Author of the publication

Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.

, , , , , , and . Inf. Media Technol., 7 (4): 1577-1587 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Speed Implementation Methods for RSA Scheme., , and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 221-238. Springer, (1992)Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine., , , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 128-141. Springer, (2007)A Multi-Purpose Proof System - for Identity and Membership Proofs., , and . ASIACRYPT, volume 739 of Lecture Notes in Computer Science, page 397-411. Springer, (1991)Prototyping security test objects for use with advanced biometric authentication systems.. AsiaCCS, page 2. ACM, (2008)Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices., , , and . IM, page 143-151. IEEE, (2021)Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks., , , , , and . DIMVA, volume 13358 of Lecture Notes in Computer Science, page 178-196. Springer, (2022)Group Testing Aggregate Signatures with Soundness., , and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 363-381. Springer, (2022)VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service., , , , , , , , , and . NOMS, page 1-5. IEEE, (2024)How to Construct Secure Cryptographic Location-Based Services., and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 894-904. Springer, (2005)Coding Theory and its Applications in Japan., and . AAECC, volume 356 of Lecture Notes in Computer Science, page 301-305. Springer, (1987)