Mitsutaka Itoh

According to our database1, Mitsutaka Itoh authored at least 14 papers between 2008 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme.
IEICE Trans. Commun., 2011

Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Towards Efficient Analysis for Malware in the Wild.
Proceedings of IEEE International Conference on Communications, 2011

Controlling malware HTTP communications in dynamic analysis system using search engine.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

2010
Source-oriented pattern analysis of flooding-type attacks in SIP-based internet telephony services.
Int. J. Multim. Intell. Secur., 2010

Design of Provider-Provisioned Website Protection Scheme against Malware Distribution.
IEICE Trans. Commun., 2010

Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks.
IEICE Trans. Commun., 2010

Investigation and analysis of malware on websites.
Proceedings of the 12th IEEE International Symposium on Web Systems Evolution, 2010

Virtual smartphone over IP.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Life-cycle monitoring scheme of malware download sites for websites.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

Memory behavior-based automatic malware unpacking in stealth debugging environment.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

Enhanced attack collection scheme on high-interaction web honeypots.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2009
Using Call Patterns to Detect Unwanted Communication Callers.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

2008
Scalable Detection of SIP Fuzzing Attacks.
Proceedings of the Second International Conference on Emerging Security Information, 2008


  Loading...