Search Results1-20 of  23

  • 1 / 2
  • Yoshihiro Oyama ID: 9000346960246

    Articles in CiNii:1

    • Grammar Compression of Call Traces in Dynamic Malware Analysis (2017)
  • Yoshihiro Oyama ID: 9000347539546

    Articles in CiNii:1

    • Checkpointing an Operating System Using a Parapass-through Hypervisor (2015)
  • OYAMA Yoshihiro ID: 9000378056884

    Articles in CiNii:1

    • Log analysis for hijacked user account's login detection method based on an autonomous system number of access source (インターネットアーキテクチャ) (2017)
  • Yoshihiro Oyama ID: 9000394045564

    Articles in CiNii:1

    • Investigation of the Diverse Sleep Behavior of Malware (2018)
  • Oyama Yoshihiro ID: 9000403923310

    Articles in CiNii:1

    • Grammar Compression of Call Traces in Dynamic Malware Analysis (2017)
  • Oyama Yoshihiro ID: 9000403927023

    Articles in CiNii:1

    • Trends of anti-analysis operations of malwares observed in API call logs (2017)
  • OYAMA YOSHIHIRO ID: 1000010361536

    The University of Electro-Communications | JST, CREST (2013 from CiNii)

    Articles in CiNii:70

    • Optimization of Intrusion Detection System Based on Static Analyses (2004)
    • Hiding of OS code using a virtual machine monitor (2010)
    • A sampling-based intrusion detection system (2010)
  • OYAMA Yoshihiro ID: 9000001126048

    株式会社白石 技術本部土木設計部 (2004 from CiNii)

    Articles in CiNii:2

    • ANALYSIS OF SHEAR BAND STRUCTURE DEVELOPED IN SAND LAYER OBSERVED IN STRIKE-SLIP FAULT MODEL TESTS (2004)
    • ANALYSIS OF SHEAR BAND STRUCTURE DEVELOPED ON SURFACE OF SAND LAYER OBSERVED IN STRIKE-SLIP FAULT MODEL TESTS (2003)
  • OYAMA Yoshihiro ID: 9000254808700

    社団法人 土木学会|株式会社白石 技術本部土木設計部 (2004 from CiNii)

    Articles in CiNii:1

    • ANALYSIS OF SHEAR BAND STRUCTURE DEVELOPED IN SAND LAYER OBSERVED IN STRIKE-SLIP FAULT MODEL TESTS (2004)
  • OYAMA Yoshihiro ID: 9000258237582

    Japan Science and Technology Corporation (2002 from CiNii)

    Articles in CiNii:1

    • Design and Implementation of Secure Software Execution System SoftwarePot (2002)
  • OYAMA Yoshihiro ID: 9000258237723

    The University of Tokyo (2005 from CiNii)

    Articles in CiNii:1

    • SPA 2005 Report (2005)
  • OYAMA Yoshihiro ID: 9000258571196

    Department of Computer Science, Graduate School of Information Science and Technology, University of Tokyo (2003 from CiNii)

    Articles in CiNii:1

    • Intrusion Detection System Based on Binary Code and Execution Stack Analysis (2003)
  • OYAMA Yoshihiro ID: 9000391587542

    University of Tsukuba (2017 from CiNii)

    Articles in CiNii:1

    • Comparative Evaluation of Online Machine Learning Algorithms in Behavior-Based Malware Detection (2017)
  • Oyama Yoshihiro ID: 9000258571098

    Graduate School of Information Science and Technology of the University of Tokyo (2003 from CiNii)

    Articles in CiNii:1

    • Mobile Scope: A Distributed Component Language with Transparent Mobility (2003)
  • Oyama Yoshihiro ID: 9000283722505

    The University of Tokyo|Japan Science and Technology Agency (2004 from CiNii)

    Articles in CiNii:1

    • API for Supporting Optimization in Virtual Computing Environments (2004)
  • Oyama Yoshihiro ID: 9000312517129

    The University of Electro-Communications (2015 from CiNii)

    Articles in CiNii:1

    • B-020 Disaster Warning Notification Using a Hypervisor (2015)
  • Oyama Yoshihiro ID: 9000345375756

    University of Tsukuba (2017 from CiNii)

    Articles in CiNii:1

    • Grammar Compression of Call Traces in Dynamic Malware Analysis (2017)
  • Oyama Yoshihiro ID: 9000396135438

    University of Tsukuba (2018 from CiNii)

    Articles in CiNii:1

    • Investigation of the Diverse Sleep Behavior of Malware (2018)
  • Yoshihiro Oyama ID: 9000251663493

    The University of Electro-Communications | JST, CREST (2014 from CiNii)

    Articles in CiNii:1

    • Implementation and Evaluation of Cooperative Caching Using InfiniBand (2014)
  • Yoshihiro Oyama ID: 9000281478779

    The University of Electro-Communications (2015 from CiNii)

    Articles in CiNii:1

    • Checkpointing an Operating System Using a Parapass-through Hypervisor (2015)
  • 1 / 2
Page Top