Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices | 0 | 0.34 | 2021 |
To Get Lost Is To Learn The Way: An Analysis Of Multi-Step Social Engineering Attacks On The Web | 0 | 0.34 | 2021 |
Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines? | 0 | 0.34 | 2021 |
Pay The Piper: Ddos Mitigation Technique To Deter Financially-Motivated Attackers | 0 | 0.34 | 2020 |
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? | 0 | 0.34 | 2020 |
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans | 1 | 0.37 | 2020 |
Detecting And Understanding Online Advertising Fraud In The Wild | 0 | 0.34 | 2020 |
APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences | 0 | 0.34 | 2020 |
It Never Rains but It Pours - Analyzing and Detecting Fake Removal Information Advertisement Sites. | 0 | 0.34 | 2020 |
Iot Malware Analysis And New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information | 0 | 0.34 | 2020 |
Disposable botnets - examining the anatomy of IoT botnet infrastructure. | 0 | 0.34 | 2020 |
Cleaning Up the Internet of Evil Things - Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. | 0 | 0.34 | 2019 |
Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots | 0 | 0.34 | 2019 |
A Cross-Platform Study On Emerging Malicious Programs Targeting Iot Devices | 0 | 0.34 | 2019 |
A Cross-Platform Study on IoT Malware | 0 | 0.34 | 2018 |
IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices. | 0 | 0.34 | 2018 |
Evasive Malware Via Identifier Implanting | 0 | 0.34 | 2018 |
Towards Finding Code Snippets On A Question And Answer Website Causing Mobile App Vulnerabilities | 0 | 0.34 | 2018 |
Toward Collaborative Defense Across Organizations. | 0 | 0.34 | 2018 |
Evaluating Disassembly-Code Based Similarity between IoT Malware Samples | 0 | 0.34 | 2018 |
Traffic Measurements for Cyber Security. | 0 | 0.34 | 2017 |
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots | 0 | 0.34 | 2016 |
Evaluating Malware Mitigation by Android Market Operators. | 2 | 0.43 | 2016 |
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats. | 6 | 0.45 | 2016 |
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. | 22 | 1.19 | 2015 |
IoTPOT: analysing the rise of IoT compromises | 29 | 1.72 | 2015 |
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection. | 1 | 0.41 | 2015 |
Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses. | 0 | 0.34 | 2015 |
Catching The Behavioral Differences Between Multiple Executions For Malware Detection | 0 | 0.34 | 2013 |
Search Engine Based Investigation on Misconfiguration of Zone Transfer | 0 | 0.34 | 2013 |
Malware Detection Method by Catching Their Random Behavior in Multiple Executions | 3 | 0.44 | 2012 |
An Efficient Dynamic Detection Method for Various x86 Shellcodes | 1 | 0.37 | 2012 |
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior. | 0 | 0.34 | 2012 |
Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems. | 8 | 0.66 | 2011 |
An Empirical Evaluation Of An Unpacking Method Implemented With Dynamic Binary Instrumentation | 2 | 0.43 | 2011 |
Vulnerability in Public Malware Sandbox Analysis Systems | 4 | 0.44 | 2010 |
Fine-Grain Feature Extraction From Malware'S Scan Behavior Based On Spectrum Analysis | 0 | 0.34 | 2010 |
Multi-Pass Malware Sandbox Analysis With Controlled Internet Connection | 3 | 0.48 | 2010 |
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks | 3 | 0.40 | 2009 |
Automated Malware Analysis System And Its Sandbox For Revealing Malware'S Internal And External Activities | 10 | 0.69 | 2009 |
Malware Sandbox Analysis For Secure Observation Of Vulnerability Exploitation | 2 | 0.41 | 2009 |
Practical Correlation Analysis Between Scan And Malware Profiles Against Zero-Day Attacks Based On Darknet Monitoring | 7 | 0.79 | 2009 |
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis | 7 | 0.52 | 2009 |
Malware Behavior Analysis In Isolated Miniature Network For Revealing Malware'S Network Activity | 18 | 1.09 | 2008 |
An incident analysis system NICTER and its analysis engines based on data mining techniques | 9 | 0.77 | 2008 |
Information Hiding on Lossless Data Compression | 2 | 0.45 | 2008 |
Fingerprinting Traffic Log | 1 | 0.37 | 2008 |
Information Hiding for Public Address Audio Signal using FH/FSK Spread-spectrum Scheme | 0 | 0.34 | 2007 |
On Collusion Security Of Random Codes | 2 | 0.43 | 2005 |
Random-Error Resilience Of A Short Collusion-Secure Code | 4 | 0.49 | 2003 |