关注
Chansu Han
标题
引用次数
年份
2023 18th Asia Joint Conference on Information Security (AsiaJCIS)| 979-8-3503-4163-8/23/$31.00© 2023 IEEE| DOI: 10.1109/AsiaJCIS60284. 2023.00027
R Aibara, T Ban, GY Chen, WY Chen, PW Chi, HHC Chien, WY Dai, ...
A fast algorithm for constructing phylogenetic trees with application to IoT malware clustering
T He, C Han, R Isawa, T Takahashi, S Kijima, J Takeuchi, K Nakao
International Conference on Neural Information Processing, 766-778, 2019
152019
A Feasibility Study on Investigating Functional Differences between IoT Malware
R Kawasoe, C Han, R Isawa, T Takahashi, J Takeuchi
Computer Security Symposium, 535-542, 2020
2020
A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso
C Han, J Shimamura, T Takahashi, D Inoue, M Kawakita, J Takeuchi, ...
IEICE Tech. Rep. 117 (481), 1-6, 2018
2018
An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree
T He, C Han, R Isawa, T Takahashi, S Kijima, J Takeuchi
IEICE Technical Report; IEICE Tech. Rep. 120 (384), 72-77, 2021
2021
Android マルウェアの API 処理ロギングによる個人情報漏えい検知及び分類
韓燦洙, 松本晋一, 川本淳平, 櫻井幸一
火の国情報シンポジウム 2016, 3A-4, 2016
2016
Android マルウェアの API 呼出し記録による分類及び個人情報漏えい検知
韓燦洙, 松本晋一, 川本淳平, 櫻井幸一
情報処理学会九州支部 火の国シンポジウム, 1-8, 2016
2016
Automated detection of malware activities using nonnegative matrix factorization
C Han, J Takeuchi, T Takahashi, D Inoue
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
102021
Behavior Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering
S Takada, T He, C Han, A Tanaka, J Takeuchi
IEICE Technical Report; IEICE Tech. Rep. 121 (410), 111-116, 2022
2022
Botnet detection using graphical lasso with graph density
C Han, K Kono, S Tanaka, M Kawakita, J Takeuchi
Neural Information Processing: 23rd International Conference, ICONIP 2016 …, 2016
42016
Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach
K Miyamoto, M Iida, C Han, T Ban, T Takahashi, J Takeuchi
IEEE Access 11, 132792-132810, 2023
2023
Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns
C Han, J Takeuchi, T Takahashi, D Inoue
IEEE Access 10, 13038-13058, 2022
92022
Darknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension
C Han, A Tanaka, T Takahashi
2022 IEEE International Conference on Big Data (Big Data), 2980-2988, 2022
12022
Designing comprehensive cyber threat analysis platform: Can we orchestrate analysis engines?
T Takahashi, Y Umemura, C Han, T Ban, K Furumoto, O Nakamura, ...
2021 IEEE International Conference on Pervasive Computing and Communications …, 2021
232021
Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint
A Tanaka, C Han, T Takahashi
IEEE Access 11, 23227-23244, 2023
2023
Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts
R Ishibashi, H Goto, C Han, T Ban, T Takahashi, J Takeuchi
IEICE Technical Report; IEICE Tech. Rep. 120 (384), 1-6, 2021
2021
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities
YW Chang, HY Chen, C Han, T Morikawa, T Takahashi, TN Lin
IEEE Transactions on Emerging Topics in Computing, 2023
12023
Function Analysis and Consideration of IoT Malware for Clusters
S Takada, T He, C Han, A Tanaka, J Takeuchi
IEICE Technical Report; IEICE Tech. Rep., 2022
2022
Generating labeled training datasets towards unified network intrusion detection systems
R Ishibashi, K Miyamoto, C Han, T Ban, T Takahashi, J Takeuchi
IEEE Access 10, 53972-53986, 2022
52022
Graphical Lasso を用いたダークネットデータのリアルタイム分析に基づくマルウェア活動検知に関する検討
韓燦洙, 島村隼平, 高橋健志, 井上大介, 川喜田雅則, 竹内純一, ...
研究報告セキュリティ心理学とトラスト (SPT) 2018 (1), 1-6, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–20