Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Toshihiko Umehara
Bhupendra Singh
Marco Vannucci
Scott Pudlewski
Silvia Scirpoli
Meng-Sheng Lai
Songhua Li
Sebastian Magda
David MacDonald
Meng Jiang
Home
/
Author
/
TOSHIHIRO YAMAUCHI
Author Info
Open Visualization
Name
Affiliation
Papers
TOSHIHIRO YAMAUCHI
Okayama Univ, Okayama, Japan
26
Collaborators
Citations
PageRank
38
17
9.39
Referers
Referees
References
45
371
146
Search Limit
100
371
Publications (26 rows)
Collaborators (38 rows)
Referers (45 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Additional Kernel Observer: Privilege Escalation Attack Prevention Mechanism Focusing On System Call Privilege Changes
0
0.34
2021
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM
0
0.34
2020
Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications.
0
0.34
2018
Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory
0
0.34
2018
Hiding File Manipulation of Essential Services by System Call Proxy.
0
0.34
2018
Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines
0
0.34
2018
Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes
0
0.34
2018
Editor's Message to Special Issue of Computer Security Technologies against Sophisticated Cyber Attacks.
0
0.34
2017
Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM
0
0.34
2017
Kernel Rootkits Detection Method By Monitoring Branches Using Hardware Features
1
0.37
2017
Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library
1
0.40
2017
Plate: persistent memory management for nonvolatile main memory.
0
0.34
2016
HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks.
3
0.44
2016
Rule-Based Sensor Data Aggregation System For M2m Gateways
1
0.39
2016
Design of Function for Tracing Diffusion of Classified Information for IPC on KVM.
0
0.34
2016
Evaluation and design of function for tracing diffusion of classified information for file operations with KVM.
1
0.35
2016
Memory Access Monitoring And Disguising Of Process Information To Avoid Attacks To Essential Services
0
0.34
2016
Attacker Investigation System Triggered by Information Leakage
0
0.34
2015
Proposal Of Kernel Rootkits Detection Method By Monitoring Branches Using Hardware Features
1
0.38
2015
Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems.
0
0.34
2015
Process Hiding by Virtual Machine Monitor for Attack Avoidance.
2
0.41
2015
Fast Control Method Of Software-Managed Tlb For Reducing Zero-Copy Communication Overhead
0
0.34
2015
Access Control To Prevent Malicious Javascript Code Exploiting Vulnerabilities Of Webview In Android Os
3
0.47
2015
CSDA: Rule-based complex sensor data aggregation system for M2M gateway
2
0.38
2015
Complicating Process Identification by Replacing Process Information for Attack Avoidance.
0
0.34
2014
Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS
2
0.38
2013
1