Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation J Song, H Takakura, Y Okabe, M Eto, D Inoue, K Nakao Proceedings of the first workshop on building analysis datasets and …, 2011 | 404 | 2011 |
nicter: An incident analysis system toward binding network monitoring with malware analysis D Inoue, M Eto, K Yoshioka, S Baba, K Suzuki, J Nakazato, K Ohtaka, ... 2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008 | 100 | 2008 |
Malware behavior analysis in isolated miniature network for revealing malware's network activity D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao 2008 IEEE International Conference on Communications, 1715-1721, 2008 | 66 | 2008 |
Automated malware analysis system and its sandbox for revealing malware's internal and external activities D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao IEICE transactions on information and systems 92 (5), 945-954, 2009 | 64 | 2009 |
Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring K Nakao, D Inoue, M Eto, K Yoshioka IEICE TRANSACTIONS on Information and Systems 92 (5), 787-798, 2009 | 56 | 2009 |
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system D Inoue, M Eto, K Suzuki, M Suzuki, K Nakao Proceedings of the ninth international symposium on visualization for cyber …, 2012 | 54 | 2012 |
A novel concept of network incident analysis based on multi-layer observations of malware activities K Nakao, K Yoshioka, D Inoue, M Eto The 2nd Joint Workshop on Information Security (JWIS07), 267-279, 2007 | 41 | 2007 |
Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares. S Miwa, T Miyachi, M Eto, M Yoshizumi, Y Shinoda DETER, 2007 | 40 | 2007 |
Nicter: A large-scale network incident analysis system: Case studies for understanding threat landscape M Eto, D Inoue, J Song, J Nakazato, K Ohtaka, K Nakao Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 39 | 2011 |
A study on association rule mining of darknet big data T Ban, M Eto, S Guo, D Inoue, K Nakao, R Huang 2015 International Joint Conference on Neural Networks (IJCNN), 1-7, 2015 | 38 | 2015 |
An incident analysis system NICTER and its analysis engines based on data mining techniques D Inoue, K Yoshioka, M Eto, M Yamagata, E Nishino, J Takeuchi, ... Advances in Neuro-Information Processing: 15th International Conference …, 2009 | 35 | 2009 |
Malware sandbox analysis for secure observation of vulnerability exploitation K Yoshioka, D Inoue, M Eto, Y Hoshizawa, H Nogawa, K Nakao IEICE transactions on information and systems 92 (5), 955-966, 2009 | 22 | 2009 |
A novel malware clustering method using frequency of function call traces in parallel threads J Nakazato, J Song, M Eto, D Inoue, K Nakao IEICE transactions on information and systems 94 (11), 2150-2158, 2011 | 20 | 2011 |
Differential mechanisms for the inhibition of human cytochrome P450 1A2 by apigenin and genistein H Shimada, M Eto, M Ohtaguro, M Ohtsubo, Y Mizukami, T Ide, Y Imamura Journal of Biochemical and Molecular Toxicology 24 (4), 230-234, 2010 | 20 | 2010 |
Design issues of an isolated sandbox used to analyze malwares S Miwa, T Miyachi, M Eto, M Yoshizumi, Y Shinoda Advances in Information and Computer Security: Second International Workshop …, 2007 | 17 | 2007 |
Towards early detection of novel attack patterns through the lens of a large-scale darknet T Ban, S Pang, M Eto, D Inoue, K Nakao, R Huang 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016 | 15 | 2016 |
ドライブ・バイ・ダウンロード攻撃対策フレームワークの提案 笠間貴弘, 井上大介, 衛藤将史, 中里純二, 中尾康二 コンピュータセキュリティシンポジウム 2011 論文集 2011 (3), 780-785, 2011 | 14 | 2011 |
An empirical study of spam: Analyzing spam sending systems and malicious web servers J Song, D Inque, M Eto, HC Kim, K Nakao 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010 | 14 | 2010 |
A proposal of malware distinction method based on scan patterns using spectrum analysis M Eto, K Sonoda, D Inoue, K Yoshioka, K Nakao Neural Information Processing: 16th International Conference, ICONIP 2009 …, 2009 | 14 | 2009 |
DAEDALUS: Novel application of large-scale darknet monitoring for practical protection of live networks D Inoue, M Suzuki, M Eto, K Yoshioka, K Nakao Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009 | 12 | 2009 |