Koji Nakao
According to our database1,
Koji Nakao
authored at least 73 papers
between 1989 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT.
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2020
IEEE Wirel. Commun., 2020
Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso.
IEICE Trans. Inf. Syst., 2020
Future Gener. Comput. Syst., 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
2019
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso.
Proceedings of the 18th IEEE International Conference On Trust, 2019
A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering.
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information.
Int. J. Commun. Syst., 2018
IEICE Trans. Inf. Syst., 2018
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
2017
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
2016
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Toward automated vulnerability monitoring using open information and standardized tools.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Proceedings of the Neural Information Processing - 23rd International Conference, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking.
IEICE Trans. Inf. Syst., 2015
IEICE Trans. Inf. Syst., 2015
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Proceedings of the Neural Information Processing - 22nd International Conference, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Data Model for Android Package Information and Its Application to Risk Analysis System.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014
2013
Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
J. Inf. Process., 2012
IEICE Trans. Inf. Syst., 2012
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads.
IEICE Trans. Inf. Syst., 2011
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the ITU Kaleidoscope 2011: The Fully Networked Human?, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2010
Experimental Results on Simple Distributed Cooperative Transmission Scheme with Visible Light Communication.
IEICE Trans. Commun., 2010
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis.
IEICE Trans. Inf. Syst., 2010
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010
Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
IEICE Trans. Inf. Syst., 2009
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring.
IEICE Trans. Inf. Syst., 2009
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities.
IEICE Trans. Inf. Syst., 2009
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis.
Proceedings of the Neural Information Processing, 16th International Conference, 2009
2008
IEICE Trans. Inf. Syst., 2008
An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.
Proceedings of IEEE International Conference on Communications, 2008
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004
2002
Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, 2002
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
2001
Proceedings of the Active Networks, IFIP-TC6 Third International Working Conference, 2001
2000
Proceedings of the Active Networks, Second International Working Conference, 2000
1994
Syst. Comput. Jpn., 1994
1990
IEEE J. Sel. Areas Commun., 1990
1989
Proposal on a secure communications service element (SCSE) in the OSI application layer.
IEEE J. Sel. Areas Commun., 1989