Detecting android malware by analyzing manifest files R Sato, D Chiba, S Goto Proceedings of the Asia-Pacific Advanced Network 36 (23-31), 17, 2013 | 93 | 2013 |
Efficient dynamic malware analysis based on network behavior using deep learning T Shibahara, T Yagi, M Akiyama, D Chiba, T Yada 2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016 | 49 | 2016 |
Detecting malicious websites by learning IP address features D Chiba, K Tobe, T Mori, S Goto 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012 | 40 | 2012 |
Efficient generic constructions of signcryption with insider security in the multi-user setting D Chiba, T Matsuda, JCN Schuldt, K Matsuura International Conference on Applied Cryptography and Network Security, 220-237, 2011 | 35 | 2011 |
Malicious URL sequence detection using event de-noising convolutional neural network T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ... 2017 IEEE International Conference on Communications (ICC), 1-7, 2017 | 23 | 2017 |
DomainProfiler: Discovering domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 23 | 2016 |
ShamFinder: An Automated Framework for Detecting IDN Homographs H Suzuki, D Chiba, Y Yoneya, T Mori, S Goto Proceedings of the Internet Measurement Conference, 449-462, 2019 | 14 | 2019 |
DomainChroma: Building actionable threat intelligence from malicious domain names D Chiba, M Akiyama, T Yagi, K Hato, T Mori, S Goto Computers & Security 77, 138-161, 2018 | 12 | 2018 |
Botprofiler: Profiling variability of substrings in http requests to detect malware-infected hosts D Chiba, T Yagi, M Akiyama, K Aoki, T Hariu, S Goto 2015 IEEE Trustcom/BigDataSE/ISPA 1, 758-765, 2015 | 11 | 2015 |
DomainScouter: Understanding the Risks of Deceptive IDNs D Chiba, AA Hasegawa, T Koide, Y Sawabe, S Goto, M Akiyama 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 9 | 2019 |
DomainProfiler: toward accurate and early discovery of domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Mori, S Goto International Journal of Information Security 17 (6), 661-680, 2018 | 6 | 2018 |
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps E Pariwono, D Chiba, M Akiyama, T Mori Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 6 | 2018 |
Detecting Homograph IDNs Using OCR Y Sawabe, D Chiba, M Akiyama, S Goto Proceedings of the Asia-Pacific Advanced Network 46, 56-64, 2018 | 6 | 2018 |
実践サイバーセキュリティモニタリング 八木毅, 青木一史, 秋山満昭, 幾世知範, 高田雄太, 千葉大紀 コロナ社, 2016 | 6 | 2016 |
実行ファイルに含まれる文字列の学習に基づくマルウェア検出方法 戸部和洋, 森達哉, 千葉大紀, 下田晃弘, 後藤滋樹 MWS2010 (2010 年 10 月), 2010 | 6 | 2010 |
Traffic feature information extraction method, traffic feature information extraction device, and traffic feature information extraction program D Chiba, T Yagi, T Sato, K Kamiya, K Nakata US Patent 10,721,244, 2020 | 5 | 2020 |
Analyzing spatial structure of ip addresses for detecting malicious websites D Chiba, K Tobe, T Mori, S Goto Information and Media Technologies 8 (3), 855-866, 2013 | 5 | 2013 |
BotProfiler: Detecting malware-infected hosts by profiling variability of malicious infrastructure D Chiba, T Yagi, M Akiyama, K Aoki, T Hariu, S Goto IEICE Transactions on Communications 99 (5), 1012-1023, 2016 | 4 | 2016 |
Detection Method of Homograph Internationalized Domain Names with OCR Y Sawabe, D Chiba, M Akiyama, S Goto Journal of Information Processing 27, 536-544, 2019 | 3 | 2019 |
Event de-noising convolutional neural network for detecting malicious url sequences from proxy logs T Shibahara, K Yamanishi, Y Takata, D Chiba, T Hokaguchi, M Akiyama, ... IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2018 | 3 | 2018 |