Ryoichi Isawa
According to our database1,
Ryoichi Isawa
authored at least 27 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
1
1
2
1
1
1
1
1
1
3
1
3
4
2
1
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
2023
Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering.
IEEE Access, 2023
2022
J. Inf. Process., 2022
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
Investigating behavioral differences between IoT malware via function call sequence graphs.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IEICE Trans. Inf. Syst., 2019
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering.
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
IEICE Trans. Inf. Syst., 2018
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking.
IEICE Trans. Inf. Syst., 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2013
Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Proceedings of the Neural Information Processing - 20th International Conference, 2013
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
Anonymous Authentication Scheme without Verification Table for Wireless Environments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012