Masashi Eto

Orcid: 0000-0002-7699-5476

According to our database1, Masashi Eto authored at least 35 papers between 2007 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework.
Proc. Priv. Enhancing Technol., 2022

2019
Web Search Skill Evaluation from Eye and Mouse Momentum.
Proceedings of the Intelligent Human Systems Integration 2019, 2019

Investigation and User's Web Search Skill Evaluation for Eye and Mouse Movement in Phishing of Short Message.
Proceedings of the Advances in Human Factors in Cybersecurity, 2019

2016
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

2015
GHOST Sensor: A Proactive Cyber Attack Monitoring Platform.
IEICE Trans. Inf. Syst., 2015

A study on association rule mining of darknet big data.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Using Bayesian Decision Making to Detect Slow Scans.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2012
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.
J. Inf. Process., 2012

Towards Cost-Effective P2P Traffic Classification in Cloud Environment.
IEICE Trans. Inf. Syst., 2012

DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

A study on cost-effective P2P traffic classification.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Multipurpose Network Monitoring Platform Using Dynamic Address Assignment.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads.
IEICE Trans. Inf. Syst., 2011

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011

Correlation Analysis between Spamming Botnets and Malware Infected Hosts.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Entropy Based Discriminators for P2P Teletraffic Characterization.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010

Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis.
IEICE Trans. Inf. Syst., 2010

An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

How to Locate a Target Binary Process and Its Derivatives in System Emulator.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A Heuristic-Based Feature Selection Method for Clustering Spam Emails.
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010

Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation.
IEICE Trans. Inf. Syst., 2009

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring.
IEICE Trans. Inf. Syst., 2009

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities.
IEICE Trans. Inf. Syst., 2009

DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

A Methodology for Analyzing Overall Flow of Spam-Based Attacks.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

2008
An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.
Proceedings of IEEE International Conference on Communications, 2008

2007
Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

Design Issues of an Isolated Sandbox Used to Analyze Malwares.
Proceedings of the Advances in Information and Computer Security, 2007


  Loading...