Takip et
Masashi Eto
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation
J Song, H Takakura, Y Okabe, M Eto, D Inoue, K Nakao
Proceedings of the first workshop on building analysis datasets and …, 2011
4042011
nicter: An incident analysis system toward binding network monitoring with malware analysis
D Inoue, M Eto, K Yoshioka, S Baba, K Suzuki, J Nakazato, K Ohtaka, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
1002008
Malware behavior analysis in isolated miniature network for revealing malware's network activity
D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao
2008 IEEE International Conference on Communications, 1715-1721, 2008
662008
Automated malware analysis system and its sandbox for revealing malware's internal and external activities
D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao
IEICE transactions on information and systems 92 (5), 945-954, 2009
642009
Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring
K Nakao, D Inoue, M Eto, K Yoshioka
IEICE TRANSACTIONS on Information and Systems 92 (5), 787-798, 2009
562009
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system
D Inoue, M Eto, K Suzuki, M Suzuki, K Nakao
Proceedings of the ninth international symposium on visualization for cyber …, 2012
542012
A novel concept of network incident analysis based on multi-layer observations of malware activities
K Nakao, K Yoshioka, D Inoue, M Eto
The 2nd Joint Workshop on Information Security (JWIS07), 267-279, 2007
412007
Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares.
S Miwa, T Miyachi, M Eto, M Yoshizumi, Y Shinoda
DETER, 2007
402007
Nicter: A large-scale network incident analysis system: Case studies for understanding threat landscape
M Eto, D Inoue, J Song, J Nakazato, K Ohtaka, K Nakao
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
392011
A study on association rule mining of darknet big data
T Ban, M Eto, S Guo, D Inoue, K Nakao, R Huang
2015 International Joint Conference on Neural Networks (IJCNN), 1-7, 2015
382015
An incident analysis system NICTER and its analysis engines based on data mining techniques
D Inoue, K Yoshioka, M Eto, M Yamagata, E Nishino, J Takeuchi, ...
Advances in Neuro-Information Processing: 15th International Conference …, 2009
352009
Malware sandbox analysis for secure observation of vulnerability exploitation
K Yoshioka, D Inoue, M Eto, Y Hoshizawa, H Nogawa, K Nakao
IEICE transactions on information and systems 92 (5), 955-966, 2009
222009
A novel malware clustering method using frequency of function call traces in parallel threads
J Nakazato, J Song, M Eto, D Inoue, K Nakao
IEICE transactions on information and systems 94 (11), 2150-2158, 2011
202011
Differential mechanisms for the inhibition of human cytochrome P450 1A2 by apigenin and genistein
H Shimada, M Eto, M Ohtaguro, M Ohtsubo, Y Mizukami, T Ide, Y Imamura
Journal of Biochemical and Molecular Toxicology 24 (4), 230-234, 2010
202010
Design issues of an isolated sandbox used to analyze malwares
S Miwa, T Miyachi, M Eto, M Yoshizumi, Y Shinoda
Advances in Information and Computer Security: Second International Workshop …, 2007
172007
Towards early detection of novel attack patterns through the lens of a large-scale darknet
T Ban, S Pang, M Eto, D Inoue, K Nakao, R Huang
2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016
152016
ドライブ・バイ・ダウンロード攻撃対策フレームワークの提案
笠間貴弘, 井上大介, 衛藤将史, 中里純二, 中尾康二
コンピュータセキュリティシンポジウム 2011 論文集 2011 (3), 780-785, 2011
142011
An empirical study of spam: Analyzing spam sending systems and malicious web servers
J Song, D Inque, M Eto, HC Kim, K Nakao
2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010
142010
A proposal of malware distinction method based on scan patterns using spectrum analysis
M Eto, K Sonoda, D Inoue, K Yoshioka, K Nakao
Neural Information Processing: 16th International Conference, ICONIP 2009 …, 2009
142009
DAEDALUS: Novel application of large-scale darknet monitoring for practical protection of live networks
D Inoue, M Suzuki, M Eto, K Yoshioka, K Nakao
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
122009
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20