Author of the publication

Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks.

, , , , and . IEICE Trans. Commun., 93-B (5): 1131-1139 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes., , , , , , and . COMPSAC (2), page 471-476. IEEE, (2019)Active Credential Leakage for Observing Web-Based Attack Cycle., , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 223-243. Springer, (2013)Attack Intention Estimation Based on Syntax Analysis and Dynamic Analysis for SQL Injection., , , , and . COMPSAC, page 1510-1515. IEEE, (2020)BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts., , , , , and . TrustCom/BigDataSE/ISPA (1), page 758-765. IEEE, (2015)BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure., , , , , and . IEICE Transactions, 99-B (5): 1012-1023 (2016)The method of detecting malware-infected hosts analyzing firewall and proxy logs., , , , , and . APSITT, page 1-3. IEEE, (2015)Controlling malware HTTP communications in dynamic analysis system using search engine., , , and . CSS, page 1-6. IEEE, (2011)Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks., , , , and . IEICE Trans. Commun., 93-B (5): 1131-1139 (2010)