2023 18th Asia Joint Conference on Information Security (AsiaJCIS)| 979-8-3503-4163-8/23/$31.00© 2023 IEEE| DOI: 10.1109/AsiaJCIS60284. 2023.00027 R Aibara, T Ban, GY Chen, WY Chen, PW Chi, HHC Chien, WY Dai, ... | | |
A fast algorithm for constructing phylogenetic trees with application to IoT malware clustering T He, C Han, R Isawa, T Takahashi, S Kijima, J Takeuchi, K Nakao International Conference on Neural Information Processing, 766-778, 2019 | 15 | 2019 |
A Feasibility Study on Investigating Functional Differences between IoT Malware R Kawasoe, C Han, R Isawa, T Takahashi, J Takeuchi Computer Security Symposium, 535-542, 2020 | | 2020 |
A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso C Han, J Shimamura, T Takahashi, D Inoue, M Kawakita, J Takeuchi, ... IEICE Tech. Rep. 117 (481), 1-6, 2018 | | 2018 |
An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree T He, C Han, R Isawa, T Takahashi, S Kijima, J Takeuchi IEICE Technical Report; IEICE Tech. Rep. 120 (384), 72-77, 2021 | | 2021 |
Android マルウェアの API 処理ロギングによる個人情報漏えい検知及び分類 韓燦洙, 松本晋一, 川本淳平, 櫻井幸一 火の国情報シンポジウム 2016, 3A-4, 2016 | | 2016 |
Android マルウェアの API 呼出し記録による分類及び個人情報漏えい検知 韓燦洙, 松本晋一, 川本淳平, 櫻井幸一 情報処理学会九州支部 火の国シンポジウム, 1-8, 2016 | | 2016 |
Automated detection of malware activities using nonnegative matrix factorization C Han, J Takeuchi, T Takahashi, D Inoue 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021 | 10 | 2021 |
Behavior Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering S Takada, T He, C Han, A Tanaka, J Takeuchi IEICE Technical Report; IEICE Tech. Rep. 121 (410), 111-116, 2022 | | 2022 |
Botnet detection using graphical lasso with graph density C Han, K Kono, S Tanaka, M Kawakita, J Takeuchi Neural Information Processing: 23rd International Conference, ICONIP 2016 …, 2016 | 4 | 2016 |
Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach K Miyamoto, M Iida, C Han, T Ban, T Takahashi, J Takeuchi IEEE Access 11, 132792-132810, 2023 | | 2023 |
Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns C Han, J Takeuchi, T Takahashi, D Inoue IEEE Access 10, 13038-13058, 2022 | 9 | 2022 |
Darknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension C Han, A Tanaka, T Takahashi 2022 IEEE International Conference on Big Data (Big Data), 2980-2988, 2022 | 1 | 2022 |
Designing comprehensive cyber threat analysis platform: Can we orchestrate analysis engines? T Takahashi, Y Umemura, C Han, T Ban, K Furumoto, O Nakamura, ... 2021 IEEE International Conference on Pervasive Computing and Communications …, 2021 | 23 | 2021 |
Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint A Tanaka, C Han, T Takahashi IEEE Access 11, 23227-23244, 2023 | | 2023 |
Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts R Ishibashi, H Goto, C Han, T Ban, T Takahashi, J Takeuchi IEICE Technical Report; IEICE Tech. Rep. 120 (384), 1-6, 2021 | | 2021 |
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities YW Chang, HY Chen, C Han, T Morikawa, T Takahashi, TN Lin IEEE Transactions on Emerging Topics in Computing, 2023 | 1 | 2023 |
Function Analysis and Consideration of IoT Malware for Clusters S Takada, T He, C Han, A Tanaka, J Takeuchi IEICE Technical Report; IEICE Tech. Rep., 2022 | | 2022 |
Generating labeled training datasets towards unified network intrusion detection systems R Ishibashi, K Miyamoto, C Han, T Ban, T Takahashi, J Takeuchi IEEE Access 10, 53972-53986, 2022 | 5 | 2022 |
Graphical Lasso を用いたダークネットデータのリアルタイム分析に基づくマルウェア活動検知に関する検討 韓燦洙, 島村隼平, 高橋健志, 井上大介, 川喜田雅則, 竹内純一, ... 研究報告セキュリティ心理学とトラスト (SPT) 2018 (1), 1-6, 2018 | | 2018 |