Author of the publication

Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.

, , , , , , , , , , , , , , and . IEICE Trans. Inf. Syst., 106 (9): 1302-1315 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study on cost-effective P2P traffic classification., , , , and . IJCNN, page 1-7. IEEE, (2012)Keynotes., , , , , , and . ICCE, page 1-4. IEEE, (2018)TCP gateway for satellite-based Internet service accommodating multiple subscribers., , , and . WCNC, page 849-854. IEEE, (2002)Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices., , , , , , and . AsiaJCIS, page 9-15. IEEE, (2019)DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system., , , , and . VizSEC, page 72-79. ACM, (2012)Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT., , , , , , and . USENIX Security Symposium, page 1541-1558. USENIX Association, (2023)Message from the General Co-Chairs: AsiaJCIS 2022., , , and . AsiaJCIS, page vii. IEEE, (2022)OC-48c traffic tester for generating and analyzing long-range dependence traffic., , , and . ISCC, page 975-982. IEEE Computer Society, (2002)An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques., , , , , , , and . ICONIP (1), volume 5506 of Lecture Notes in Computer Science, page 579-586. Springer, (2008)Integration of Multi-modal Features for Android Malware Detection Using Linear SVM., , , , and . AsiaJCIS, page 141-146. IEEE Computer Society, (2016)