Designing comprehensive cyber threat analysis platform: Can we orchestrate analysis engines? T Takahashi, Y Umemura, C Han, T Ban, K Furumoto, O Nakamura, ... 2021 IEEE International Conference on Pervasive Computing and Communications …, 2021 | 24 | 2021 |
Investigating behavioral differences between IoT malware via function call sequence graphs R Kawasoe, C Han, R Isawa, T Takahashi, J Takeuchi Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1674-1682, 2021 | 20 | 2021 |
Real-time detection of global cyberthreat based on darknet by estimating anomalous synchronization using graphical lasso C Han, J Shimamura, T Takahashi, D Inoue, J Takeuchi, K Nakao IEICE TRANSACTIONS on Information and Systems 103 (10), 2113-2124, 2020 | 16 | 2020 |
A fast algorithm for constructing phylogenetic trees with application to IoT malware clustering T He, C Han, R Isawa, T Takahashi, S Kijima, J Takeuchi, K Nakao International Conference on Neural Information Processing, 766-778, 2019 | 16 | 2019 |
Real-time detection of malware activities by analyzing darknet traffic using graphical lasso C Han, J Shimamura, T Takahashi, D Inoue, M Kawakita, J Takeuchi, ... 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 16 | 2019 |
Towards efficient labeling of network incident datasets using tcpreplay and snort K Masumi, C Han, T Ban, T Takahashi Proceedings of the eleventh ACM conference on data and application security …, 2021 | 14 | 2021 |
Malicious Packet Classification Based on Neural Network Using Kitsune Features K Miyamoto, H Goto, R Ishibashi, C Han, T Ban, T Takahashi, J Takeuchi Intelligent Systems and Pattern Recognition: Second International Conference …, 2022 | 13 | 2022 |
Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns C Han, J Takeuchi, T Takahashi, D Inoue IEEE Access 10, 13038-13058, 2022 | 12 | 2022 |
Internet-wide scanner fingerprint identifier based on TCP/IP header A Tanaka, C Han, T Takahashi, K Fujisawa 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), 1-6, 2021 | 12 | 2021 |
Automated detection of malware activities using nonnegative matrix factorization C Han, J Takeuchi, T Takahashi, D Inoue 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021 | 10 | 2021 |
Which packet did they catch? Associating NIDS alerts with their communication sessions R Ishibashi, H Goto, C Han, T Ban, T Takahashi, J Takeuchi 2021 16th Asia Joint Conference on Information Security (AsiaJCIS), 9-16, 2021 | 8 | 2021 |
Generating labeled training datasets towards unified network intrusion detection systems R Ishibashi, K Miyamoto, C Han, T Ban, T Takahashi, J Takeuchi IEEE Access 10, 53972-53986, 2022 | 6 | 2022 |
Leveraging machine learning techniques to identify deceptive decoy documents associated with targeted email attacks B Sun, T Ban, C Han, T Takahashi, K Yoshioka, J Takeuchi, ... IEEE Access 9, 87962-87971, 2021 | 6 | 2021 |
Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint A Tanaka, C Han, T Takahashi IEEE Access 11, 23227-23244, 2023 | 5 | 2023 |
Scalable and fast algorithm for constructing phylogenetic trees with application to IoT malware clustering T He, C Han, R Isawa, T Takahashi, S Kijima, J Takeuchi IEEE Access 11, 8240-8253, 2023 | 4 | 2023 |
Scalable and fast hierarchical clustering of IoT malware using active data selection T He, C Han, T Takahashi, S Kijima, J Takeuchi 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), 1-6, 2021 | 4 | 2021 |
Botnet detection using graphical lasso with graph density C Han, K Kono, S Tanaka, M Kawakita, J Takeuchi Neural Information Processing: 23rd International Conference, ICONIP 2016 …, 2016 | 4 | 2016 |
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities YW Chang, HY Chen, C Han, T Morikawa, T Takahashi, TN Lin IEEE Transactions on Emerging Topics in Computing, 2023 | 3 | 2023 |
Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach K Miyamoto, M Iida, C Han, T Ban, T Takahashi, J Takeuchi IEEE Access 11, 132792-132810, 2023 | 1 | 2023 |
Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis. C Han, A Tanaka, Jun'ichi Takeuchi, T Takahashi, T Morikawa, TN Lin ICISSP, 617-625, 2023 | 1 | 2023 |