Author of the publication

Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning.

, , , , and . IEICE Trans. Inf. Syst., 102-D (4): 725-736 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Precise and Robust Detection of Advertising Fraud., , , and . COMPSAC (1), page 776-785. IEEE, (2019)Graph Signal Processing for Directed Graphs Based on the Hermitian Laplacian., , , , and . ECML/PKDD (1), volume 11906 of Lecture Notes in Computer Science, page 447-463. Springer, (2019)Detecting and Understanding Online Advertising Fraud in the Wild., , , , , and . IEICE Trans. Inf. Syst., 103-D (7): 1512-1523 (2020)DomainChroma: Building actionable threat intelligence from malicious domain names., , , , , and . Comput. Secur., (2018)On the integrated control of virtual machine live migration and traffic engineering for cloud computing., , , , , and . GLOBECOM, page 1629-1634. IEEE, (2012)Inferring relevant blocks on hyperlinked web page based on block-to-block similarity., , , , and . Int. J. Knowl. Web Intell., 4 (4): 279-299 (2013)Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities., , , , , and . IEICE Trans. Inf. Syst., 102-D (3): 430-443 (2019)Virtual Content-Centric Networking., , , , , and . J. Networks, 9 (4): 807-815 (2014)Cross-Vendor Knowledge Transfer for Managed Security Services with Triplet Network., , , , , , , and . AISec@CCS, page 59-69. ACM, (2019)POSTER: Predicting Website Abuse Using Update Histories., , , , and . WWW (Companion Volume), page 9-10. ACM, (2018)