Follow
Takahiro Kasama
Takahiro Kasama
Verified email at nict.go.jp
Title
Cited by
Cited by
Year
{IoTPOT}: analysing the rise of {IoT} compromises
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
4732015
IoTPOT: A novel honeypot for revealing current IoT threats
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
Journal of Information Processing 24 (3), 522-533, 2016
2822016
Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion
A Yokoyama, K Ishii, R Tanabe, Y Papa, K Yoshioka, T Matsumoto, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
1122016
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
O Çetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ...
NDSS, 2019
632019
マルウェア対策のための研究用データセット~ MWS Datasets 2015~
神薗雅紀, 秋山満昭, 笠間貴弘, 村上純一, 畑田充弘, 寺田真敏
研究報告セキュリティ心理学とトラスト (SPT) 2015 (6), 1-8, 2015
442015
Empowering anti-malware research in Japan by sharing the MWS datasets
M Hatada, M Akiyama, T Matsuki, T Kasama
Journal of Information Processing 23 (5), 579-588, 2015
382015
マルウェア対策のための研究用データセット~ MWS Datasets 2018~
高田雄太, 寺田真敏, 松木隆宏, 笠間貴弘, 荒木粧子, 畑田充弘
研究報告セキュリティ心理学とトラスト (SPT) 2018 (38), 1-8, 2018
372018
Datasets for anti-malware research-MWS datasets 2013
M Kamizono, M Hatada, M Terada, M Akiyama, T Kasama, J Murakami
Anti Malware Engineering WorkShop, 2013
222013
An approach to detect drive-by download by observing the web page transition behaviors
T Matsunaka, A Kubota, T Kasama
2014 Ninth Asia Joint Conference on Information Security, 19-25, 2014
212014
Sandbox analysis with controlled internet connection for observing temporal changes of malware behavior
K Yoshioka, T Kasama, T Matsumoto
2009 Joint Workshop on Information Security (JWIS 2009), 2009
212009
Evasive Malware via Identifier Implanting
R Tanabe, W Ueno, K Ishii, K Yoshioka, T Matsumoto, T Kasama, D Inoue, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018
162018
Datasets for anti-malware research mws datasets 2018
Y Takata, M Terada, T Matsuki, T Kasama, S Araki, M Hatada
Information Processing Society of Japan 2018 (38), 2018
152018
Malware detection method by catching their random behavior in multiple executions
T Kasama, K Yoshioka, D Inoue, T Matsumoto
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012
142012
ドライブ・バイ・ダウンロード攻撃対策フレームワークの提案
笠間貴弘, 井上大介, 衛藤将史, 中里純二, 中尾康二
コンピュータセキュリティシンポジウム 2011 論文集 2011 (3), 780-785, 2011
142011
Can isps help mitigate iot malware? a longitudinal study of broadband isp security efforts
A Noroozian, ET Rodriguez, E Lastdrager, T Kasama, M Van Eeten, ...
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 337-352, 2021
122021
User compliance and remediation success after IoT malware notifications
E Rodríguez, S Verstegen, A Noroozian, D Inoue, T Kasama, ...
Journal of Cybersecurity 7 (1), tyab015, 2021
102021
Exploit Kit の特徴を用いた悪性 Web サイト検知手法の提案
笠間貴弘, 神薗雅紀, 井上大介
コンピュータセキュリティシンポジウム 2013 論文集 2013 (4), 603-610, 2013
102013
マルウェア対策のための研究用データセット~ MWS Datasets 2019~
荒木粧子, 笠間貴弘, 押場博光, 千葉大紀, 畑田充弘, 寺田真敏
研究報告コンピュータセキュリティ (CSEC) 2019 (8), 1-8, 2019
92019
文字出現頻度をパラメータとした機械学習による悪質な難読化 JavaScript の検出
西田雅太, 星澤裕二, 笠間貴弘, 衛藤将史, 井上大介, 中尾康二
研究報告コンピュータセキュリティ (CSEC) 2014 (21), 1-7, 2014
92014
Obfuscated malicious JavaScript detection using machine learning with character frequency
M Nishida, Y Hoshizawa, T Kasama, M Etou, D Inoue, K Nakao
Information processing society of Japan SIG Technical report 2014, 2014
82014
The system can't perform the operation now. Try again later.
Articles 1–20