default search action
Koji Nakao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j30]Koji Nakao, Katsunari Yoshioka, Takayuki Sasaki, Rui Tanabe, Xuping Huang, Takeshi Takahashi, Akira Fujita, Jun'ichi Takeuchi, Noboru Murata, Junji Shikata, Kazuki Iwamoto, Kazuki Takada, Yuki Ishida, Masaru Takeuchi, Naoto Yanai:
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware. IEICE Trans. Inf. Syst. 106(9): 1302-1315 (2023) - [c44]Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue:
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT. USENIX Security Symposium 2023: 1541-1558 - 2022
- [c43]Dingyi Pei, Koji Nakao, Heung Youl Youm, Chun-I Fan:
Message from the General Co-Chairs: AsiaJCIS 2022. AsiaJCIS 2022: vii - [i1]Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue:
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT. CoRR abs/2210.02137 (2022) - 2020
- [j29]Wojciech Mazurczyk, Pascal Bisson, Roger Piqueras Jover, Koji Nakao, Krzysztof Cabaj:
Special issue on Advancements in 5G Networks Security. Future Gener. Comput. Syst. 110: 314-316 (2020) - [j28]Chansu Han, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Jun'ichi Takeuchi, Koji Nakao:
Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso. IEICE Trans. Inf. Syst. 103-D(10): 2113-2124 (2020) - [j27]Wojciech Mazurczyk, Pascal Bisson, Roger Piqueras Jover, Koji Nakao, Krzysztof Cabaj:
Challenges and Novel Solutions for 5G Network Security, Privacy and Trust. IEEE Wirel. Commun. 27(4): 6-7 (2020) - [c42]Keisuke Furumoto, Antti Kolehmainen, Bilhanan Silverajan, Takeshi Takahashi, Daisuke Inoue, Koji Nakao:
Toward Automated Smart Ships: Designing Effective Cyber Risk Management. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 100-105
2010 – 2019
- 2019
- [c41]Bing-Kai Hong, Jr-Wei Huang, Tao Ban, Ryoichi Isawa, Shin-Ming Cheng, Daisuke Inoue, Koji Nakao:
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices. AsiaJCIS 2019: 9-15 - [c40]Tianxiang He, Chansu Han, Ryoichi Isawa, Takeshi Takahashi, Shuji Kijima, Jun'ichi Takeuchi, Koji Nakao:
A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering. ICONIP (1) 2019: 766-778 - [c39]Chansu Han, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Masanori Kawakita, Jun'ichi Takeuchi, Koji Nakao:
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso. TrustCom/BigDataSE 2019: 144-151 - 2018
- [j26]Ryoya Furukawa, Ryoichi Isawa, Masakatu Morii, Daisuke Inoue, Koji Nakao:
FCReducer: Locating Symmetric Cryptographic Functions on the Memory. IEICE Trans. Inf. Syst. 101-D(3): 685-697 (2018) - [j25]Takeshi Takahashi, Bhola Panta, Youki Kadobayashi, Koji Nakao:
Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information. Int. J. Commun. Syst. 31(3) (2018) - [c38]Yu Tsuda, Junji Nakazato, Yaichiro Takagi, Daisuke Inoue, Koji Nakao, Kenjiro Terada:
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns. AsiaJCIS 2018: 102-108 - [c37]Koji Nakao:
Keynote Talk #2. DSC 2018: 14 - [c36]Koji Nakao:
Proactive cyber security response by utilizing passive monitoring technologies. ICCE 2018: 1 - [c35]Linus Torvalds, Niraj K. Jha, Gary Davis, Nasir D. Memon, Petronel Bigioi, Swarup Bhunia, Koji Nakao:
Keynotes. ICCE 2018: 1-4 - 2017
- [j24]Wojciech Mazurczyk, Maciej Korczynski, Koji Nakao, Engin Kirda, Cristian Hesselman, Katsunari Yoshioka:
Traffic Measurements for Cyber Security. IEEE Commun. Mag. 55(7): 12-13 (2017) - [c34]Keisuke Furumoto, Korehito Kashiki, Masakatu Morii, Masato Ikegami, Tomohisa Hasegawa, Teiichi Ishikawa, Koji Nakao:
Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis. CANDAR 2017: 94-100 - [c33]Tao Ban, Lei Zhu, Jumpei Shimamura, Shaoning Pang, Daisuke Inoue, Koji Nakao:
Detection of Botnet Activities Through the Lens of a Large-Scale Darknet. ICONIP (5) 2017: 442-451 - 2016
- [c32]Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM. AsiaJCIS 2016: 141-146 - [c31]Takeshi Takahashi, Tao Ban, Chin-Wei Tien, Chih-Hung Lin, Daisuke Inoue, Koji Nakao:
The Usability of Metadata for Android Application Analysis. ICONIP (1) 2016: 546-554 - [c30]Takeshi Takahashi, Daisuke Miyamoto, Koji Nakao:
Toward automated vulnerability monitoring using open information and standardized tools. PerCom Workshops 2016: 1-4 - [c29]Tao Ban, Shaoning Pang, Masashi Eto, Daisuke Inoue, Koji Nakao, Runhe Huang:
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 341-349 - 2015
- [j23]Masashi Eto, Tomohide Tanaka, Koei Suzuki, Mio Suzuki, Daisuke Inoue, Koji Nakao:
GHOST Sensor: A Proactive Cyber Attack Monitoring Platform. IEICE Trans. Inf. Syst. 98-D(4): 788-795 (2015) - [j22]Ryoichi Isawa, Daisuke Inoue, Koji Nakao:
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking. IEICE Trans. Inf. Syst. 98-D(4): 883-893 (2015) - [c28]Takeshi Takahashi, Tao Ban, Takao Mimura, Koji Nakao:
Fine-Grained Risk Level Quantication Schemes Based on APK Metadata. ICONIP (3) 2015: 663-673 - [c27]Tao Ban, Masashi Eto, Shanqing Guo, Daisuke Inoue, Koji Nakao, Runhe Huang:
A study on association rule mining of darknet big data. IJCNN 2015: 1-7 - 2014
- [j21]Ryoichi Isawa, Tao Ban, Shanqing Guo, Daisuke Inoue, Koji Nakao:
An Accurate Packer Identification Method Using Support Vector Machine. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 253-263 (2014) - [c26]Takeshi Takahashi, Koji Nakao, Akira Kanaoka:
Data Model for Android Package Information and Its Application to Risk Analysis System. WISCS@CCS 2014: 71-80 - 2013
- [j20]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao:
Toward a more practical unsupervised anomaly detection system. Inf. Sci. 231: 4-14 (2013) - [c25]Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel. AsiaJCIS 2013: 69-76 - [c24]Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Application of string kernel based support vector machine for malware packer identification. IJCNN 2013: 1-8 - 2012
- [j19]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
Towards Cost-Effective P2P Traffic Classification in Cloud Environment. IEICE Trans. Inf. Syst. 95-D(12): 2888-2897 (2012) - [j18]Takahiro Kasama, Katsunari Yoshioka, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto, Daisuke Inoue, Koji Nakao:
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior. Inf. Media Technol. 7(4): 1577-1587 (2012) - [j17]Takahiro Kasama, Katsunari Yoshioka, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto, Daisuke Inoue, Koji Nakao:
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior. J. Inf. Process. 20(4): 835-845 (2012) - [c23]Masashi Eto, Daisuke Inoue, Mio Suzuki, Koji Nakao:
Multipurpose Network Monitoring Platform Using Dynamic Address Assignment. AsiaJCIS 2012: 79-84 - [c22]Tao Ban, Lei Zhu, Jumpei Shimamura, Shaoning Pang, Daisuke Inoue, Koji Nakao:
Behavior Analysis of Long-term Cyber Attacks in the Darknet. ICONIP (5) 2012: 620-628 - [c21]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
A study on cost-effective P2P traffic classification. IJCNN 2012: 1-7 - [c20]Daisuke Inoue, Masashi Eto, Koei Suzuki, Mio Suzuki, Koji Nakao:
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system. VizSEC 2012: 72-79 - 2011
- [j16]Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao:
O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 245-254 (2011) - [j15]Hyung Chan Kim, Tatsunori Orii, Katsunari Yoshioka, Daisuke Inoue, Jungsuk Song, Masashi Eto, Junji Shikata, Tsutomu Matsumoto, Koji Nakao:
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation. IEICE Trans. Inf. Syst. 94-D(9): 1778-1791 (2011) - [j14]Junji Nakazato, Jungsuk Song, Masashi Eto, Daisuke Inoue, Koji Nakao:
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads. IEICE Trans. Inf. Syst. 94-D(11): 2150-2158 (2011) - [c19]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao:
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. BADGERS@EuroSys 2011: 29-36 - [c18]Masashi Eto, Daisuke Inoue, Jungsuk Song, Junji Nakazato, Kazuhiro Ohtaka, Koji Nakao:
nicter: a large-scale network incident analysis system: case studies for understanding threat landscape. BADGERS@EuroSys 2011: 37-45 - [c17]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
Entropy Based Discriminators for P2P Teletraffic Characterization. ICONIP (2) 2011: 18-27 - [c16]Takeshi Takahashi, Youki Kadobayashi, Koji Nakao:
Toward global cybersecurity collaboration: Cybersecurity operation activity model. Kaleidoscope 2011: 1-8 - [c15]Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao:
Correlation Analysis between Spamming Botnets and Malware Infected Hosts. SAINT 2011: 372-375 - 2010
- [j13]Masashi Eto, Kotaro Sonoda, Daisuke Inoue, Katsunari Yoshioka, Koji Nakao:
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis. IEICE Trans. Inf. Syst. 93-D(5): 1106-1116 (2010) - [j12]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao:
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data. IEICE Trans. Inf. Syst. 93-D(9): 2544-2554 (2010) - [j11]Takaya Yamazato, Koji Nakao, Hiraku Okada, Masaaki Katayama:
Experimental Results on Simple Distributed Cooperative Transmission Scheme with Visible Light Communication. IEICE Trans. Commun. 93-B(11): 2959-2962 (2010) - [c14]Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:
Working Towards a Primary Binary Analysis System. Security and Management 2010: 459-465 - [c13]Jungsuk Song, Masashi Eto, Hyung Chan Kim, Daisuke Inoue, Koji Nakao:
A Heuristic-Based Feature Selection Method for Clustering Spam Emails. ICONIP (1) 2010: 290-297 - [c12]Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao:
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers. SAINT 2010: 257-260 - [c11]Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:
How to Locate a Target Binary Process and Its Derivatives in System Emulator. SAINT 2010: 273-276
2000 – 2009
- 2009
- [j10]Koji Nakao, Daisuke Inoue, Masashi Eto, Katsunari Yoshioka:
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring. IEICE Trans. Inf. Syst. 92-D(5): 787-798 (2009) - [j9]Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao:
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities. IEICE Trans. Inf. Syst. 92-D(5): 945-954 (2009) - [j8]Katsunari Yoshioka, Daisuke Inoue, Masashi Eto, Yuji Hoshizawa, Hiroki Nogawa, Koji Nakao:
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation. IEICE Trans. Inf. Syst. 92-D(5): 955-966 (2009) - [c10]Jungsuk Song, Daisuke Inoue, Masashi Eto, Mio Suzuki, Satoshi Hayashi, Koji Nakao:
A Methodology for Analyzing Overall Flow of Spam-Based Attacks. ICONIP (2) 2009: 556-564 - [c9]Masashi Eto, Kotaro Sonoda, Daisuke Inoue, Katsunari Yoshioka, Koji Nakao:
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis. ICONIP (2) 2009: 565-572 - [c8]Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao:
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. RAID 2009: 381-382 - 2008
- [j7]Koji Nakao:
Special Section on Information and Communication System Security. IEICE Trans. Inf. Syst. 91-D(5): 1225 (2008) - [j6]Kenji Rikitake, Koji Nakao, Shinji Shimojo, Hiroki Nogawa:
UDP Large-Payload Capability Detection for DNSSEC. IEICE Trans. Inf. Syst. 91-D(5): 1261-1273 (2008) - [c7]Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao:
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. ICC 2008: 1715-1721 - [c6]Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Masaya Yamagata, Eisuke Nishino, Jun'ichi Takeuchi, Kazuya Ohkouchi, Koji Nakao:
An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques. ICONIP (1) 2008: 579-586 - 2004
- [j5]Koji Nakao:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 1 (2004) - [j4]Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao:
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 182-189 (2004) - [c5]Kenji Rikitake, Hiroki Nogawa, Toshiaki Tanaka, Koji Nakao, Shinji Shimojo:
DNS Transport Size Issues in IPv6 Environment. SAINT Workshops 2004: 141-145 - 2002
- [c4]Atsushi Tagami, Teruyuki Hasegawa, Toru Hasegawa, Koji Nakao:
OC-48c traffic tester for generating and analyzing long-range dependence traffic. ISCC 2002: 975-982 - [c3]Teruyuki Hasegawa, Toru Hasegawa, Yutaka Miyake, Koji Nakao:
TCP gateway for satellite-based Internet service accommodating multiple subscribers. WCNC 2002: 849-854 - 2001
- [c2]Toru Hasegawa, Shigehiro Ano, Koji Nakao, Fumito Kubota:
Programmable Remote Traffic Monitoring Method Using Active Network Approach. IWAN 2001: 49-64 - 2000
- [c1]Kiyohito Yoshihara, Keizo Sugiyama, Koji Nakao, Toshikane Oda, Sadao Obana:
Dynamic Load-Balancing for Distibuted Management in Active Networks. IWAN 2000: 326-342
1990 – 1999
- 1994
- [j3]Koji Nakao, Toshiaki Tanaka, Kenji Suzuki, Yoshiyori Urano:
Implementation and evaluation of SCSE for OSI secure communications. Syst. Comput. Jpn. 25(9): 17-31 (1994) - 1990
- [j2]Koji Nakao, Sadao Obana, Satoshi Nishiyama, Toshiaki Tanaka:
Feasibility Study for Worldwide Videotex Interworking. IEEE J. Sel. Areas Commun. 8(1): 80-92 (1990)
1980 – 1989
- 1989
- [j1]Koji Nakao, Kenji Suzuki:
Proposal on a secure communications service element (SCSE) in the OSI application layer. IEEE J. Sel. Areas Commun. 7(4): 505-516 (1989)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint