-
2
-
-
84963952488
-
Proposal of a network control system to detect, analyze and mitigate targeted cyber attacks (Internet architecture)
-
H. Hasegawa, Y. Yamaguchi, H. Shimada, and H. Takakura, "Proposal of a network control system to detect, analyze and mitigate targeted cyber attacks (Internet architecture). IEICE technical report, vol. 113, no. 240, pp. 1-6, 2013.
-
(2013)
IEICE Technical Report
, vol.113
, Issue.240
, pp. 1-6
-
-
Hasegawa, H.1
Yamaguchi, Y.2
Shimada, H.3
Takakura, H.4
-
3
-
-
84928602652
-
A countermeasure recommendation system against targeted attacks with preserving continuity of internal networks
-
in press
-
H. Hasegawa, "A countermeasure recommendation system against targeted attacks with preserving continuity of internal networks. The 38th Annual International Computers, Software and Applications Conference, 2014, in press.
-
(2014)
The 38th Annual International Computers, Software and Applications Conference
-
-
Hasegawa, H.1
-
4
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
C. Willems, T. Holz, and F. Freiling, "Toward automated dynamic malware analysis using cwsandbox. Security Privacy, IEEE, vol. 5, no. 2, pp. 32-39, 2007.
-
(2007)
Security Privacy IEEE
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
5
-
-
82955197334
-
GQ: Practical containment for measuring modern malware systems
-
C. Kreibich, N. Weaver, C. Kanich, W. Cui, and V. Paxson, "GQ: Practical containment for measuring modern malware systems. in Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, ser. IMC '11. ACM, 2011, pp. 397-412.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, Ser. IMC '11 ACM
, pp. 397-412
-
-
Kreibich, C.1
Weaver, N.2
Kanich, C.3
Cui, W.4
Paxson, V.5
-
6
-
-
33750376717
-
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren, G. M. Voelker, and S. Savage, "Scalability, fidelity, and containment in the potemkin virtual honeyfarm. SIGOPS Oper. Syst. Rev., vol. 39, no. 5, pp. 148-162, 2005.
-
(2005)
SIGOPS Oper. Syst. Rev.
, vol.39
, Issue.5
, pp. 148-162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
7
-
-
77950656508
-
Multi-pass malware sandbox analysis with controlled internet connection
-
K. Yoshioka and T. Matsumoto, "Multi-pass malware sandbox analysis with controlled internet connection. IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. 93, no. 1, pp. 210-218, 2010.
-
(2010)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.93
, Issue.1
, pp. 210-218
-
-
Yoshioka, K.1
Matsumoto, T.2
-
8
-
-
84998683824
-
Structure and security strategy of secure gigabit network system, KUINS-III (in Japanese)
-
H. Takakura, Y. Ebara, S. Miyazaki, A. Sawada, M. Nakamura, and Y. Okabe, "Structure and security strategy of secure gigabit network system, KUINS-III (in Japanese). The transactions of the Institute of Electronics, Information and Communication Engineers. B, vol. 86, no. 8, pp. 1494-1501, 2003.
-
(2003)
The Transactions of the Institute of Electronics, Information and Communication Engineers. B
, vol.86
, Issue.8
, pp. 1494-1501
-
-
Takakura, H.1
Ebara, Y.2
Miyazaki, S.3
Sawada, A.4
Nakamura, M.5
Okabe, Y.6
-
9
-
-
84867976535
-
Unknown attacks detection using feature extraction from anomaly-based IDS alerts
-
IEEE/IPSJ 12th International Symposium on 2012
-
M. Sato, H. Yamaki, and H. Takakura, "Unknown attacks detection using feature extraction from anomaly-based IDS alerts. in Applications and the Internet, 2012 IEEE/IPSJ 12th International Symposium on, 2012, pp. 273-277.
-
(2012)
Applications and the Internet
, pp. 273-277
-
-
Sato, M.1
Yamaki, H.2
Takakura, H.3
|