Author of the publication

Life-cycle monitoring scheme of malware download sites for websites.

, , , and . SOCA, page 1-6. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced attack collection scheme on high-interaction web honeypots., , , and . ISCC, page 81-86. IEEE Computer Society, (2010)MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks., , , , and . COMPSAC, page 444-449. IEEE Computer Society, (2015)Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter., , , , , , , and . IEICE Trans. Inf. Syst., 107 (7): 807-824 (2024)Scalable and Performance-Efficient Client Honeypot on High Interaction System., , and . SAINT, page 40-50. IEEE Computer Society, (2012)An Experimental Study of Logical Office service over International ATM Networks., , , , and . LCN, page 530-537. IEEE Computer Society, (1997)Safe and Secure Services Based on NGN., , , , and . IEICE Trans. Inf. Syst., 91-D (5): 1226-1233 (2008)Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations., , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 278-294. Springer, (2017)API Chaser: Anti-analysis Resistant Malware Analyzer., , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 123-143. Springer, (2013)Active Credential Leakage for Observing Web-Based Attack Cycle., , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 223-243. Springer, (2013)BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts., , , , , and . TrustCom/BigDataSE/ISPA (1), page 758-765. IEEE, (2015)