Koji Nakao

According to our database1, Koji Nakao authored at least 74 papers between 1989 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Inherited Threat Reproduction on Open Source 5G Testbed.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

2023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023

Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Message from the General Co-Chairs: AsiaJCIS 2022.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2020
Challenges and Novel Solutions for 5G Network Security, Privacy and Trust.
IEEE Wirel. Commun., 2020

Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso.
IEICE Trans. Inf. Syst., 2020

Special issue on Advancements in 5G Networks Security.
Future Gener. Comput. Syst., 2020

Toward Automated Smart Ships: Designing Effective Cyber Risk Management.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

2019
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information.
Int. J. Commun. Syst., 2018

FCReducer: Locating Symmetric Cryptographic Functions on the Memory.
IEICE Trans. Inf. Syst., 2018

Keynotes.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Proactive cyber security response by utilizing passive monitoring technologies.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Keynote Talk #2.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Traffic Measurements for Cyber Security.
IEEE Commun. Mag., 2017

Detection of Botnet Activities Through the Lens of a Large-Scale Darknet.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

2016
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Toward automated vulnerability monitoring using open information and standardized tools.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

The Usability of Metadata for Android Application Analysis.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Integration of Multi-modal Features for Android Malware Detection Using Linear SVM.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking.
IEICE Trans. Inf. Syst., 2015

GHOST Sensor: A Proactive Cyber Attack Monitoring Platform.
IEICE Trans. Inf. Syst., 2015

A study on association rule mining of darknet big data.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Fine-Grained Risk Level Quantication Schemes Based on APK Metadata.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

2014
An Accurate Packer Identification Method Using Support Vector Machine.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Data Model for Android Package Information and Its Application to Risk Analysis System.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014

2013
Toward a more practical unsupervised anomaly detection system.
Inf. Sci., 2013

Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.
J. Inf. Process., 2012

Towards Cost-Effective P2P Traffic Classification in Cloud Environment.
IEICE Trans. Inf. Syst., 2012

DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

A study on cost-effective P2P traffic classification.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Behavior Analysis of Long-term Cyber Attacks in the Darknet.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Multipurpose Network Monitoring Platform Using Dynamic Address Assignment.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads.
IEICE Trans. Inf. Syst., 2011

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011

Correlation Analysis between Spamming Botnets and Malware Infected Hosts.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Toward global cybersecurity collaboration: Cybersecurity operation activity model.
Proceedings of the ITU Kaleidoscope 2011: The Fully Networked Human?, 2011

Entropy Based Discriminators for P2P Teletraffic Characterization.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Experimental Results on Simple Distributed Cooperative Transmission Scheme with Visible Light Communication.
IEICE Trans. Commun., 2010

A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010

Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis.
IEICE Trans. Inf. Syst., 2010

An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

How to Locate a Target Binary Process and Its Derivatives in System Emulator.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A Heuristic-Based Feature Selection Method for Clustering Spam Emails.
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010

Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation.
IEICE Trans. Inf. Syst., 2009

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring.
IEICE Trans. Inf. Syst., 2009

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities.
IEICE Trans. Inf. Syst., 2009

DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

A Methodology for Analyzing Overall Flow of Spam-Based Attacks.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

2008
UDP Large-Payload Capability Detection for DNSSEC.
IEICE Trans. Inf. Syst., 2008

Special Section on Information and Communication System Security.
IEICE Trans. Inf. Syst., 2008

An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.
Proceedings of IEEE International Conference on Communications, 2008

2004
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

DNS Transport Size Issues in IPv6 Environment.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004

2002
TCP gateway for satellite-based Internet service accommodating multiple subscribers.
Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, 2002

OC-48c traffic tester for generating and analyzing long-range dependence traffic.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

2001
Programmable Remote Traffic Monitoring Method Using Active Network Approach.
Proceedings of the Active Networks, IFIP-TC6 Third International Working Conference, 2001

2000
Dynamic Load-Balancing for Distibuted Management in Active Networks.
Proceedings of the Active Networks, Second International Working Conference, 2000

1994
Implementation and evaluation of SCSE for OSI secure communications.
Syst. Comput. Jpn., 1994

1990
Feasibility Study for Worldwide Videotex Interworking.
IEEE J. Sel. Areas Commun., 1990

1989
Proposal on a secure communications service element (SCSE) in the OSI application layer.
IEEE J. Sel. Areas Commun., 1989


  Loading...