Follow
Daisuke Inoue
Title
Cited by
Cited by
Year
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation
J Song, H Takakura, Y Okabe, M Eto, D Inoue, K Nakao
Proceedings of the first workshop on building analysis datasets and …, 2011
4162011
Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion
A Yokoyama, K Ishii, R Tanabe, Y Papa, K Yoshioka, T Matsumoto, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
1162016
nicter: An incident analysis system toward binding network monitoring with malware analysis
D Inoue, M Eto, K Yoshioka, S Baba, K Suzuki, J Nakazato, K Ohtaka, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
992008
Referential kNN Regression for Financial Time Series Forecasting
T Ban, R Zhang, S Pang, A Sarrafzadeh, D Inoue
Neural Information Processing: 20th International Conference, ICONIP 2013 …, 2013
732013
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
O Çetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ...
NDSS, 2019
672019
Malware behavior analysis in isolated miniature network for revealing malware's network activity
D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao
2008 IEEE International Conference on Communications, 1715-1721, 2008
672008
Automated malware analysis system and its sandbox for revealing malware's internal and external activities
D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao
IEICE transactions on information and systems 92 (5), 945-954, 2009
632009
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system
D Inoue, M Eto, K Suzuki, M Suzuki, K Nakao
Proceedings of the ninth international symposium on visualization for cyber …, 2012
552012
Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring
K Nakao, D Inoue, M Eto, K Yoshioka
IEICE TRANSACTIONS on Information and Systems 92 (5), 787-798, 2009
552009
Combat security alert fatigue with ai-assisted techniques
T Ban, N Samuel, T Takahashi, D Inoue
Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 9-16, 2021
462021
Threat alert prioritization using isolation forest and stacked auto encoder with day-forward-chaining analysis
ME Aminanto, T Ban, R Isawa, T Takahashi, D Inoue
IEEE Access 8, 217977-217986, 2020
452020
Nicter: A large-scale network incident analysis system: Case studies for understanding threat landscape
M Eto, D Inoue, J Song, J Nakazato, K Ohtaka, K Nakao
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
402011
A novel concept of network incident analysis based on multi-layer observations of malware activities
K Nakao, K Yoshioka, D Inoue, M Eto
The 2nd Joint Workshop on Information Security (JWIS07), 267-279, 2007
402007
A study on association rule mining of darknet big data
T Ban, M Eto, S Guo, D Inoue, K Nakao, R Huang
2015 International Joint Conference on Neural Networks (IJCNN), 1-7, 2015
392015
An incident analysis system NICTER and its analysis engines based on data mining techniques
D Inoue, K Yoshioka, M Eto, M Yamagata, E Nishino, J Takeuchi, ...
Advances in Neuro-Information Processing: 15th International Conference …, 2009
352009
The carna botnet through the lens of a network telescope
E Le Malécot, D Inoue
Foundations and Practice of Security: 6th International Symposium, FPS 2013 …, 2014
342014
Integration of multi-modal features for android malware detection using linear SVM
T Ban, T Takahashi, S Guo, D Inoue, K Nakao
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016
302016
Dynamic class imbalance learning for incremental LPSVM
S Pang, L Zhu, G Chen, A Sarrafzadeh, T Ban, D Inoue
Neural Networks 44, 87-100, 2013
302013
Efficient detection and classification of internet-of-things malware based on byte sequences from executable files
TL Wan, T Ban, SM Cheng, YT Lee, B Sun, R Isawa, T Takahashi, D Inoue
IEEE Open Journal of the Computer Society 1, 262-275, 2020
282020
Scheme of standard MIDI files steganography and its evaluation
D Inoue, T Matsumoto
Security and Watermarking of Multimedia Contents IV 4675, 194-205, 2002
242002
The system can't perform the operation now. Try again later.
Articles 1–20