GHOST Sensor: A Proactive Cyber Attack Monitoring Platform
ETO, Masashi, TANAKA, Tomohide, SUZUKI, Koei, SUZUKI, Mio, INOUE, Daisuke, NAKAO, Koji
Published in IEICE Transactions on Information and Systems (2015)
Published in IEICE Transactions on Information and Systems (2015)
Get full text
Journal Article
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
KIM, Hyung Chan, ORII, Tatsunori, YOSHIOKA, Katsunari, INOUE, Daisuke, SONG, Jungsuk, ETO, Masashi, SHIKATA, Junji, MATSUMOTO, Tsutomu, NAKAO, Koji
Published in IEICE Transactions on Information and Systems (2011)
Published in IEICE Transactions on Information and Systems (2011)
Get full text
Journal Article
Functional and structural effects of mutagenic replacement of Asn37 at subsite F on the lysozyme-catalyzed reaction
Kawamura, S. (Kyushu Tokai Univ., Choyo, Kumamoto (Japan). Faculty of Agriculture), Eto, M, Imoto, T, Ikemizu, S, Araki, T, Torikata, T
Published in Bioscience, biotechnology, and biochemistry (01.03.2004)
Published in Bioscience, biotechnology, and biochemistry (01.03.2004)
Get full text
Journal Article
A study on association rule mining of darknet big data
Tao Ban, Eto, Masashi, Shanqing Guo, Inoue, Daisuke, Nakao, Koji, Runhe Huang
Published in 2015 International Joint Conference on Neural Networks (IJCNN) (01.07.2015)
Published in 2015 International Joint Conference on Neural Networks (IJCNN) (01.07.2015)
Get full text
Conference Proceeding
Journal Article
Towards Cost-Effective P2P Traffic Classification in Cloud Environment
BAN, Tao, GUO, Shanqing, ETO, Masashi, INOUE, Daisuke, NAKAO, Koji
Published in IEICE transactions on information and systems (01.01.2012)
Get full text
Published in IEICE transactions on information and systems (01.01.2012)
Journal Article
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads : Information and Communication System Security
NAKAZATO, Junji, SONG, Jungsuk, ETO, Masashi, INOUE, Daisuke, NAKAO, Koji
Published in IEICE transactions on information and systems (2011)
Get full text
Published in IEICE transactions on information and systems (2011)
Journal Article
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring : Information and Communication System Security
NAKAO, Koji, INOUE, Daisuke, ETO, Masashi, YOSHIOKA, Katsunari
Published in IEICE transactions on information and systems (2009)
Get full text
Published in IEICE transactions on information and systems (2009)
Journal Article
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities : Information and Communication System Security
INOUE, Daisuke, YOSHIOKA, Katsunari, ETO, Masashi, HOSHIZAWA, Yuji, NAKAO, Koji
Published in IEICE transactions on information and systems (2009)
Get full text
Published in IEICE transactions on information and systems (2009)
Journal Article
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity
Inoue, D., Yoshioka, K., Eto, M., Hoshizawa, Y., Nakao, K.
Published in 2008 IEEE International Conference on Communications (01.05.2008)
Published in 2008 IEEE International Conference on Communications (01.05.2008)
Get full text
Conference Proceeding
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation : Information and Communication System Security
YOSHIOKA, Katsunari, INOUE, Daisuke, ETO, Masashi, HOSHIZAWA, Yuji, NOGAWA, Hiroki, NAKAO, Koji
Published in IEICE transactions on information and systems (2009)
Get full text
Published in IEICE transactions on information and systems (2009)
Journal Article
Multipurpose Network Monitoring Platform Using Dynamic Address Assignment
Eto, M., Inoue, D., Suzuki, M., Nakao, K.
Published in 2012 Seventh Asia Joint Conference on Information Security (01.08.2012)
Published in 2012 Seventh Asia Joint Conference on Information Security (01.08.2012)
Get full text
Conference Proceeding
nicter: An Incident Analysis System Toward Binding Network Monitoring with Malware Analysis
Inoue, D., Eto, M., Yoshioka, K., Baba, S., Suzuki, K., Nakazato, J., Ohtaka, K., Nakao, K.
Published in 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing (01.04.2008)
Published in 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing (01.04.2008)
Get full text
Conference Proceeding