Author of the publication

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences.

, , , , , and . IEICE Trans. Inf. Syst., 101-D (11): 2600-2611 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks., , , , and . IEICE Trans. Inf. Syst., 99-D (4): 860-872 (2016)Enhanced attack collection scheme on high-interaction web honeypots., , , and . ISCC, page 81-86. IEEE Computer Society, (2010)MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks., , , , and . COMPSAC, page 444-449. IEEE Computer Society, (2015)Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme., , , and . IEICE Trans. Commun., 94-B (5): 1339-1347 (2011)Scalable and Performance-Efficient Client Honeypot on High Interaction System., , and . SAINT, page 40-50. IEEE Computer Society, (2012)An Experimental Study of Logical Office service over International ATM Networks., , , , and . LCN, page 530-537. IEEE Computer Society, (1997)API Chaser: Anti-analysis Resistant Malware Analyzer., , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 123-143. Springer, (2013)Active Credential Leakage for Observing Web-Based Attack Cycle., , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 223-243. Springer, (2013)BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts., , , , , and . TrustCom/BigDataSE/ISPA (1), page 758-765. IEEE, (2015)Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs., , and . IT Prof., 15 (4): 50-56 (2013)