Author of the publication

Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.

, , , , and . IEICE Trans. Inf. Syst., 101-D (11): 2576-2583 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Malware Mitigation by Android Market Operators., , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2016)A Cross-Platform Study on IoT Malware., , , and . ICMU, page 1-2. IEEE, (2018)AmpPot: Monitoring and Defending Against Amplification DDoS Attacks., , , , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 615-636. Springer, (2015)On Collusion Security of Random Codes., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 296-304 (2005)Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure., , , , , , , and . J. Inf. Process., (2022)ThingGate: A Gateway for Managing Traffic of Bare-metal IoT Honeypot., , and . J. Inf. Process., (2020)Honeypot Method to Lure Attackers Without Holding Crypto-Assets., , and . IEEE Access, (2024)It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites., , , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 171-191. Springer, (2020)Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks., , , , , , , and . ESORICS (2), volume 14345 of Lecture Notes in Computer Science, page 23-41. Springer, (2023)An Efficient Dynamic Detection Method for Various x86 Shellcodes., , , and . SAINT, page 284-289. IEEE Computer Society, (2012)