关注
Katsunari Yoshioka
Katsunari Yoshioka
在 ynu.ac.jp 的电子邮件经过验证
标题
引用次数
年份
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter
H NAKANO, D CHIBA, T KOIDE, N FUKUSHI, T YAGI, T HARIU, ...
IEICE TRANSACTIONS on Information and Systems 107 (7), 807-824, 2024
2024
VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service
K Takao, C Hiraishi, R Tanabe, K Takada, A Fujita, D Inoue, C Gañán, ...
NOMS 2024-2024 IEEE Network Operations and Management Symposium, 1-5, 2024
2024
Observation of Human-Operated Accesses Using Remote Management Device Honeypot
T Sasaki, M Kawaguchi, T Kumagai, K Yoshioka, T Matsumoto
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2024
2024
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network
T Sasaki, T Noma, Y Morii, T Shimura, M van Eeten, K Yoshioka, ...
2024 IEEE Symposium on Security and Privacy (SP), 117-117, 2024
2024
Honeypot Method to Lure Attackers Without Holding Crypto-Assets
H Uchibori, K Yoshioka, K Omote
IEEE Access, 2024
12024
SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices
H Yasui, T Inoue, T Sasaki, R Tanabe, K Yoshioka, T Matsumoto
Journal of Information Processing 32, 23-34, 2024
2024
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries
AA Al Alsadi, K Sameshima, K Yoshioka, M Van Eeten, CH Gañán
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
2023
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks
R Anghel, S Vetrivel, ET Rodriguez, K Sameshima, D Makita, K Yoshioka, ...
European Symposium on Research in Computer Security, 23-41, 2023
32023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware
K Nakao, K Yoshioka, T Sasaki, R Tanabe, X Huang, T Takahashi, ...
IEICE TRANSACTIONS on Information and Systems 106 (9), 1302-1315, 2023
12023
Canary in twitter mine: collecting phishing reports from experts and non-experts
H Nakano, D Chiba, T Koide, N Fukushi, T Yagi, T Hariu, K Yoshioka, ...
Proceedings of the 18th International Conference on Availability …, 2023
92023
An attacker’s dream? exploring the capabilities of chatgpt for developing malware
YM Pa Pa, S Tanizaki, T Kou, M Van Eeten, K Yoshioka, T Matsumoto
Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 10-18, 2023
322023
Who are you? OSINT-based profiling of infrastructure honeypot visitors
T Sasaki, K Yoshioka, T Matsumoto
2023 11th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2023
22023
Assessment Method for Persistent Malware Infection on IoT Devices
S Soeda, T Inoue, R Tanabe, YMP Pa, K Yoshioka, T Matsumoto
IEICE Technical Report; IEICE Tech. Rep. 122 (422), 181-186, 2023
2023
Towards observation of online fraud exploiting multiple SNS
Y Kawaguchi, K Takada, YMP Pa, R Tanabe, K Yoshioka, T Matsumoto
IEICE Technical Report; IEICE Tech. Rep. 122 (422), 175-180, 2023
2023
Special Section on Cryptography and Information Security
T Izu, S ARITA, K FUKUSHIMA, H HIWATARI, K IDEGUCHI, A INOMATA, ...
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND …, 2023
2023
Evasion Attacks against Next Generation Anti-Virus Software and Antivirus Software Implementing Hybrid Detection
YU ARAI, K YOSHIOKA, T MATSUMOTO
情報処理学会論文誌ジャーナル (Web) 64 (9), 1287-1294, 2023
12023
Birds of a Feather? A Comparative Analysis of DDoS Victimisation by IoT Botnet and Amplification Attacks
S Vetrivel, A Noroozian, D Makita, K Yoshioka, M van Eeten, CH Gañán
22nd Workshop on the Economics of Information Security (WEIS 2023), 2023
12023
Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users
X Huang, S Mochizuki, A Fujita, K Yoshioka
Journal of Information Processing 31, 165-173, 2023
12023
An Internet-wide view of connected cars: Discovery of exposed automotive devices
T Ueda, T Sasaki, K Yoshioka, T Matsumoto
Proceedings of the 17th International Conference on Availability …, 2022
92022
SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices
H Yasui, T Inoue, T Sasaki, R Tanabe, K Yoshioka, T Matsumoto
2022 17th Asia Joint Conference on Information Security (AsiaJCIS), 16-23, 2022
12022
系统目前无法执行此操作,请稍后再试。
文章 1–20