Junji Nakazato

According to our database1, Junji Nakazato authored at least 16 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A study of IoT malware activities using association rule learning for darknet sensor data.
Int. J. Inf. Sec., 2020

2018
A Darknet Traffic Analysis for IoT Malwares Using Association Rule Learning.
Proceedings of the INNS Conference on Big Data and Deep Learning 2018, 2018

A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Evolving cauchy possibilistic clustering and its application to large-scale cyberattack monitoring.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

2016
A neural network model for detecting DDoS attacks using darknet traffic features.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

2015
Large-Scale Monitoring for Cyber Attacks by Using Cluster Information on Darknet Traffic Features.
Proceedings of the INNS Conference on Big Data 2015, 2015

An autonomous online malicious spam email detection system using extended RBF network.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Adaptive DDoS-Event Detection from Big Darknet Traffic Data.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

2014
Detecting Malicious Spam Mails: An Online Machine Learning Approach.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2011
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads.
IEICE Trans. Inf. Syst., 2011

nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2007
Privacy Enhancing Credentials.
Proceedings of the Advances in Computer Science, 2007

Threshold Anonymous Group Identification and Zero-Knowledge Proof.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2005
Privacy Preserving Web-Based Questionnaire.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System.
Proceedings of the Security and Protection in Information Processing Systems, 2004


  Loading...