Personal profile

e-rad ID

60415841

Researchmap ID

5000101081

URL

http://er-web.jmk.ynu.ac.jp/html/YOSHIOKA_Katsunari/en.html

External positions

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Malware Engineering & Materials Science
Internet Engineering & Materials Science
Monitoring Engineering & Materials Science
Servers Engineering & Materials Science
Experiments Engineering & Materials Science
Data compression Engineering & Materials Science
Amplification Engineering & Materials Science
Sirens Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2003 2016

  • 124 Citations
  • 5 h-Index
  • 19 Article
  • 18 Conference contribution
  • 2 Editorial

An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 May 30 WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 3-11 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting obfuscated suspicious javascript based on information-theoretic measures and novelty detection

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558, p. 278-293 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Internet
Detectors
Experiments

Foreword

Korczyński, M., Mazurczyk, W., Yoshioka, K., Van Eeten, M. & Robertson, W. 2016 May 30 In : Unknown Journal. p. iii-iv

Research output: Contribution to journalEditorial

1 Citations

IoTPOT: A novel honeypot for revealing current IoT threats

Pa, Y. M. P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T. & Rossow, C. 2016 In : Journal of Information Processing. 24, 3, p. 522-533 12 p.

Research output: Contribution to journalArticle

Internet of things
Program processors
Malware

Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion

Yokoyama, A., Ishii, K., Tanabe, R., Papa, Y., Yoshioka, K., Matsumoto, T., Kasama, T., Inoue, D., Brengel, M., Backes, M. & Rossow, C. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 165-187 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Supervised learning
Classifiers