{IoTPOT}: analysing the rise of {IoT} compromises YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow 9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015 | 474 | 2015 |
IoTPOT: A novel honeypot for revealing current IoT threats YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow Journal of Information Processing 24 (3), 522-533, 2016 | 282 | 2016 |
An attacker’s dream? exploring the capabilities of chatgpt for developing malware YM Pa Pa, S Tanizaki, T Kou, M Van Eeten, K Yoshioka, T Matsumoto Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 10-18, 2023 | 20 | 2023 |
IoTPOT: analysing the rise of IoT compromises MPP Yin, S Suzuki, K Yoshioka Usenix Conference on Offensive Technologies, 9, 2015 | 8 | 2015 |
Detecting malicious domains and authoritative name servers based on their distinct mappings to IP addresses YMP Pa, K Yoshioka, T Matsumoto Journal of information processing 23 (5), 623-632, 2015 | 7 | 2015 |
Search Engine Based Investigation on Misconfiguration of Zone Transfer YMP Pa, K Yoshioka, T Matsumoto 2013 Eighth Asia Joint Conference on Information Security, 56-62, 2013 | 1 | 2013 |
Finding malicious authoritative DNS servers YMP Pa, K Yoshioka, T Matsumoto Information and Communication System Security (ICSS-2013), 2013 | 1 | 2013 |
Assessment Method for Persistent Malware Infection on IoT Devices S Soeda, T Inoue, R Tanabe, YMP Pa, K Yoshioka, T Matsumoto IEICE Technical Report; IEICE Tech. Rep. 122 (422), 181-186, 2023 | | 2023 |
Towards observation of online fraud exploiting multiple SNS Y Kawaguchi, K Takada, YMP Pa, R Tanabe, K Yoshioka, T Matsumoto IEICE Technical Report; IEICE Tech. Rep. 122 (422), 175-180, 2023 | | 2023 |
A Study on Detecting Cyber Attack Resources by Coordinated Passive and Active Monitoring MPP Yin | | 2016 |
Cryptocurrency Analysis System for Investigating Cyber Crime Economy H Mori, H Kumagai, YMP Pa, Y Takata, R Furukawa, Y Sakurai, ... IEICE Technical Report; IEICE Tech. Rep., 0 | | |