Find Research Outputs

Search concepts
Selected filters
2016

An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 May 30 WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 3-11 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting obfuscated suspicious javascript based on information-theoretic measures and novelty detection

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558, p. 278-293 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Internet
Detectors
Experiments

Foreword

Korczyński, M., Mazurczyk, W., Yoshioka, K., Van Eeten, M. & Robertson, W. 2016 May 30 In : Unknown Journal. p. iii-iv

Research output: Contribution to journalEditorial

1 Citations

IoTPOT: A novel honeypot for revealing current IoT threats

Pa, Y. M. P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T. & Rossow, C. 2016 In : Journal of Information Processing. 24, 3, p. 522-533 12 p.

Research output: Contribution to journalArticle

Internet of things
Program processors
Malware

Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion

Yokoyama, A., Ishii, K., Tanabe, R., Papa, Y., Yoshioka, K., Matsumoto, T., Kasama, T., Inoue, D., Brengel, M., Backes, M. & Rossow, C. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 165-187 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Supervised learning
Classifiers

Who gets the boot? Analyzing victimization by DDoS-as-a-service

Noroozian, A., Korczyński, M., Gañan, C. H., Makita, D., Yoshioka, K. & Vaneeten, M. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 368-389 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Industry
2015
1 Citations

AmpPot: Monitoring and defending against amplification DDos attacks

Krämer, L., Krupp, J., Makita, D., Nishizoe, T., Koide, T., Yoshioka, K. & Rossow, C. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9404, p. 615-636 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9404)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Bandwidth
Linux

Detecting malicious domains and authoritative name servers based on their distinct mappings to IP addresses

Pa, Y. M. P., Yoshioka, K. & Matsumoto, T. 2015 Sep 15 In : Journal of Information Processing. 23, 5, p. 623-632 10 p.

Research output: Contribution to journalArticle

Servers
Internet
Communication

Message from the program co-chairs AsiaJCIS 2015

Fan, C. I., Zhang, Z., Nah, J. H. & Yoshioka, K. 2015 In : Unknown Journal. p. ix 7153843

Research output: Contribution to journalEditorial

2014

Message from program co-chairs

Zhang, M., Kim, J., Lin, C. H. & Yoshioka, K. 2014 Jan 26 In : Unknown Journal. p. ix 7023189

Research output: Contribution to journalArticle

1 Citations

Structural classification and similarity measurement of malware

Shi, H., Hamagami, T., Yoshioka, K., Xu, H., Tobe, K. & Goto, S. 2014 Jan 1 In : IEEJ Transactions on Electrical and Electronic Engineering. 9, 6, p. 621-632 12 p.

Research output: Contribution to journalArticle

Malware
Self organizing maps
Windows operating system
Data mining
Experiments