Papers - YAMAUCHI Toshihiro
-
Detecting Unintended Redirects to Malicious Websites on Android Devices Based on URL-Switching Interval Reviewed
Toshihiro Yamauchi, Rintaro Orito, Koji Ebisu, Masaya Sato
IEEE Access 12 153285 - 153294 2024.10
-
Mitsuaki Akiyama, Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, Toshihiro Yamauchi
Computers & Security 133 103389 - 103389 2023.10
-
Web access monitoring mechanism via Android WebView for threat analysis Reviewed International coauthorship
Yuta Imamura, Rintaro Orito, Hiroyuki Uekawa, Kritsana Chaikaew, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi
International Journal of Information Security 20 ( 6 ) 833 - 847 2021.12
-
スマートフォン端末におけるセキュリティ上の脅威と対策:権限昇格攻撃と悪性Webサイトへの誘導に焦点を当てて Invited Reviewed
山内 利宏
金融研究 40 ( 4 ) 25 - 54 2021.10
-
Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto
International Journal of Information Security 20 ( 4 ) 461 - 473 2021.8
-
Mitigating use-after-free attacks using memory-reuse-prohibited library Reviewed
Toshihiro Yamauchi, Yuta Ikegami, Yuya Ban
IEICE Transactions on Information and Systems E100D ( 10 ) 2295 - 2306 2017.10
-
Investigation Towards Detecting Landing Websites for Fake Japanese Shopping Websites
Daigo Michishita, Satoru Kobayashi, Toshihiro Yamauchi
Lecture Notes on Data Engineering and Communications Technologies 107 - 119 2025.4
-
Startup Program Identification for Efficient and Accurate IoT Security Investigations Reviewed
Yuta Shimamoto, Ryota Yoshimoto, Mitsuaki Akiyama, Toshihiro Yamauchi
Journal of Information Processing 33 55 - 65 2025.2
-
Poster: Towards SBOM-based Access Control for Transparent and Explicit Program Execution Reviewed
Yuta Shimamoto, Hiroyuki Uekawa, Mitsuaki Akiyama, Toshihiro Yamauchi
Network and Distributed System Security Symposium 2025 Posters (NDSS 2025 Posters) 2025.2
-
Investigation Towards Detecting Landing Websites for Fake Japanese Shopping Websites Reviewed
Investigation Towards Detecting Landing Websites for Fake Japanese Shopping Websites
2025.2
-
Developing the Flexible Conformance Test Execution Platform for OAuth 2.0-based Security Profiles Reviewed
Takashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi
Journal of Information Processing 33 168 - 183 2025.1
-
Ensuring Log Authenticity in System Audits with VMM-Based Evidence Collection Reviewed
Toru Nakamura, Hiroshi Ito, Jeuk Kang, Takamasa Isohara, Toshihiro Yamauchi
Journal of Internet Services and Information Security (JISIS) 2025
-
Proposal of Open Source Software Security Risk Indicator based on Vulnerability Management Interview Reviewed
Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van, der Ham, Toshihiro Yamauchi
Journal of Information Processing 32 1090 - 1104 2024.12
-
Evaluation of a Startup Program Identification for Efficient and Accurate IoT Security Investigations Reviewed
Yuta Shimamoto, Jiratchaya Phinyodom, Ryota Yoshimoto, Hiroyuki Uekawa, Mitsuaki Akiyama, Toshihiro Yamauchi
8th International Conference on Mobile Internet Security (MobiSec 2024) 1 - 12 2024.12
-
CPUアーキテクチャに依存しないIoTマルウェア分類木生成手法 Reviewed
大迫勇太郎, 山内利宏, 吉岡克成, 藤橋卓也, 渡辺 尚, 猿渡俊介
情報処理学会論文誌 65 ( 11 ) 1604 - 1617 2024.11
-
kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
2024 7th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2024) 66 - 73 2024.11
-
RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
18th International Conference on Network and System Security (NSS 2024) 15564 213 - 231 2024.11
-
仮想計算機モニタによる複数OSに対応したシステムコール検知箇所推定手法 Reviewed
大森 卓, 佐藤将也, 山内利宏, 谷口秀夫
情報処理学会論文誌 65 ( 9 ) 1374 - 1385 2024.9
-
Effectiveness of MAC Systems Based on LSM and Their Security Policy Configuration for Protecting IoT Devices Reviewed
Masato Miki, Toshihiro Yamauchi, Satoru Kobayashi
Journal of Internet Services and Information Security 14 ( 3 ) 293 - 315 2024.8
-
Mitigation of privilege escalation attack using kernel data relocation mechanism Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
International Journal of Information Security 23 3351 - 3367 2024.7
-
Automatic URL Signature Construction and Impact Assessment Reviewed
Shota Fujii, Nobutaka Kawaguchi, Tomoya Suzuki, Toshihiro Yamauchi
Information Engineering Express 10 ( 1 ) 2024.5
-
Security Risk Indicator for Open Source Software to Measure Software Development Status Reviewed International coauthorship
Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham, Toshihiro Yamauchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14402 143 - 156 2024.1
-
Identification of Vulnerable Kernel Code Using Kernel Tracing Mechanism Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
Journal of Information Processing(JIP) 31 ( 12 ) 788 - 801 2023.12
-
netroub: Towards an Emulation Platform for Network Trouble Scenarios Reviewed International coauthorship
Colin Regal-Mezin, Satoru Kobayashi, Toshihiro Yamauchi
Proceedings of 19th International Conference on emerging Networking EXperiments and Technologies Student Workshop Student Workshop 2023 (CoNEXT 2023),19th International Conference on emerging Networking EXperiments and Technologies Student Workshop 17 - 18 2023.12
-
Evaluation of Effectiveness of MAC Systems Based on LSM for Protecting IoT Devices Reviewed
Masato Miki, Toshihiro Yamauchi, Satoru Kobayashi
Proceedings of 2023 11th International Symposium on Computing and Networking (CANDAR2023),11th International Symposium on Computing and Networking 161 - 167 2023.11
-
Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE Reviewed
Kaito Shiba, Hiroki Kuzuno, Toshihiro Yamauchi
Proceedings of 2023 11th International Symposium on Computing and Networking Workshops (CANDARW2023),10th International Workshop on Information and Communication Security (WICS 2023) 274 - 278 2023.11
-
Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach Reviewed International coauthorship
Hervet Victor, Satoru Kobayashi, Toshihiro Yamauchi
Proceedings of 2023 11th International Symposium on Computing and Networking Workshops (CANDARW2023),10th International Workshop on Information and Communication Security (WICS 2023) 292 - 297 2023.11
-
Supporting multiple OS types on estimation of system call hook point by virtual machine monitor Reviewed
Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi
Proceedings of 2023 11th International Symposium on Computing and Networking Workshops (CANDARW2023),10th International Workshop on Information and Communication Security (WICS 2023) 267 - 278 2023.11
-
Policy-based method for applying OAuth 2.0-based security profiles Reviewed
Takashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi
IEICE Transactions on Information and Systems E106-D ( 9 ) 1364 - 1379 2023.9
-
Protection Mechanism of Kernel Data Using Memory Protection Key Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
IEICE Transactions on Information and Systems E106-D ( 9 ) 1326 - 1338 2023.9
-
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi
Journal of Information Processing 31 ( 9 ) 578 - 590 2023.9
-
KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
Lecture Notes in Computer Science (LNCS), 17th International Conference on Network and System Security (NSS 2023) 13983 61 - 76 2023.8
-
Memory Analysis Based Estimation of Hook Point by Virtual Machine Monitor Reviewed
Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi
International Journal of Networking and Computing 13 ( 2 ) 273 - 286 2023.7
-
Non real-time data transmission performance analysis of PROFINET for assuring data transmission quality Reviewed
Takashi Norimatsu, Toshihiro Yamauchi
Proceedings of 2023 5th International Conference on Computer Communication and the Internet (ICCCI) 236 - 244 2023.6
-
Proposal and Evaluation of a Log Collection and Visualization Method for Malicious Website Access in Android Reviewed
Shuichi Ichioka, Chiaki Kawashima, Masaya Sato, Toshihiro Yamauchi
Transactions of Information Processing Society of Japan 64 ( 4 ) 892 - 903 2023.4
-
vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
Lecture Notes in Computer Science (LNCS),The 23rd World Conference on Information Security Applications (WISA 2022) 13720 222 - 234 2023.1
-
Mitigating Foreshadow Side-channel Attack Using Dedicated Kernel Memory Mechanism Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
Journal of Information Processing 30 796 - 806 2022.12
-
Shota Fujii, Rei Yamagishi, Toshihiro Yamauchi
Journal of Information Processing 30 807 - 821 2022.12
-
Hook Point Estimation of Monitoring Address for System Call Detection by Virtual Machine Monitor Reviewed
Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi
Proceedings of 2022 Tenth International Symposium on Computing and Networking Workshops 358 - 362 2022.11
-
Implementation and Evaluation of Function for Tracing Diffusion of Classified Information to Support Multiple Cores and VMs on KVM Reviewed
大谷航平, 岡崎俊樹, 山内利宏, 森山英明, 佐藤将也, 谷口秀夫
63 ( 9 ) 1398 - 1409 2022.9
-
Prevention of Kernel Memory Corruption Using Kernel Page Restriction Mechanism. Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
Journal of Information Processing 30 563 - 576 2022.9
-
Analysis of Android Applications Shared on Twitter Focusing on Accessibility Services. Reviewed International coauthorship
Shuichi Ichioka, Estelle Pouget, Takao Mimura, Jun Nakajima, Toshihiro Yamauchi
Journal of Information Processing 30 601 - 612 2022.9
-
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key. Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
17th International Workshop on Security (IWSEC 2022) Lecture Notes in Computer Science (LNCS) 13504 66 - 84 2022.8
-
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs. Reviewed
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi
17th International Workshop on Security (IWSEC 2022) Lecture Notes in Computer Science (LNCS) 13504 85 - 104 2022.8
-
Design and Implementation of System for URL Signature Construction and Impact Assessment Reviewed
Shota Fujii, Nobutaka Kawaguchi, Shoya Kojima, Tomoya Suzuki, Toshihiro Yamauchi
Proceedings of 2022 11th International Congress on Advanced Applied Informatics (IIAI-AAI 2022) 95 - 100 2022.7
-
Improving Transparency of Hardware Breakpoints with Virtual Machine Introspection. Reviewed
Masaya Sato, Ryosuke Nakamura, Toshihiro Yamauchi, Hideo Taniguchi
Proceedings of 2022 11th International Congress on Advanced Applied Informatics (IIAI-AAI 2022) 113 - 117 2022.7
-
Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak. Reviewed
Takashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi
Lecture Notes in Informatics (LNI) P-325 87 - 98 2022.6
-
Malware Classification by Deep Learning Using Characteristics of Hash Functions Reviewed
Takahiro Baba, Kensuke Baba, Toshihiro Yamauchi
Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) 2 480 - 481 2022.3
-
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM. Reviewed
Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi
Journal of Internet Services and Information Security (JISIS) 12 ( 1 ) 26 - 43 2022.2
-
Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM Reviewed
Kohei Otani, Toshiki Okazaki, Toshihiro Yamauchi, Hideaki Moriyama, Masaya Sato, Hideo Taniguchi
Proceedings of 2021 nineth International Symposium on Computing and Networking Workshops, 8th International Workshop on Information and Communication Security (WICS 2021) 352 - 358 2021.11
-
石原聖, 佐藤将也, 佐藤将也, 山内利宏
情報処理学会論文誌ジャーナル(Web) 62 ( 9 ) 1536 - 1548 2021.9
-
KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12835 LNCS 45 - 63 2021.9
-
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring Reviewed
Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12835 LNCS 64 - 73 2021.9
-
Physical Memory Management with Two Page Sizes in Tender OS. Reviewed
Koki Kusunoki, Toshihiro Yamauchi, Hideo Taniguchi
Lecture Notes in Networks and Systems 313 238 - 248 2021.9
-
Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism. Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
IEEE Access 9 111651 - 111665 2021.8
-
Analysis of commands of Telnet logs illegally connected to IoT devices Reviewed
Toshihiro Yamauchi, Ryota Yoshimoto, Takahiro Baba, Katsunari Yoshioka
Proceedings of 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI 2021) 913 - 915 2021.7
-
Implementation and Evaluation of Resource Pooling Function for High-speed Process Creation Reviewed
谷口秀夫, 山内利宏, 田村大
情報処理学会論文誌ジャーナル(Web) 62 ( 2 ) 443 - 454 2021.2
-
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM Reviewed
Moriyama, H., Yamauchi, T., Sato, M., Taniguchi, H.
Advances in Intelligent Systems and Computing 1264 AISC 338 - 349 2021.1
-
Accessibility service utilization rates in android applications shared on Twitter Reviewed
Ichioka, S., Pouget, E., Mimura, T., Nakajima, J., Yamauchi, T.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12583 LNCS 101 - 111 2020.12
-
Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites. Reviewed
Takashi Ishihara, Masaya Sato, Toshihiro Yamauchi
Proceedings - 2020 8th International Symposium on Computing and Networking Workshops, CANDARW 2020 328 - 333 2020.11
-
Privilege Escalation Attack Prevention Method by Focusing on Privilege Changes on 64-bit ARM Reviewed
61 ( 9 ) 1531 - 1541 2020.9
-
Privilege Escalation Attack Prevention Method Focusing on Privilege Changes in Guest OS on KVM Reviewed
61 ( 9 ) 1507 - 1518 2020.9
-
Method to Reduce Redundant Security Policy Using SELinux CIL Reviewed
61 ( 9 ) 1519 - 1530 2020.9
-
MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption. Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12231 LNCS 97 - 116 2020.9
-
Identification of kernel memory corruption using kernel memory secret observation mechanism Reviewed
Kuzuno, H., Yamauchi, T.
IEICE Transactions on Information and Systems E103D ( 7 ) 1462 - 1475 2020.7
-
Support System for Assessing Anti-analysis JavaScript Code by Using Proxy Objects Reviewed
61 ( 6 ) 1134 - 1145 2020.6
-
第3編―情報技術の発展と展望 [CSEC]コンピュータセキュリティ研究会
山内 利宏
情報処理学会60年のあゆみ 2020
-
Method for Delegating I/O Functions to Linux in AnT Operating System Reviewed
60 ( 12 ) 2279 - 2290 2019.12
-
Threat Analysis of Fake Virus Alerts Using WebView Monitor Reviewed International coauthorship
Yuta Imamura, Rintaro Orito, Kritsana Chaikaew, Celia Manardo, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi
Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019 28 - 36 2019.11
-
KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11879 LNCS 75 - 94 2019.11
-
仮想計算機を利用した性能プロファイリングシステムの分散化とデータ収集停止時間の短縮 Reviewed
山本 昌生,中島 耕太,山内 利宏,名古屋 彰,谷口 秀夫
電子情報通信学会論文誌D J102-D ( 10 ) 674 - 684 2019.10
-
(Short Paper) method for preventing suspicious web access in android WebView Reviewed
Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11689 LNCS 241 - 250 2019.8
-
Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi
Int. J. Space Based Situated Comput. 9 ( 1 ) 1 - 10 2019.5
-
Hiding File Manipulation of Essential Services by System Call Proxy Reviewed
Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi
Lecture Notes on Data Engineering and Communications Technologies 22 853 - 863 2019.3
-
60 ( 2 ) 430 - 439 2019.2
-
Live Forensic Method Using Process Duplication to Maintain High System Availability Reviewed
60 ( 2 ) 696 - 705 2019.2
-
Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto
DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing 1 - 8 2019.1
-
Masao Yamamoto, Kohta Nakashima, Toshihiro Yamauchi, Akira Nagoya, Hideo Taniguchi
Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018 152 - 158 2018.12
-
Mitigating use-after-free attack using library considering size and number of freed memory Reviewed
Yuya Ban, Toshihiro Yamauchi
Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018 398 - 404 2018.12
-
マルチコア環境におけるスケジューラ連携による優先度逆転抑制法 Reviewed
鴨生悠冬, 山内利宏, 谷口秀夫
電子情報通信学会論文誌D J101-D ( 6 ) 998 - 1008 2018.6
-
Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi
Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017 2018-January 463 - 468 2018.4
-
Web access monitoring mechanism for Android WebView Reviewed
Yuta Imamura, Hiroyuki Uekawa, Yasuhiro Ishihara, Masaya Sato, Toshihiro Yamauchi
ACM International Conference Proceeding Series 1 - 8 2018.1
-
Access control mechanism to mitigate cordova plugin attacks in hybrid applications Reviewed
Naoki Kudo, Toshihiro Yamauchi, Thomas H. Austin
Journal of Information Processing 26 396 - 405 2018.1
-
ディレクトリ優先方式における未参照バッファ数に着目した入出力バッファ分割法 Reviewed
横山和俊, 土谷彰義, 山本光一, 河辺誠弥, 山内利宏, 乃村能成, 谷口秀夫
電子情報通信学会論文誌D J101-D ( 1 ) 46 - 56 2018
-
Kernel rootkits detection method by monitoring branches using hardware features Reviewed
Toshihiro Yamauchi, Yohei Akao
IEICE Transactions on Information and Systems E100D ( 10 ) 2377 - 2381 2017.10
-
Access control for plugins in cordova-based hybrid applications Reviewed
Naoki Kudo, Toshihiro Yamauchi, Thomas H. Austin
Proceedings - International Conference on Advanced Information Networking and Applications, AINA 1063 - 1069 2017.5
-
KRGuard: Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features Reviewed
Yohei Akao, Toshihiro Yamauchi
ICISS 2016 - 2016 International Conference on Information Science and Security 100-D ( 10 ) 22 - 26 2017.3
-
Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi
Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016 635 - 641 2017.1
-
Rule-based sensor data aggregation system for M2M gateways Reviewed
Yuichi Nakamura, Akira Moriguchi, Masanori Irie, Taizo Kinoshita, Toshihiro Yamauchi
IEICE Transactions on Information and Systems E99D ( 12 ) 2943 - 2955 2016.12
-
プロセス間通信を抑制しデータ共有するマイクロカーネル構造OS向けファイル操作機能の実現と評価 Reviewed
江原寛人, 枡田圭祐, 山内利宏, 谷口秀夫
電子情報通信学会論文誌D J99-D ( 10 ) 1069 - 1079 2016.10
-
Toshihiro Yamauchi, Yuta Ikegami
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9955 LNCS 219 - 234 2016.9
-
Implementation and Evaluation of Partitioning Method of I/O Buffer Based on Cache Hit Ratio Reviewed
57 ( 6 ) 1539 - 1553 2016.6
-
Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi
Journal of Supercomputing 72 ( 5 ) 1841 - 1861 2016.5
-
Plate: Persistent memory management for nonvolatile main memory Reviewed
Toshihiro Yamauchi, Yuta Yamamoto, Kengo Nagai, Tsukasa Matono, Shinji Inamoto, Masaya Ichikawa, Masataka Goto, Hideo Taniguchi
Proceedings of the ACM Symposium on Applied Computing 04-08-April-2016 1885 - 1892 2016.4
-
Attacker Investigation System Triggered by Information Leakage Reviewed
Yuta Ikegami, Toshihiro Yamauchi
Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015 24 - 27 2016.1
-
Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features Reviewed
Yohei Akao, Toshihiro Yamauchi
Proceedings - 2015 IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015 721 - 722 2016.1
-
Design of function for tracing diffusion of classified information for IPC on KVM Reviewed
Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi
Journal of Information Processing 24 ( 5 ) 781 - 792 2016
-
Toshihiro Yamauchi
IEICE Trans. Inf. Syst. 99-D ( 4 ) 785 - 786 2016
-
Fast control method of software-managed TLB for reducing zero-copy communication overhead Reviewed
Toshihiro Yamauchi, Masahiro Tsuruya, Hideo Taniguchi
IEICE Transactions on Information and Systems E98D ( 12 ) 2187 - 2191 2015.12
-
マルチコア向けAnTオペレーティングシステムのファイル操作における分散効果の評価 Reviewed
河上 裕太, 山内 利宏, 谷口 秀夫
マルチマディア通信と分散処理ワークショップ2015論文集 2015 ( 5 ) 100 - 106 2015.10
-
Process hiding by virtual machine monitor for attack avoidance Reviewed
Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi
Journal of Information Processing 23 ( 5 ) 673 - 682 2015.9
-
Dynamic Control Method for Sending User Information Using TaintDroid Reviewed
56 ( 9 ) 1857 - 1867 2015.9
-
Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi
Journal of Information Processing 23 ( 5 ) 664 - 672 2015.9
-
Setting Method of Opportunity of Updating File Importance on FFU Reviewed
56 ( 6 ) 1451 - 1462 2015.6
-
Jing Yu, Toshihiro Yamauchi
IEICE Transactions on Information and Systems E98D ( 4 ) 807 - 811 2015.4
-
CSDA: Rule-based complex sensor data aggregation system for M2M gateway Reviewed
Yuichi Nakamura, Akira Moriguchi, Toshihiro Yamauchi
2015 8th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2015 108 - 113 2015.3
-
Malware detection method focusing on anti-debugging functions Reviewed
Kota Yoshizaki, Toshihiro Yamauchi
Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014 563 - 566 2015.2
-
Design of a Function for Tracing the Diffusion of Classified Information for File Operations with a KVM Reviewed
Shota Fujii, Toshihiro Yamauchi, Hideo Taniguchi
Proceedings of the 2015 International Symposium on Advances in Computing, Communications, Security, and Applications (ACSA 2015) 77 2015
-
Secure and fast log transfer mechanism for virtual machine Reviewed
Masaya Sato, Toshihiro Yamauchi
Journal of Information Processing 22 ( 4 ) 597 - 608 2014.10
-
Proposal of Kernel Rootkits Detection Method by Comparing Kernel Stack Reviewed
55 ( 9 ) 2047 - 2060 2014.9
-
7 ( 3 ) 25 - 36 2014.8
-
Complicating process identification by replacing process information for attack avoidance Reviewed
Masaya Sato, Toshihiro Yamauchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8639 LNCS 33 - 47 2014.8
-
A new OS structure for simplifying understanding of operating system behavior Reviewed
Toshihiro Yamauchi, Akira Kinoshita, Taisuke Kawahara, Hideo Taniguchi
Information (Japan) 17 ( 5 ) 1945 - 1950 2014.5
-
Implementation and Evaluation of Software Control Method for TLB on Microkernel OS
TSURUYA Masahiro, YAMAUCHI Toshihiro, TANIGUCHI Hideo
The IEICE transactions on information and systems (Japanese edition) 97 ( 1 ) 216 - 225 2014.1
-
Shunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi
Journal of Internet Services and Information Security 4 ( 2 ) 55 - 69 2014
-
KRGuard: Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features Reviewed
Yohei Akao, Toshihiro Yamauchi
2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS) 22 - 26 2014
-
Implementation of the Localized Exclusive Control for Multi-core Tender
Takahiro Yamamoto, Toshihiro Yamauchi, Hideo Taniguchi
2013 ( 2013 ) 14 - 23 2013.11
-
Secure log transfer by replacing a library in a virtual machine Reviewed
Masaya Sato, Toshihiro Yamauchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8231 LNCS 1 - 18 2013.11
-
Access control to prevent attacks exploiting vulnerabilities of WebView in android OS Reviewed
Jing Yu, Toshihiro Yamauchi
Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 1628 - 1633 2013.11
-
Implementation of a Method for Dynamic Control of Application Programs by Extending SEAndroid Reviewed
Shinya Yagi, Toshihiro Yamauchi
Journal of Information Processing 54 ( 9 ) 2220 - 2231 2013.9
-
RL-001 Kernel Level Rootkits Detection System by Comparing Kernel Stack Reviewed
Ikegami Yuta, Yamauchi Toshihiro
12 ( 4 ) 1 - 6 2013.8
-
Implementation of Distribution Method of OS processing for Hign Throughput
Takeshi Sakoda, Toshihiro Yamauchi, Hideo Taniguchi
2013 ( 2013 ) 1663 - 1670 2013.7
-
A mechanism for achieving a bound on execution performance of process group to limit CPU abuse
Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi
Journal of Supercomputing 65 ( 1 ) 38 - 60 2013.7
-
TSUCHIYA Akiyoshi, MATSUBARA Takahiro, YAMAUCHI Toshihiro, TANIGUCHI Hideo
The IEICE transactions on information and systems (Japanese edetion) 96 ( 3 ) 506 - 518 2013.3
-
External Storage Mechanism for Preserving File Access Log with Virtualization Technology
54 ( 2 ) 585 - 595 2013.2
-
DroidTrack: Tracking information diffusion and preventing information leakage on android
Syunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi
Lecture Notes in Electrical Engineering 240 LNEE 243 - 251 2013
-
Nobuto Otsubo, Shinichiro Uemura, Toshihiro Yamauchi, Hideo Taniguchi
Lecture Notes in Electrical Engineering 240 LNEE 235 - 242 2013
-
Evaluation of load balancing in multicore processor for AnT
Takeshi Sakoda, Toshihiro Yamauchi, Hideo Taniguchi
Proceedings - 16th International Conference on Network-Based Information Systems, NBiS 2013 360 - 365 2013
-
53 ( 9 ) 2171 - 2181 2012.9
-
VMM-based log-tampering and loss detection scheme Reviewed
Masaya Sato, Toshihiro Yamauchi
Journal of Internet Technology 13 ( 4 ) 655 - 666 2012.7
-
MORIYAMA Hideaki, YAMAUCHI Toshihiro, NOMURA Yoshinari, TANIGUCHI Hideo
The IEICE transactions on information and systems (Japanese edetion) 95 ( 3 ) 400 - 411 2012.3
-
SELinuxの不要なセキュリティポリシ削減の自動化手法の提案 Reviewed
矢儀 真也,中村 雄一,山内 利宏
情報処理学会論文誌 コンピューティングシステム(ACS) 5 ( 2 ) 63 - 73 2012.3
-
Logging System to Prevent Tampering and Loss with Virtual Machine Monitor
53 ( 2 ) 847 - 856 2012.2
-
Novel control method for preventing missed deadlines in periodic scheduling
Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi
Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012 459 - 464 2012
-
LSMPMON: Performance evaluation mechanism of LSM-based secure OS
Toshihiro Yamauchi, Kenji Yamamoto
International Journal of Security and its Applications 6 ( 2 ) 81 - 90 2012
-
Design of an OS Architecture that Simplifies Understanding of Operating System Behavior
Toshihiro Yamauchi, Akira Kinoshita, Taisuke Kawahara, Hideo Taniguchi
Proceedings of 2012 International Conference on Information Technology and Computer Science (ITCS 2012) 51 - 58 2012
-
Proposal of a Method to Automatically Reduce Redundant Security Policy of SELinux
5 ( 2011 ) 84 - 94 2011.11
-
Limiting Use of Tokens for Improvement of Bayesian Filter
52 ( 9 ) 2686 - 2696 2011.9
-
Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSMPMON
52 ( 9 ) 2596 - 2601 2011.9
-
VMBLS: Virtual machine based logging scheme for prevention of tampering and loss Reviewed
Masaya Sato, Toshihiro Yamauchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 6908 LNCS 176 - 190 2011.8
-
Implementation and Evaluation for Sophisticated Periodic Execution Control in Embedded Systems
Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi
International Journal of Control and Automation 4 ( 2 ) 59 - 78 2011
-
Control method of multiple services for CMP based on continuation model
Hideaki Moriyama, Toshihiro Yamauchi, Hideo Taniguchi
Proceedings - 4th International Conference on Interaction Sciences: IT, Human and Digital Content, ICIS 2011 2011 ( 29 ) 83 - 89 2011
-
Evaluation of performance of secure OS using performance evaluation mechanism of LSM-based LSMPMON Reviewed
Kenji Yamamoto, Toshihiro Yamauchi
Communications in Computer and Information Science 122 CCIS 57 - 67 2010.12
-
KADO Naofumi, YAMAUCHI Toshihiro, TANIGUCHI Hideo
The IEICE transactions on information and systems 93 ( 11 ) 2380 - 2389 2010.11
-
Converting Linux LKM Device Driver into Concrete Process in AnT Operating System
SHIMAZAKI Yutaka, YAMAUCHI Toshihiro, NOMURA Yoshinari, TANIGUCHI Hideo
The IEICE transactions on information and systems 93 ( 10 ) 1990 - 2000 2010.10
-
Proposal of I/O Buffer Cache Mechanism Based on the Frequency of System Call of the File Operation
3 ( 1 ) 50 - 60 2010.3
-
A mechanism that bounds execution performance for process group for mitigating CPU abuse
Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi
Communications in Computer and Information Science 122 CCIS 84 - 93 2010
-
SELinux security policy configuration system with higher level language
Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi
Journal of Information Processing 18 201 - 212 2010
-
ISIPC: Instant synchronous interprocess communication
Toshihiro Yamauchi, Kazuhiro Fukutomi, Hideo Taniguchi
Journal of Next Generation Information Technology 1 ( 3 ) 75 - 83 2010
-
Proposal for sophisticated periodic execution control in embedded systems
Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 6485 LNCS 549 - 563 2010
-
Proposal of I/O Buffer Cache Mechanism Based on the Frequency of System Call of the File Operation
片上達也, 田端利宏, 谷口秀夫
情報処理学会論文誌トランザクション(CD-ROM) 2009 ( 2 ) 2010
-
Evaluation of Dynamic OS Server Replacement Mechanism fo AnT
2009 ( 9 ) 261 - 266 2009.9
-
Tracing Classified Information Diffusion for Protecting Information Leakage
Toshihiro Tabata, Satoshi Hakomori, Kei Ohashi, Shinichiro Uemura, Kazutoshi Yokoyama, Hideo Taniguchi
50 ( 9 ) 2088 - 2102 2009.9
-
Tracing Classified Information Diffusion for Protecting Information Leakage
田端利宏, 箱守聰, 大橋慶, 植村晋一郎, 横山和俊, 谷口秀夫
情報処理学会論文誌ジャーナル(CD-ROM) 50 ( 9 ) 2088 - 2102 2009.9
-
Design and Implementation of Performance Evaluation Function of Secure OS Based on LSM
MATSUDA Naoto, SATO Kazuya, TABATA Toshihiro, MUNETOH Seiji
The IEICE transactions on information and systems 92 ( 7 ) 963 - 974 2009.7
-
Implementation and Evaluation of Heterogeneous Virtual Storage (HVS) on Tender Operating System
TABATA Toshihiro, TANIGUCHI Hideo
The IEICE transactions on information and systems 92 ( 1 ) 12 - 24 2009.1
-
ファイル操作のシステムコール発行頻度に基づくバッファキャッシュ制御法の提案
Tatsuya Katakami, Toshihiro Tabata, Hideo Taniguchi
2009 ( 13 ) 111 - 118 2009
-
SEEdit: SELinux security policy configuration system with higher level language
Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata
Proceedings of the 23rd Large Installation System Administration Conference, LISA 2009 107 - 117 2009
-
Dynamic OS Server Replacement Scheme for AnT
藤原康行, 岡本幸大, 田端利宏, 乃村能成, 谷口秀夫
情報処理学会シンポジウム論文集 2008 ( 14 ) 201 - 206 2008.12
-
Realization and Evaluation of High Speed Fork & Exec System-Call by Recycling Resource on Tender
SAEKI Kenji, TABATA Toshihiro, TANIGUCHI Hideo
The IEICE transactions on information and systems 91 ( 12 ) 2892 - 2903 2008.12
-
A Bayesian-filter-based Image Spam Filtering Method
49 ( 9 ) 3093 - 3103 2008.9
-
Implementation and Evaluation of a Directory Oriented Buffer Cache Mechanism
TABATA Toshihiro, KOTOGE Miyuki, NOMURA Yoshinari, TANIGUCHI Hideo
The IEICE transactions on information and systems 91 ( 2 ) 435 - 448 2008.2
-
Design and evaluation of a Bayesian-filter-based image spam filtering method
Masahiro Uemura, Toshihiro Tabata
Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 49 ( 9 ) 46 - 51 2008
-
機密情報の拡散追跡機能を利用した書き出し制御手法
植村 晋一郎, 田端 利宏, 谷口 秀夫, 横山 和俊, 箱守 聰
マルチメディア,分散,協調とモバイル(DICOMO2008)シンポジウム論文集 768 - 775 2008
-
Proposal of instant synchronous interprocess communication
Toshihiro Tabata, Kazuhiro Fukutomi, Hideo Taniguchi
Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 2 146 - 149 2008
-
I/O buffer cache mechanism based on the frequency of file usage
Tatsuya Katakami, Toshihiro Tabata, Hideo Taniguchi
Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 2 76 - 82 2008
-
An Improved Recyclable Resource Management Method for Fast Process Creation and Reduced Memory Consumption
Toshihiro Tabata, Hideo Taniguchi
International Journal of Hybrid Information Technology (IJHIT) 1 ( 1 ) 31 - 44 2008
-
Integrated access permission: Secure and simple policy description by integration of file access vector permission
Takuto Yamaguchi, Toshihiro Tabata, Yuichi Nakamura
Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 40 - 45 2008
-
Toshihiro Tabata, Yoshinari Nomura, Hideo Taniguchi
Systems and Computers in Japan 38 ( 14 ) 63 - 78 2007.12
-
An intrusion detection system which can restore altered data
Fumiaki Nagano, Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
Fourth International Conference on Information Technology and Applications, ICITA 2007 29 - 34 2007
-
Controlling CPU usage for processes with execution resource for mitigating CPU DoS attack
Toshihiro Tabata, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi
Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007 141 - 146 2007
-
A CPU usage control mechanism for processes with execution resource for mitigating CPU DoS attack
Toshihiro Tabata, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi
International Journal of Smart Home 1 ( 2 ) 109 - 128 2007
-
A recyclable resource management method for fast process creation and reduced memory consumption
Toshihiro Tabata, Hideo Taniguchi
Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007 194 - 199 2007
-
Evaluation for guarantee of service processing by regulating program execution resource
箱守聰, 箱守聰, 田端利宏, 横山和俊, 谷口秀夫
情報処理学会シンポジウム論文集 2007 ( 14 ) 183 - 190 2007
-
Write Control Method by Using Diffusion Tracing Function of Classified Information
大橋慶, 箱守聰, 箱守聰, 田端利宏, 横山和俊, 谷口秀夫
情報処理学会シンポジウムシリーズ(CD-ROM) 2007 ( 1 ) 690 - 697 2007
-
Directory Oriented Buffer Cache Mechanism
田端利宏, 小峠みゆき, 齊藤圭, 乃村能成, 谷口秀夫
情報処理学会シンポジウム論文集 2006 ( 14 ) 2006
-
Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider
SYALIM Amril, TABATA Toshihiro, SAKURAI Kouichi
情報処理学会論文誌 47 ( 2 ) 2006
-
An intrusion detection system using alteration of data
Fumiaki Nagano, Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
Proceedings - International Conference on Advanced Information Networking and Applications, AINA 1 243 - 248 2006
-
Active Modification Method of Program Control Flow for Efficient Anomaly Detection
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
GESTS International Transactions on Computer Science and Engineering 2006
-
Proposal of File Access Permission which has both Security and Simplified Configuration
Takuto Yamaguchi, Yuichi Nakamura, Toshihiro TABATA
PreProceedings of the 7th International Workshop on Information Security Applications (WISA2006) 2006
-
Actively modifying control flow of program for efficient anormaly detection
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 4252 LNAI - II 737 - 744 2006
-
IWANAGA MANABU, TABATA TOSHIHIRO, SAKURAI KOUICHI
IPSJ journal 46 ( 8 ) 1959 - 1966 2005.8
-
A Software Fingerprinting Scheme for Java Using Class Structure Transformation
FUKUSHIMA KAZUHIDE, TABATA TOSHIHIRO, TANAKA TOSHIAKI, SAKURAI KOUICHI
IPSJ journal 46 ( 8 ) 2042 - 2052 2005.8
-
The Design and Evaluation of Anomaly Detection System Based on System Call
TATARA KOHEI, TABATA TOSHIHIRO, SAKURAI KOUICHI
IPSJ journal 46 ( 8 ) 1967 - 1975 2005.8
-
On the Security of Integration of SELinux Access Permissions
TABATA TOSHIHIRO, SUEYASU KATSUYA, SAKURAI KOUICHI
IPSJ journal 46 ( 4 ) 1070 - 1073 2005.4
-
A probabilistic method for detecting anomalous program behavior
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
Lecture Notes in Computer Science 3325 87 - 98 2005
-
An Abuse Prevention Technique of CPU Time by Using Execution Resource
Toshihiro TABATA, Satoshi Hakomori, Hideo Taniguchi
PreProc. of the 6th International Workshop on Information Security Applications (WISA2005) 2005
-
Program obfuscation scheme using random numbers to complicate control flow
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3823 LNCS 916 - 925 2005
-
Some fitting of naive Bayesian spam filtering for Japanese environment
Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai
Lecture Notes in Computer Science 3325 135 - 143 2005
-
Usage Control Model and Architecture for Data Confidentiality in Database Service Provider
Amril Syalim, Toshihiro Tabata, Kouichi Sakurai
Proc. of Indonesia Cryptology and Information Security Conference (INA-CISC) 2005 2005
-
The Design and Evaluation of Anomaly Detection System Based on System Call
たたら講平, 田端利宏, 桜井幸一
情報処理学会論文誌 46 ( 8 ) 2005
-
Proposal and Evaluation for Improvement of Corpus Separation in Bayesian Spam Filtering on Multi-lingual Environment
岩永学, 田端利宏, 桜井幸一
情報処理学会論文誌 46 ( 8 ) 2005
-
On the Security of Integration of SELinux Access Permissions
田端利宏, 末安克也, 桜井幸一
情報処理学会論文誌 46 ( 4 ) 2005
-
A Software Fingerprinting Scheme for Java Using Class Structure Transformation
福島和英, 田端利宏, 田中俊昭, 桜井幸一
情報処理学会論文誌 46 ( 8 ) 2005
-
TABATA Toshihiro, NOMURA Yoshinari, TANIGUCHI Hideo
The IEICE transactions on information systems Pt. 1 87 ( 11 ) 961 - 974 2004.11
-
Proposal of Anti-spam Scheme Combining Challenge-response and Bayesian Filtering
IWANAGA MANABU, TABATA TOSHIHIRO, SAKURAI KOUICHI
IPSJ journal 45 ( 8 ) 1939 - 1947 2004.8
-
Iwanaga Manabu, Tabata Toshihiro, Sakurai Kouichi
Annual report of Computing and Communications Center, Kyushu University 4 ( 4 ) 41 - 47 2004.3
-
Design of Intrusion Detection System at User Level with System-Call Interposing.
Toshihiro Tabata, Kouichi Sakurai
ICETE 2004, 1st International Conference on E-Business and Telecommunication Networks 263 - 268 2004
-
A resource management method for improving recycling ratio in recycling process elements
T Tabata, H Taniguchi
8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS 203 - 208 2004
-
End-User Security Management with Mobile Agents
Yuki KOTEGAWA, Toshihiro TABATA, Kouichi SAKURAI
Proc. of the Third International Conference on Information (Info'2004), International Workshop on Information Assurance and Security 2004
-
Proposal and implementation of heterogeneous virtual storage coexisted of single virtual storage and multiple virtual storage
T Tabata, H Taniguchi
International Conference on Computing, Communications and Control Technologies, Vol 1, Proceedings 415 - 420 2004
-
Proposal of Anti-spam Scheme Combining Challenge-response and Bayesian Filtering
岩永学, 田端利宏, 桜井幸一
情報処理学会論文誌 45 ( 8 ) 2004
-
Proposal of Efficient Resource Management for Recycling Process Elements
TABATA TOSHIHIRO, TANIGUCHI HIDEO
44 ( 10 ) 48 - 61 2003.7
-
Process Schedule Mechanism for Regulating Processing Time of Multiple Services
TABATA Toshihiro, TANIGUCHI Hideo
The Transactions of the Institute of Electronics,Information and Communication Engineers. 86 ( 7 ) 458 - 468 2003.7
-
Proposal and Evaluation of Process Restart Function by Initializing Data Segments
TABATA Toshihiro, TANIGUCHI Hideo
Transactions of Information Processing Society of Japan 44 ( 6 ) 1538 - 1547 2003.6
-
Evaluation of communication bandwidth control mechanism by regulating program execution speed
Toshihiro Tabata, Yoshinari Nomura, Hideo Taniguchi
Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications 7 14 - 19 2003
-
Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods
Kazuhide Fukushima, Toshihiro Tabata, Kouichi Sakurai
Proceedings of the IASTED International Conference on Communication, Network, and Information Security 108 - 113 2003
-
Evaluation of Obfuscation Scheme for Java Focusing on Accessing Relationships of Fields and Methods between Classes
Kazuhide FUKUSHIMA, Toshihiro TABATA, Kouichi SAKURAI
Proc. of IASTED International Conference on Communication, Network, and Information Security (CNIS 2003) 2003
-
On the security of SELinux with a simplified policy
Katsuya Sueyasu, Toshihiro Tabata, Kouichi Sakurai
Proceedings of the IASTED International Conference on Communication, Network, and Information Security 79 - 84 2003
-
Route Detecting System using Multi-Agent for Mobile Agents
Yuki KOTEGAWA, Toshihiro TABATA, Kouichi SAKURAI
2003
-
Preventing Spam Disguised as Error Mail
Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI
Proc. of International Symposium on Information Science and Electrical Engineering 2003 (ISEE 2003) 2003
-
Evaluation of anti-spam method combining Bayesian filtering and strong challenge and response
Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai
Proceedings of the IASTED International Conference on Communication, Network, and Information Security 214 - 219 2003
-
Proposal and Evaluation of Process Restart Function by Initializing Data Segments
田端利宏, 谷口秀夫
情報処理学会論文誌 44 ( 6 ) 2003
-
Proposal of Efficient Resource Management for Recycling Process Elements
田端利宏, 谷口秀夫
情報処理学会論文誌 44 ( SIG10(ACS2) ) 2003
-
Efficient Resource Management for Recycling Process Elements.
田端利宏, 谷口秀夫
情報処理学会シンポジウム論文集 2002 ( 18 ) 2002
-
Guarantee of Service Processing Time of Process Group for Multimedia Application
Toshihiro TABATA, Yoshinari NOMURA, Hideo TANIGUCHI
Proc. of Pan-Yellow-Sea International Workshop on Information Technologies for Network Era (PYIWIT'02) 2002
-
New Directions in System Software. Guarantee of Service Processing Time by Execution on Tender Operating System.
田端利宏, 谷口秀夫
情報処理学会論文誌 41 ( 6 ) 2000
-
Tender Operating System Based on Mechanism of Resource Independence.
谷口秀夫, 青木義則, 後藤真孝, 村上大介, 田端利宏
情報処理学会論文誌 41 ( 12 ) 2000
-
Implementation and Evaluation of Speed Control Mechanism of Program Execution on Resource Execution on Tender.
田端利宏, 谷口秀夫
情報処理学会論文誌 40 ( 6 ) 1999