Takahiro Kasama

According to our database1, Takahiro Kasama authored at least 17 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Threat of Technical Support Scams in Japan.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

Inherited Threat Reproduction on Open Source 5G Testbed.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

Customized Malware: Identifying Target Systems Using Personally Identifiable Information.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
A Large-Scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials.
IEICE Trans. Inf. Syst., September, 2023

Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT.
Proceedings of the 32nd USENIX Security Symposium, 2023

2021
User compliance and remediation success after IoT malware notifications.
J. Cybersecur., 2021

Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2019
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Evasive Malware via Identifier Implanting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

2016
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats.
J. Inf. Process., 2016

SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

2015
Empowering Anti-malware Research in Japan by Sharing the MWS Datasets.
J. Inf. Process., 2015

IoTPOT: Analysing the Rise of IoT Compromises.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

2014
An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Catching the Behavioral Differences between Multiple Executions for Malware Detection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2012
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.
J. Inf. Process., 2012

Malware Detection Method by Catching Their Random Behavior in Multiple Executions.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012


  Loading...