Author of the publication

Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection.

, , , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 138-145. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatically Generating Malware Analysis Reports Using Sandbox Logs., , , , , and . IEICE Trans. Inf. Syst., 101-D (11): 2622-2632 (2018)Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the Ethereum., , , and . QRS Companion, page 652-659. IEEE, (2021)Toward Automated Smart Ships: Designing Effective Cyber Risk Management., , , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 100-105. IEEE, (2020)IoT-Malware Detection Based on Byte Sequences of Executable Files., , , , , , and . AsiaJCIS, page 143-150. IEEE, (2020)A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing., , , , , , , and . AsiaJCIS, page 128-136. IEEE, (2020)Data Model for Android Package Information and Its Application to Risk Analysis System., , and . WISCS@CCS, page 71-80. ACM, (2014)Secure Distributed Storage for Bulk Data., and . ICONIP (5), volume 7667 of Lecture Notes in Computer Science, page 566-575. Springer, (2012)On-premises Analysis of Advanced Threat Prevention Appliances., , , and . CSET @ USENIX Security Symposium, page 1-8. ACM, (2021)Planning Robust Manual Tasks in Hierarchical Belief Spaces., , and . ICAPS, page 459-467. AAAI Press, (2018)Reconfigurable tasks in belief-space planning., , , and . Humanoids, page 1257-1263. IEEE, (2016)