Author of the publication

Empowering Anti-malware Research in Japan by Sharing the MWS Datasets.

, , , and . J. Inf. Process., 23 (5): 579-588 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User compliance and remediation success after IoT malware notifications., , , , , , and . J. Cybersecur., (2021)Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT., , , , , , and . CoRR, (2022)Evasive Malware via Identifier Implanting., , , , , , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 162-184. Springer, (2018)IoTPOT: A Novel Honeypot for Revealing Current IoT Threats., , , , , and . J. Inf. Process., 24 (3): 522-533 (2016)Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai., , , , , , , , and . NDSS, The Internet Society, (2019)Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT., , , , , , and . USENIX Security Symposium, page 1541-1558. USENIX Association, (2023)Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts., , , , , and . EuroS&P, page 337-352. IEEE, (2021)IoTPOT: Analysing the Rise of IoT Compromises., , , , , and . WOOT, USENIX Association, (2015)Catching the Behavioral Differences between Multiple Executions for Malware Detection., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 225-232 (2013)Malware Sandbox Analysis with Efficient Observation of Herder's Behavior., , , , , , and . J. Inf. Process., 20 (4): 835-845 (2012)