YOSHIOKA Katsunari | Yokohama National University
スポンサーリンク
概要
関連著者
-
YOSHIOKA Katsunari
Yokohama National University
-
Inoue Daisuke
National Institute Of Information And Communicarions Technology
-
ETO Masashi
National Institute of Information and Communications Technology
-
NAKAO Koji
National Institute of Information and Communications Technology
-
INOUE Daisuke
National Institute of Information and Communications Technology
-
Matsumoto Tsutomu
Yokohama National Univ. Yokohama‐shi Jpn
-
Yoshioka K
The Graduate School Of Environment And Information Sciences Yokohama National University
-
NAKAO Koji
the National Institute of Information and Communications Technology (NICT)
-
力武 健次
情報通信研究機構インシデント対策グループ
-
MATSUMOTO Tsutomu
Yokohama National University
-
YOSHIOKA Katsunari
National Institute of Information and Communications Technology
-
RIKITAKE Kenji
National Institute of Information and Communications Technology
-
HOSHIZAWA Yuji
SecureBrain Corporation
-
Rikitake K
Network Security Incident Response Group National Institute Of Information And Communications Techno
-
KASAMA Takahiro
National Institute of Information and Communications Technology
-
Kasama Takahiro
Yokohama National University
-
Yamagata Masaya
NEC Corporation
-
薗田 光太郎
独立行政法人 情報通信研究機構
-
薗田 光太郎
東北大 通研
-
SONODA Kotaro
National Institute of Information and Communications Technology
-
NOGAWA Hiroki
Secure Ware Inc.
-
薗田 光太郎
長崎大学
-
Hosobuchi Yoshihiko
Yokohama National University
-
Orii Tatsunori
Yokohama National University
著作論文
- Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
- Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
- Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
- Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
- Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Catching the Behavioral Differences between Multiple Executions for Malware Detection
- Catching the Behavioral Differences between Multiple Executions for Malware Detection