default search action
Masashi Eto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori:
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework. Proc. Priv. Enhancing Technol. 2022(4): 140-161 (2022)
2010 – 2019
- 2019
- [c23]Takeshi Matsuda, Ryutaro Ushigome, Michio Sonoda, Hironobu Satoh, Tomohiro Hanada, Nobuhiro Kanahama, Masashi Eto, Hiroki Ishikawa, Katsumi Ikeda, Daiki Katoh:
Investigation and User's Web Search Skill Evaluation for Eye and Mouse Movement in Phishing of Short Message. AHFE (9) 2019: 131-136 - [c22]Takeshi Matsuda, Ryutaro Ushigome, Michio Sonoda, Masashi Eto, Hironobu Satoh, Tomohiro Hanada, Nobuhiro Kanahama, Hiroki Ishikawa, Katsumi Ikeda, Daiki Katoh:
Web Search Skill Evaluation from Eye and Mouse Momentum. IHSI 2019: 884-888 - 2016
- [c21]Tao Ban, Shaoning Pang, Masashi Eto, Daisuke Inoue, Koji Nakao, Runhe Huang:
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 341-349 - 2015
- [j12]Masashi Eto, Tomohide Tanaka, Koei Suzuki, Mio Suzuki, Daisuke Inoue, Koji Nakao:
GHOST Sensor: A Proactive Cyber Attack Monitoring Platform. IEICE Trans. Inf. Syst. 98-D(4): 788-795 (2015) - [c20]Ichiro Shimada, Yu Tsuda, Masashi Eto, Daisuke Inoue:
Using Bayesian Decision Making to Detect Slow Scans. BADGERS@RAID 2015: 32-41 - [c19]Tao Ban, Masashi Eto, Shanqing Guo, Daisuke Inoue, Koji Nakao, Runhe Huang:
A study on association rule mining of darknet big data. IJCNN 2015: 1-7 - 2012
- [j11]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
Towards Cost-Effective P2P Traffic Classification in Cloud Environment. IEICE Trans. Inf. Syst. 95-D(12): 2888-2897 (2012) - [j10]Takahiro Kasama, Katsunari Yoshioka, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto, Daisuke Inoue, Koji Nakao:
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior. Inf. Media Technol. 7(4): 1577-1587 (2012) - [j9]Takahiro Kasama, Katsunari Yoshioka, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto, Daisuke Inoue, Koji Nakao:
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior. J. Inf. Process. 20(4): 835-845 (2012) - [c18]Masashi Eto, Daisuke Inoue, Mio Suzuki, Koji Nakao:
Multipurpose Network Monitoring Platform Using Dynamic Address Assignment. AsiaJCIS 2012: 79-84 - [c17]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
A study on cost-effective P2P traffic classification. IJCNN 2012: 1-7 - [c16]Daisuke Inoue, Masashi Eto, Koei Suzuki, Mio Suzuki, Koji Nakao:
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system. VizSEC 2012: 72-79 - 2011
- [j8]Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao:
O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 245-254 (2011) - [j7]Hyung Chan Kim, Tatsunori Orii, Katsunari Yoshioka, Daisuke Inoue, Jungsuk Song, Masashi Eto, Junji Shikata, Tsutomu Matsumoto, Koji Nakao:
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation. IEICE Trans. Inf. Syst. 94-D(9): 1778-1791 (2011) - [j6]Junji Nakazato, Jungsuk Song, Masashi Eto, Daisuke Inoue, Koji Nakao:
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads. IEICE Trans. Inf. Syst. 94-D(11): 2150-2158 (2011) - [c15]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao:
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. BADGERS@EuroSys 2011: 29-36 - [c14]Masashi Eto, Daisuke Inoue, Jungsuk Song, Junji Nakazato, Kazuhiro Ohtaka, Koji Nakao:
nicter: a large-scale network incident analysis system: case studies for understanding threat landscape. BADGERS@EuroSys 2011: 37-45 - [c13]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
Entropy Based Discriminators for P2P Teletraffic Characterization. ICONIP (2) 2011: 18-27 - [c12]Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao:
Correlation Analysis between Spamming Botnets and Malware Infected Hosts. SAINT 2011: 372-375 - 2010
- [j5]Masashi Eto, Kotaro Sonoda, Daisuke Inoue, Katsunari Yoshioka, Koji Nakao:
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis. IEICE Trans. Inf. Syst. 93-D(5): 1106-1116 (2010) - [j4]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao:
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data. IEICE Trans. Inf. Syst. 93-D(9): 2544-2554 (2010) - [c11]Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:
Working Towards a Primary Binary Analysis System. Security and Management 2010: 459-465 - [c10]Jungsuk Song, Masashi Eto, Hyung Chan Kim, Daisuke Inoue, Koji Nakao:
A Heuristic-Based Feature Selection Method for Clustering Spam Emails. ICONIP (1) 2010: 290-297 - [c9]Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao:
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers. SAINT 2010: 257-260 - [c8]Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:
How to Locate a Target Binary Process and Its Derivatives in System Emulator. SAINT 2010: 273-276
2000 – 2009
- 2009
- [j3]Koji Nakao, Daisuke Inoue, Masashi Eto, Katsunari Yoshioka:
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring. IEICE Trans. Inf. Syst. 92-D(5): 787-798 (2009) - [j2]Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao:
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities. IEICE Trans. Inf. Syst. 92-D(5): 945-954 (2009) - [j1]Katsunari Yoshioka, Daisuke Inoue, Masashi Eto, Yuji Hoshizawa, Hiroki Nogawa, Koji Nakao:
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation. IEICE Trans. Inf. Syst. 92-D(5): 955-966 (2009) - [c7]Jungsuk Song, Daisuke Inoue, Masashi Eto, Mio Suzuki, Satoshi Hayashi, Koji Nakao:
A Methodology for Analyzing Overall Flow of Spam-Based Attacks. ICONIP (2) 2009: 556-564 - [c6]Masashi Eto, Kotaro Sonoda, Daisuke Inoue, Katsunari Yoshioka, Koji Nakao:
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis. ICONIP (2) 2009: 565-572 - [c5]Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao:
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. RAID 2009: 381-382 - 2008
- [c4]Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao:
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. ICC 2008: 1715-1721 - [c3]Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Masaya Yamagata, Eisuke Nishino, Jun'ichi Takeuchi, Kazuya Ohkouchi, Koji Nakao:
An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques. ICONIP (1) 2008: 579-586 - 2007
- [c2]Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda:
Design Issues of an Isolated Sandbox Used to Analyze Malwares. IWSEC 2007: 13-27 - [c1]Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda:
Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares. DETER 2007
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint