关注
Katsunari Yoshioka
Katsunari Yoshioka
在 ynu.ac.jp 的电子邮件经过验证
标题
引用次数
年份
{APTGen}: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences
Y Takahashi, S Shima, R Tanabe, K Yoshioka
13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020
112020
{IoTPOT}: analysing the rise of {IoT} compromises
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
4792015
19th INTERNATIONAL CONGRESS ON ACOUSTICS MADRID, 2-7 SEPTEMBER 2007
K Sonoda, N Asemi, J Nakazato, K Yoshioka, D Inoue, O Takizawa
2020 IEEE 9th International Conference on Cloud Networking (CloudNet)
JC Nobre, I Haque, LZ Granville, A Lahmadi, A Boubendir, K Yoshioka, ...
2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017)
M Korczyński, W Mazurczyk, K Yoshioka, M van Eeten, E Kirda, ...
3-3 Multimedia Information Hiding
O TAKIZAWA, K SONODA, K YOSHIOKA, J SUZUKI
Journal of the National Institute of Information and Communications …, 2011
2011
5-3 Development of Honeypot to Observe DRDoS Attacks
D Makita, K Yoshioka
Journal of the National Institute of Information and Communications …, 2017
2017
A cross-platform study on emerging malicious programs targeting iot devices
T Ban, R Isawa, SY Huang, K Yoshioka, D Inoue
IEICE TRANSACTIONS on Information and Systems 102 (9), 1683-1685, 2019
62019
A cross-platform study on IoT malware
T Ban, R Isawa, K Yoshioka, D Inoue
2018 Eleventh International Conference on Mobile Computing and Ubiquitous …, 2018
52018
A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis
S Morishima, T Tsutsumi, R Tanabe, Y Takahashi, M Kobayashi, ...
IEICE Technical Report; IEICE Tech. Rep. 114 (489), 109-114, 2015
2015
A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis
J Su, K Yoshioka, J Shikata, T Matsumoto
IEICE Technical Report; IEICE Tech. Rep. 115 (488), 65-70, 2016
2016
A First Trend Review of Runtime Packers for IoT Malware
R Isawa, Y Tie, K Yoshioka, T Ban, D Inoue
IEICE Technical Report; IEICE Tech. Rep. 117 (79), 19-24, 2017
2017
A method of database fingerprinting
K Yoshioka, J Shikata, T Matsumoto
Proc. 2004 Workshop Information Security Research, 112-123, 2004
102004
A method of preventing unauthorized data transmission in controller area network
T Matsumoto, M Hata, M Tanabe, K Yoshioka, K Oishi
2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 1-5, 2012
1262012
A Method of Sandbox Analysis of Malware Acting with Use of Online Services
K Murakami, K Yoshioka, T Matsumoto
IEICE Technical Report; IEICE Tech. Rep. 110 (266), 65-70, 2010
2010
A Method to Divide Application for Deterring Unauthorized Use by Outsourcee
S Honda, K Yoshioka, T Matsumoto
IEICE Technical Report; IEICE Tech. Rep. 111 (455), 15-22, 2012
12012
A novel concept of network incident analysis based on multi-layer observations of malware activities
K Nakao, K Yoshioka, D Inoue, M Eto
The 2nd Joint Workshop on Information Security (JWIS07), 267-279, 2007
412007
A proposal of malware distinction method based on scan patterns using spectrum analysis
M Eto, K Sonoda, D Inoue, K Yoshioka, K Nakao
Neural Information Processing: 16th International Conference, ICONIP 2009 …, 2009
142009
A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation
C Jimbo, K Yoshioka, J Shikata, T Matsumoto, M Eto, D Inoue, K Nakao
IEICE Technical Report; IEICE Tech. Rep. 110 (266), 59-64, 2010
2010
A study on detection of botnet based on probabilistic dependencies
S Murakami, H Hamasaki, M Kawakita, J Takeuchi, K Yoshioka, D Inoue, ...
IEICE Technical Report; IEICE Tech. Rep. 109 (85), 1-6, 2009
2009
系统目前无法执行此操作,请稍后再试。
文章 1–20