default search action
Ryoichi Isawa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Tianxiang He, Chansu Han, Ryoichi Isawa, Takeshi Takahashi, Shuji Kijima, Jun'ichi Takeuchi:
Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering. IEEE Access 11: 8240-8253 (2023) - 2022
- [j8]Rui Tanabe, Tsuyufumi Watanabe, Akira Fujita, Ryoichi Isawa, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure. J. Inf. Process. 30: 577-590 (2022) - [c17]Ryoichi Isawa, Nobuyuki Kanaya, Yoshitada Fujiwara, Tatsuya Takehisa, Hayato Ushimaru, Dai Arisue, Daisuke Makita, Satoshi Mimura, Daisuke Inoue:
An HDL Simulator with Direct Register Access for Improving Code Coverage. AsiaJCIS 2022: 49-55 - [c16]Yong Ding, Ryoichi Isawa, Raylin Tso, Jun Lee:
Message from the Program Co-Chairs: AsiaJCIS 2022. AsiaJCIS 2022: viii - [c15]Nobuyuki Kanaya, Yu Tsuda, Yuuki Takano, Yoshitada Fujiwara, Ryoichi Isawa, Daisuke Inoue:
NEMIANA: Cross-Platform Execution Migration for Debugging. AST@ICSE 2022: 138-147 - 2021
- [c14]Reo Kawasoe, Chansu Han, Ryoichi Isawa, Takeshi Takahashi, Jun'ichi Takeuchi:
Investigating behavioral differences between IoT malware via function call sequence graphs. SAC 2021: 1674-1682 - 2020
- [j7]Muhamad Erza Aminanto, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis. IEEE Access 8: 217977-217986 (2020) - [j6]Tzu-Ling Wan, Tao Ban, Shin-Ming Cheng, Yen-Ting Lee, Bo Sun, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files. IEEE Open J. Comput. Soc. 1: 262-275 (2020) - [c13]Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Gañán, Michel van Eeten:
Disposable botnets: examining the anatomy of IoT botnet infrastructure. ARES 2020: 7:1-7:10 - [c12]Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
IoT-Malware Detection Based on Byte Sequences of Executable Files. AsiaJCIS 2020: 143-150 - [c11]Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Cross Platform IoT- Malware Family Classification based on Printable Strings. TrustCom 2020: 775-784
2010 – 2019
- 2019
- [j5]Tao Ban, Ryoichi Isawa, Shin-Ying Huang, Katsunari Yoshioka, Daisuke Inoue:
A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices. IEICE Trans. Inf. Syst. 102-D(9): 1683-1685 (2019) - [c10]Bing-Kai Hong, Jr-Wei Huang, Tao Ban, Ryoichi Isawa, Shin-Ming Cheng, Daisuke Inoue, Koji Nakao:
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices. AsiaJCIS 2019: 9-15 - [c9]Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest. ICONIP (1) 2019: 756-765 - [c8]Tianxiang He, Chansu Han, Ryoichi Isawa, Takeshi Takahashi, Shuji Kijima, Jun'ichi Takeuchi, Koji Nakao:
A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering. ICONIP (1) 2019: 766-778 - [c7]Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest. PST 2019: 1-3 - 2018
- [j4]Ryoya Furukawa, Ryoichi Isawa, Masakatu Morii, Daisuke Inoue, Koji Nakao:
FCReducer: Locating Symmetric Cryptographic Functions on the Memory. IEICE Trans. Inf. Syst. 101-D(3): 685-697 (2018) - [c6]Ryoichi Isawa, Tao Ban, Ying Tie, Katsunari Yoshioka, Daisuke Inoue:
Evaluating Disassembly-Code Based Similarity between IoT Malware Samples. AsiaJCIS 2018: 89-94 - [c5]Tao Ban, Ryoichi Isawa, Katsunari Yoshioka, Daisuke Inoue:
A Cross-Platform Study on IoT Malware. ICMU 2018: 1-2 - 2016
- [c4]Ryoichi Isawa, Masakatu Morii, Daisuke Inoue:
Comparing Malware Samples for Unpacking: A Feasibility Study. AsiaJCIS 2016: 155-160 - 2015
- [j3]Ryoichi Isawa, Daisuke Inoue, Koji Nakao:
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking. IEICE Trans. Inf. Syst. 98-D(4): 883-893 (2015) - 2014
- [j2]Ryoichi Isawa, Tao Ban, Shanqing Guo, Daisuke Inoue, Koji Nakao:
An Accurate Packer Identification Method Using Support Vector Machine. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 253-263 (2014) - 2013
- [c3]Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel. AsiaJCIS 2013: 69-76 - [c2]Ryoichi Isawa, Masaki Kamizono, Daisuke Inoue:
Generic Unpacking Method Based on Detecting Original Entry Point. ICONIP (1) 2013: 593-600 - [c1]Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Application of string kernel based support vector machine for malware packer identification. IJCNN 2013: 1-8 - 2012
- [j1]Ryoichi Isawa, Masakatu Morii:
Anonymous Authentication Scheme without Verification Table for Wireless Environments. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(12): 2488-2492 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint