Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter H NAKANO, D CHIBA, T KOIDE, N FUKUSHI, T YAGI, T HARIU, ... IEICE TRANSACTIONS on Information and Systems 107 (7), 807-824, 2024 | | 2024 |
VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service K Takao, C Hiraishi, R Tanabe, K Takada, A Fujita, D Inoue, C Gañán, ... NOMS 2024-2024 IEEE Network Operations and Management Symposium, 1-5, 2024 | | 2024 |
Observation of Human-Operated Accesses Using Remote Management Device Honeypot T Sasaki, M Kawaguchi, T Kumagai, K Yoshioka, T Matsumoto IEICE Transactions on Fundamentals of Electronics, Communications and …, 2024 | | 2024 |
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network T Sasaki, T Noma, Y Morii, T Shimura, M van Eeten, K Yoshioka, ... 2024 IEEE Symposium on Security and Privacy (SP), 117-117, 2024 | | 2024 |
Honeypot Method to Lure Attackers Without Holding Crypto-Assets H Uchibori, K Yoshioka, K Omote IEEE Access, 2024 | 1 | 2024 |
SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices H Yasui, T Inoue, T Sasaki, R Tanabe, K Yoshioka, T Matsumoto Journal of Information Processing 32, 23-34, 2024 | | 2024 |
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries AA Al Alsadi, K Sameshima, K Yoshioka, M Van Eeten, CH Gañán Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | | 2023 |
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks R Anghel, S Vetrivel, ET Rodriguez, K Sameshima, D Makita, K Yoshioka, ... European Symposium on Research in Computer Security, 23-41, 2023 | 3 | 2023 |
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware K Nakao, K Yoshioka, T Sasaki, R Tanabe, X Huang, T Takahashi, ... IEICE TRANSACTIONS on Information and Systems 106 (9), 1302-1315, 2023 | 1 | 2023 |
Canary in twitter mine: collecting phishing reports from experts and non-experts H Nakano, D Chiba, T Koide, N Fukushi, T Yagi, T Hariu, K Yoshioka, ... Proceedings of the 18th International Conference on Availability …, 2023 | 9 | 2023 |
An attacker’s dream? exploring the capabilities of chatgpt for developing malware YM Pa Pa, S Tanizaki, T Kou, M Van Eeten, K Yoshioka, T Matsumoto Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 10-18, 2023 | 32 | 2023 |
Who are you? OSINT-based profiling of infrastructure honeypot visitors T Sasaki, K Yoshioka, T Matsumoto 2023 11th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2023 | 2 | 2023 |
Assessment Method for Persistent Malware Infection on IoT Devices S Soeda, T Inoue, R Tanabe, YMP Pa, K Yoshioka, T Matsumoto IEICE Technical Report; IEICE Tech. Rep. 122 (422), 181-186, 2023 | | 2023 |
Towards observation of online fraud exploiting multiple SNS Y Kawaguchi, K Takada, YMP Pa, R Tanabe, K Yoshioka, T Matsumoto IEICE Technical Report; IEICE Tech. Rep. 122 (422), 175-180, 2023 | | 2023 |
Special Section on Cryptography and Information Security T Izu, S ARITA, K FUKUSHIMA, H HIWATARI, K IDEGUCHI, A INOMATA, ... IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND …, 2023 | | 2023 |
Evasion Attacks against Next Generation Anti-Virus Software and Antivirus Software Implementing Hybrid Detection YU ARAI, K YOSHIOKA, T MATSUMOTO 情報処理学会論文誌ジャーナル (Web) 64 (9), 1287-1294, 2023 | 1 | 2023 |
Birds of a Feather? A Comparative Analysis of DDoS Victimisation by IoT Botnet and Amplification Attacks S Vetrivel, A Noroozian, D Makita, K Yoshioka, M van Eeten, CH Gañán 22nd Workshop on the Economics of Information Security (WEIS 2023), 2023 | 1 | 2023 |
Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users X Huang, S Mochizuki, A Fujita, K Yoshioka Journal of Information Processing 31, 165-173, 2023 | 1 | 2023 |
An Internet-wide view of connected cars: Discovery of exposed automotive devices T Ueda, T Sasaki, K Yoshioka, T Matsumoto Proceedings of the 17th International Conference on Availability …, 2022 | 9 | 2022 |
SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices H Yasui, T Inoue, T Sasaki, R Tanabe, K Yoshioka, T Matsumoto 2022 17th Asia Joint Conference on Information Security (AsiaJCIS), 16-23, 2022 | 1 | 2022 |