kuzuno
2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 74-79, 2021
22021
Constructing a Complete Timeline of a Security Incident by Aggregating Reports
H Kuzuno, S Inagaki, K Magata
2018 13th Asia Joint Conference on Information Security (AsiaJCIS), 109-115, 2018
22018
独自のカーネル用仮想記憶空間を用いたカーネルモジュール監視手法
葛野弘樹, 山内利宏
コンピュータセキュリティシンポジウム 2018 論文集 2018 (2), 971-978, 2018
22018
vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability
H Kuzuno, T Yamauchi
International Conference on Information Security Applications, 222-234, 2022
12022
系统目前无法执行此操作,请稍后再试。
文章 1–20