Affiliation:
1. National Defense Academy
Publisher
Information Processing Society of Japan
Reference33 articles.
1. [1] Mimura, M., Otsubo, Y., Tanaka, H. and Tanaka, H.: A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs, Proc. 12th Asia Joint Conference on Information Security, pp.31-37 (2017).
2. [2] Shibahara, T., Yamanishi, K., Takata, Y., Chiba, D., Akiyama, M., Yagi, T., Ohsita, Y. and Murata, M.: Malicious URL Sequence Detection using Event De-noising Convolutional Neural Network, Proc. IEEE ICC 2017 Communication and Information Systems Security Symposium (2017).
3. [3] Takata, Y., Akiyama, M., Yagi, Y., Hariu, T. and Goto, G.: MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attack, Proc. 2015 IEEE 39th Annual Computer Software and Applications Conference, Vol.2, pp.444-449 (2015).
4. [4] Jodavi, M., Abadi, M. and Parhizkar, E.: DbDHunter: An ensemble-based anomaly detection approach to detect drive-by download attacks, Proc. 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE), pp.273-278 (2015).
5. [5] Mimura, M. and Tanaka, H.: Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector, Proc. 13th International Conference on Information Systems Security, LNCS, Vol.10717, pp.146-163 (2017).
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献