Name
Affiliation
Papers
KATSUNARI YOSHIOKA
Yokohama Nat. Univ., Yokohama|c|
50
Collaborators
Citations 
PageRank 
101
147
22.92
Referers 
Referees 
References 
421
279
166
Search Limit
100421
Title
Citations
PageRank
Year
Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices00.342021
To Get Lost Is To Learn The Way: An Analysis Of Multi-Step Social Engineering Attacks On The Web00.342021
Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?00.342021
Pay The Piper: Ddos Mitigation Technique To Deter Financially-Motivated Attackers00.342020
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?00.342020
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans10.372020
Detecting And Understanding Online Advertising Fraud In The Wild00.342020
APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences00.342020
It Never Rains but It Pours - Analyzing and Detecting Fake Removal Information Advertisement Sites.00.342020
Iot Malware Analysis And New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information00.342020
Disposable botnets - examining the anatomy of IoT botnet infrastructure.00.342020
Cleaning Up the Internet of Evil Things - Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.00.342019
Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots00.342019
A Cross-Platform Study On Emerging Malicious Programs Targeting Iot Devices00.342019
A Cross-Platform Study on IoT Malware00.342018
IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices.00.342018
Evasive Malware Via Identifier Implanting00.342018
Towards Finding Code Snippets On A Question And Answer Website Causing Mobile App Vulnerabilities00.342018
Toward Collaborative Defense Across Organizations.00.342018
Evaluating Disassembly-Code Based Similarity between IoT Malware Samples00.342018
Traffic Measurements for Cyber Security.00.342017
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots00.342016
Evaluating Malware Mitigation by Android Market Operators.20.432016
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats.60.452016
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.221.192015
IoTPOT: analysing the rise of IoT compromises291.722015
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.10.412015
Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses.00.342015
Catching The Behavioral Differences Between Multiple Executions For Malware Detection00.342013
Search Engine Based Investigation on Misconfiguration of Zone Transfer00.342013
Malware Detection Method by Catching Their Random Behavior in Multiple Executions30.442012
An Efficient Dynamic Detection Method for Various x86 Shellcodes10.372012
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.00.342012
Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems.80.662011
An Empirical Evaluation Of An Unpacking Method Implemented With Dynamic Binary Instrumentation20.432011
Vulnerability in Public Malware Sandbox Analysis Systems40.442010
Fine-Grain Feature Extraction From Malware'S Scan Behavior Based On Spectrum Analysis00.342010
Multi-Pass Malware Sandbox Analysis With Controlled Internet Connection30.482010
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks30.402009
Automated Malware Analysis System And Its Sandbox For Revealing Malware'S Internal And External Activities100.692009
Malware Sandbox Analysis For Secure Observation Of Vulnerability Exploitation20.412009
Practical Correlation Analysis Between Scan And Malware Profiles Against Zero-Day Attacks Based On Darknet Monitoring70.792009
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis70.522009
Malware Behavior Analysis In Isolated Miniature Network For Revealing Malware'S Network Activity181.092008
An incident analysis system NICTER and its analysis engines based on data mining techniques90.772008
Information Hiding on Lossless Data Compression20.452008
Fingerprinting Traffic Log10.372008
Information Hiding for Public Address Audio Signal using FH/FSK Spread-spectrum Scheme00.342007
On Collusion Security Of Random Codes20.432005
Random-Error Resilience Of A Short Collusion-Secure Code40.492003