Designing comprehensive cyber threat analysis platform: Can we orchestrate analysis engines? T Takahashi, Y Umemura, C Han, T Ban, K Furumoto, O Nakamura, ... 2021 IEEE International Conference on Pervasive Computing and Communications …, 2021 | 23 | 2021 |
Investigating behavioral differences between IoT malware via function call sequence graphs R Kawasoe, C Han, R Isawa, T Takahashi, J Takeuchi Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1674-1682, 2021 | 18 | 2021 |
Real-time detection of global cyberthreat based on darknet by estimating anomalous synchronization using graphical lasso C Han, J Shimamura, T Takahashi, D Inoue, J Takeuchi, K Nakao IEICE TRANSACTIONS on Information and Systems 103 (10), 2113-2124, 2020 | 15 | 2020 |
Real-time detection of malware activities by analyzing darknet traffic using graphical lasso C Han, J Shimamura, T Takahashi, D Inoue, M Kawakita, J Takeuchi, ... 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 15 | 2019 |
A fast algorithm for constructing phylogenetic trees with application to IoT malware clustering T He, C Han, R Isawa, T Takahashi, S Kijima, J Takeuchi, K Nakao International Conference on Neural Information Processing, 766-778, 2019 | 14 | 2019 |
Towards efficient labeling of network incident datasets using tcpreplay and snort K Masumi, C Han, T Ban, T Takahashi Proceedings of the eleventh ACM conference on data and application security …, 2021 | 12 | 2021 |
Automated detection of malware activities using nonnegative matrix factorization C Han, J Takeuchi, T Takahashi, D Inoue 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021 | 10 | 2021 |
Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns C Han, J Takeuchi, T Takahashi, D Inoue IEEE Access 10, 13038-13058, 2022 | 9 | 2022 |
Malicious Packet Classification Based on Neural Network Using Kitsune Features K Miyamoto, H Goto, R Ishibashi, C Han, T Ban, T Takahashi, J Takeuchi Intelligent Systems and Pattern Recognition: Second International Conference …, 2022 | 8 | 2022 |
Internet-wide scanner fingerprint identifier based on TCP/IP header A Tanaka, C Han, T Takahashi, K Fujisawa 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), 1-6, 2021 | 7 | 2021 |
Which packet did they catch? Associating NIDS alerts with their communication sessions R Ishibashi, H Goto, C Han, T Ban, T Takahashi, J Takeuchi 2021 16th Asia Joint Conference on Information Security (AsiaJCIS), 9-16, 2021 | 7 | 2021 |
Generating labeled training datasets towards unified network intrusion detection systems R Ishibashi, K Miyamoto, C Han, T Ban, T Takahashi, J Takeuchi IEEE Access 10, 53972-53986, 2022 | 5 | 2022 |
Scalable and fast hierarchical clustering of IoT malware using active data selection T He, C Han, T Takahashi, S Kijima, J Takeuchi 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), 1-6, 2021 | 4 | 2021 |
Botnet detection using graphical lasso with graph density C Han, K Kono, S Tanaka, M Kawakita, J Takeuchi Neural Information Processing: 23rd International Conference, ICONIP 2016 …, 2016 | 4 | 2016 |
Scalable and fast algorithm for constructing phylogenetic trees with application to IoT malware clustering T He, C Han, R Isawa, T Takahashi, S Kijima, J Takeuchi IEEE Access 11, 8240-8253, 2023 | 3 | 2023 |
Leveraging machine learning techniques to identify deceptive decoy documents associated with targeted email attacks B Sun, T Ban, C Han, T Takahashi, K Yoshioka, J Takeuchi, ... IEEE Access 9, 87962-87971, 2021 | 3 | 2021 |
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities YW Chang, HY Chen, C Han, T Morikawa, T Takahashi, TN Lin IEEE Transactions on Emerging Topics in Computing, 2023 | 1 | 2023 |
Darknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension C Han, A Tanaka, T Takahashi 2022 IEEE International Conference on Big Data (Big Data), 2980-2988, 2022 | 1 | 2022 |
IoT マルウェアの機能差分調査手法の改善及びクラスタに対する分析 川添玲雄, 韓燦洙, 伊沢亮一, 高橋健志, 竹内純一 研究報告セキュリティ心理学とトラスト (SPT) 2021 (19), 1-6, 2021 | 1 | 2021 |
高速な系統樹構成アルゴリズムにおけるスケーラブルなクラスタリング評価 何天祥, 韓燦洙, 伊沢亮一, 高橋健志, 来嶋秀治, 竹内純一 研究報告セキュリティ心理学とトラスト (SPT) 2021 (18), 1-6, 2021 | 1 | 2021 |