Masashi Eto
Orcid: 0000-0002-7699-5476
According to our database1,
Masashi Eto
authored at least 35 papers
between 2007 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
0
1
2
3
4
5
6
7
8
1
1
2
3
2
3
2
1
2
3
4
4
3
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework.
Proc. Priv. Enhancing Technol., 2022
2019
Proceedings of the Intelligent Human Systems Integration 2019, 2019
Investigation and User's Web Search Skill Evaluation for Eye and Mouse Movement in Phishing of Short Message.
Proceedings of the Advances in Human Factors in Cybersecurity, 2019
2016
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
2015
IEICE Trans. Inf. Syst., 2015
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015
2012
J. Inf. Process., 2012
IEICE Trans. Inf. Syst., 2012
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads.
IEICE Trans. Inf. Syst., 2011
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2010
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis.
IEICE Trans. Inf. Syst., 2010
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010
Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
IEICE Trans. Inf. Syst., 2009
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring.
IEICE Trans. Inf. Syst., 2009
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities.
IEICE Trans. Inf. Syst., 2009
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis.
Proceedings of the Neural Information Processing, 16th International Conference, 2009
2008
An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.
Proceedings of IEEE International Conference on Communications, 2008
2007
Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007
Proceedings of the Advances in Information and Computer Security, 2007