{APTGen}: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences Y Takahashi, S Shima, R Tanabe, K Yoshioka 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020 | 11 | 2020 |
{IoTPOT}: analysing the rise of {IoT} compromises YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow 9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015 | 479 | 2015 |
19th INTERNATIONAL CONGRESS ON ACOUSTICS MADRID, 2-7 SEPTEMBER 2007 K Sonoda, N Asemi, J Nakazato, K Yoshioka, D Inoue, O Takizawa | | |
2020 IEEE 9th International Conference on Cloud Networking (CloudNet) JC Nobre, I Haque, LZ Granville, A Lahmadi, A Boubendir, K Yoshioka, ... | | |
2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017) M Korczyński, W Mazurczyk, K Yoshioka, M van Eeten, E Kirda, ... | | |
3-3 Multimedia Information Hiding O TAKIZAWA, K SONODA, K YOSHIOKA, J SUZUKI Journal of the National Institute of Information and Communications …, 2011 | | 2011 |
5-3 Development of Honeypot to Observe DRDoS Attacks D Makita, K Yoshioka Journal of the National Institute of Information and Communications …, 2017 | | 2017 |
A cross-platform study on emerging malicious programs targeting iot devices T Ban, R Isawa, SY Huang, K Yoshioka, D Inoue IEICE TRANSACTIONS on Information and Systems 102 (9), 1683-1685, 2019 | 6 | 2019 |
A cross-platform study on IoT malware T Ban, R Isawa, K Yoshioka, D Inoue 2018 Eleventh International Conference on Mobile Computing and Ubiquitous …, 2018 | 5 | 2018 |
A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis S Morishima, T Tsutsumi, R Tanabe, Y Takahashi, M Kobayashi, ... IEICE Technical Report; IEICE Tech. Rep. 114 (489), 109-114, 2015 | | 2015 |
A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis J Su, K Yoshioka, J Shikata, T Matsumoto IEICE Technical Report; IEICE Tech. Rep. 115 (488), 65-70, 2016 | | 2016 |
A First Trend Review of Runtime Packers for IoT Malware R Isawa, Y Tie, K Yoshioka, T Ban, D Inoue IEICE Technical Report; IEICE Tech. Rep. 117 (79), 19-24, 2017 | | 2017 |
A method of database fingerprinting K Yoshioka, J Shikata, T Matsumoto Proc. 2004 Workshop Information Security Research, 112-123, 2004 | 10 | 2004 |
A method of preventing unauthorized data transmission in controller area network T Matsumoto, M Hata, M Tanabe, K Yoshioka, K Oishi 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 1-5, 2012 | 126 | 2012 |
A Method of Sandbox Analysis of Malware Acting with Use of Online Services K Murakami, K Yoshioka, T Matsumoto IEICE Technical Report; IEICE Tech. Rep. 110 (266), 65-70, 2010 | | 2010 |
A Method to Divide Application for Deterring Unauthorized Use by Outsourcee S Honda, K Yoshioka, T Matsumoto IEICE Technical Report; IEICE Tech. Rep. 111 (455), 15-22, 2012 | 1 | 2012 |
A novel concept of network incident analysis based on multi-layer observations of malware activities K Nakao, K Yoshioka, D Inoue, M Eto The 2nd Joint Workshop on Information Security (JWIS07), 267-279, 2007 | 41 | 2007 |
A proposal of malware distinction method based on scan patterns using spectrum analysis M Eto, K Sonoda, D Inoue, K Yoshioka, K Nakao Neural Information Processing: 16th International Conference, ICONIP 2009 …, 2009 | 14 | 2009 |
A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation C Jimbo, K Yoshioka, J Shikata, T Matsumoto, M Eto, D Inoue, K Nakao IEICE Technical Report; IEICE Tech. Rep. 110 (266), 59-64, 2010 | | 2010 |
A study on detection of botnet based on probabilistic dependencies S Murakami, H Hamasaki, M Kawakita, J Takeuchi, K Yoshioka, D Inoue, ... IEICE Technical Report; IEICE Tech. Rep. 109 (85), 1-6, 2009 | | 2009 |