Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation J Song, H Takakura, Y Okabe, M Eto, D Inoue, K Nakao Proceedings of the first workshop on building analysis datasets and …, 2011 | 411 | 2011 |
Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion A Yokoyama, K Ishii, R Tanabe, Y Papa, K Yoshioka, T Matsumoto, ... Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 116 | 2016 |
nicter: An incident analysis system toward binding network monitoring with malware analysis D Inoue, M Eto, K Yoshioka, S Baba, K Suzuki, J Nakazato, K Ohtaka, ... 2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008 | 101 | 2008 |
Referential kNN Regression for Financial Time Series Forecasting T Ban, R Zhang, S Pang, A Sarrafzadeh, D Inoue Neural Information Processing: 20th International Conference, ICONIP 2013 …, 2013 | 72 | 2013 |
Malware behavior analysis in isolated miniature network for revealing malware's network activity D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao 2008 IEEE International Conference on Communications, 1715-1721, 2008 | 66 | 2008 |
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. O Çetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ... NDSS, 2019 | 65 | 2019 |
Automated malware analysis system and its sandbox for revealing malware's internal and external activities D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao IEICE transactions on information and systems 92 (5), 945-954, 2009 | 64 | 2009 |
Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring K Nakao, D Inoue, M Eto, K Yoshioka IEICE TRANSACTIONS on Information and Systems 92 (5), 787-798, 2009 | 56 | 2009 |
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system D Inoue, M Eto, K Suzuki, M Suzuki, K Nakao Proceedings of the ninth international symposium on visualization for cyber …, 2012 | 54 | 2012 |
A novel concept of network incident analysis based on multi-layer observations of malware activities K Nakao, K Yoshioka, D Inoue, M Eto The 2nd Joint Workshop on Information Security (JWIS07), 267-279, 2007 | 41 | 2007 |
Combat security alert fatigue with ai-assisted techniques T Ban, N Samuel, T Takahashi, D Inoue Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 9-16, 2021 | 40 | 2021 |
Threat alert prioritization using isolation forest and stacked auto encoder with day-forward-chaining analysis ME Aminanto, T Ban, R Isawa, T Takahashi, D Inoue IEEE Access 8, 217977-217986, 2020 | 40 | 2020 |
A study on association rule mining of darknet big data T Ban, M Eto, S Guo, D Inoue, K Nakao, R Huang 2015 International Joint Conference on Neural Networks (IJCNN), 1-7, 2015 | 39 | 2015 |
Nicter: A large-scale network incident analysis system: Case studies for understanding threat landscape M Eto, D Inoue, J Song, J Nakazato, K Ohtaka, K Nakao Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 39 | 2011 |
An incident analysis system NICTER and its analysis engines based on data mining techniques D Inoue, K Yoshioka, M Eto, M Yamagata, E Nishino, J Takeuchi, ... Advances in Neuro-Information Processing: 15th International Conference …, 2009 | 35 | 2009 |
The carna botnet through the lens of a network telescope E Le Malécot, D Inoue Foundations and Practice of Security: 6th International Symposium, FPS 2013 …, 2014 | 34 | 2014 |
Integration of multi-modal features for android malware detection using linear SVM T Ban, T Takahashi, S Guo, D Inoue, K Nakao 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016 | 31 | 2016 |
Dynamic class imbalance learning for incremental LPSVM S Pang, L Zhu, G Chen, A Sarrafzadeh, T Ban, D Inoue Neural Networks 44, 87-100, 2013 | 30 | 2013 |
Efficient detection and classification of internet-of-things malware based on byte sequences from executable files TL Wan, T Ban, SM Cheng, YT Lee, B Sun, R Isawa, T Takahashi, D Inoue IEEE Open Journal of the Computer Society 1, 262-275, 2020 | 27 | 2020 |
Scheme of standard MIDI files steganography and its evaluation D Inoue, T Matsumoto Security and Watermarking of Multimedia Contents IV 4675, 194-205, 2002 | 24 | 2002 |