Author of the publication

Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.

, , , , , , and . Inf. Media Technol., 7 (4): 1577-1587 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat of Technical Support Scams in Japan., , , , , and . DSC, page 115-122. IEEE, (2024)Customized Malware: Identifying Target Systems Using Personally Identifiable Information., , , , , , and . COMPSAC, page 1007-1012. IEEE, (2024)Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai., , , , , , , , and . NDSS, The Internet Society, (2019)Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT., , , , , , and . USENIX Security Symposium, page 1541-1558. USENIX Association, (2023)Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts., , , , , and . EuroS&P, page 337-352. IEEE, (2021)Evasive Malware via Identifier Implanting., , , , , , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 162-184. Springer, (2018)Inherited Threat Reproduction on Open Source 5G Testbed., , , , , and . DSC, page 9-16. IEEE, (2024)IoTPOT: Analysing the Rise of IoT Compromises., , , , , and . WOOT, USENIX Association, (2015)An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors., , and . AsiaJCIS, page 19-25. IEEE Computer Society, (2014)Malware Detection Method by Catching Their Random Behavior in Multiple Executions., , , and . SAINT, page 262-266. IEEE Computer Society, (2012)