Author of the publication

POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan.

, , and . CCS, page 1433-1435. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Principal Component Analysis of Botnet Takeover., , and . J. Inf. Process., (2011)User Access Domain Management Systems - ADAMS., and . ACISP, volume 1270 of Lecture Notes in Computer Science, page 50-61. Springer, (1997)A comparative study on structure of the motivation for information security by security incident experiences., , , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 9-16. ACM, (2009)Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation., , and . NBiS, page 541-545. IEEE Computer Society, (2010)Heuristics for Detecting Botnet Coordinated Attacks., , , and . ARES, page 603-607. IEEE Computer Society, (2010)Access Control for Inter-Organizational Computer Network Environment., , and . WWCA, volume 1274 of Lecture Notes in Computer Science, page 394-409. Springer, (1997)How Many Malicious Scanners Are in the Internet?, and . WISA, volume 4298 of Lecture Notes in Computer Science, page 381-390. Springer, (2006)POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan., , and . CCS, page 1433-1435. ACM, (2014)Orthogonal Expansion of Port-scanning Packets., , and . NBiS, page 321-326. IEEE Computer Society, (2009)A discovery of sequential attack patterns of malware in botnets., , , , and . SMC, page 2564-2570. IEEE, (2010)