1. [1] S. Kato, R. Tanabe, K. Yoshioka, and T. Matsumoto, “Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices,” 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.143-151, 2021.
2. [2] “VirusTotal,” https://www.virustotal.com/.
3. [3] T. Inoue, S. Hara, H. Sakaki, K. Okada, E. Shioji, M. Akiyama, T. Sasaki, R. Tanabe, K. Yoshioka, K. Nakao, and T. Matsumoto, “Dynamic Analysis of Persistent IoT Malware Using Adaptive Sandbox,” ICSS2020-41, pp.90-95, 2021. (In Japanese)
4. [4] X. Huang, S. Mochizuki, and K. Yoshioka, “IoT Malware Infection Analysis for Network Identification and Uplink Speed Estimation,” SIG Technical Reports, vol.2021-CSEC-95(18), pp.1-6, 2021.
5. [5] X. Huang, S. Mochizuki, and K. Yoshioka, “Connection Type Identification and Uplink Speed Estimation of Malware Infected Hosts,” Journal of Information Processing, vol.30, pp.859-864, 2022. 10.2197/ipsjjip.30.859