1. (1) National Institute of Information and Communications Technology NICT NEWS: “A State-of-the-Art R&D on Cybersecurity”, Vol. 472, No. 6 (2018-11)
2. (2) Y. Taniwaki: “Cybersecurity in the Age of Digital Economy—Toward Establishing a Foundation for Digital Transformation—: 4. Spreading IoT Devices and Cybersecurity Policy”, IPSJ Magazine, Vol. 59, No. 12, pp. 1090-1094 (2018-11) (in Japanese)
3. (4) M. Kashiyama: “Explanation of Data Bus Technologies for High Speed Processing”, IPSJ Magazine, Vol. 38, No. 6, pp. 457-459 (1997-6) (in Japanese)
4. (5) M. Iwamura, M. Itoh, and Y. Muraoka: “Automatic Malware Classification System Based on Similarity of Machine Code Instructions”, IPSJ Journal, Vol. 51, No. 9, pp. 1622-1632 (2010-9) (in Japanese)
5. (6) L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath: “Malware Images: Visualization and Automatic Classification”, VizSec' 11 Proceeding of the 8th International Symposium on Visualization for Cyber Security, Article No. 4, (2011-7)