Theses and Dissertations

Theses and Dissertations

2025
  • Kotono Karasawa, A Self-Improving Crawling System for Automated Discovery of Compromised WebsitesBachelor's Dissertation
  • Ryo Niwase, Benign Activity Filter: Development of a Benign Activity Extraction Method for Streamlining SIEM Log AnalysisBachelor's Dissertation
  • Kouki Hasui, Development of an Automatic Pseudo-C2 Server Generation System for IoT MalwareBachelor's Dissertation
  • Hiroshi Matsubara, Foundational Study of Authorship Attribution for Actor Analysis in Threat Intelligence Using Japanese Web PostsBachelor's Dissertation
2023
  • Shuhei Ippa, Survey and Analysis of Social Bots Activities on Social MediaMaster's DissertationWorking Professional
  • Naoyuki Shimizu, Vulnerability Management Chaining: Improving the Efficiency of Vulnerability ManagementMaster's DissertationWorking Professional
2022
  • Baizhou Lin, Proposal of ransomware defense system based on decoy file and behavior analysisMaster's Dissertation
  • Kunihito Adachi, Developing Security Checklists to Raise Awareness of Legacy Industrial Control System OperatorsMaster's DissertationWorking Professional
  • Keisuke Sakai, An automatic detection system for fake shopping sites from newly registered domains using fastText and LightGBMMaster's DissertationWorking Professional
2021
  • Yasutaka Kimura, Development of an Intelligence Extraction System for the Dark Web using AIMaster's DissertationWorking Professional
  • Keisuke Shiraishi, Research on Resilient Architecture for Autonomous IoT SystemsMaster's DissertationWorking Professional
  • Mingyang Huang, Relationship between Occupation and Phishing Success RateMaster's Dissertation
  • Kazuki Kato, Development of a Web Crawling System for Detecting Fake SitesMaster's DissertationWorking Professional
2020
  • Moritoshi Aoyagi, Feature extraction method for binary code similarity comparison using neural machine translation modelMaster's DissertationWorking Professional
  • Yusuke Kobayashi, Proposal of security policy analysis method for TOMOYO LinuxMaster's Dissertation
  • Kosuke Takahashi, Client delegation method for cheat countermeasures on servers using Intel SGXMaster's Dissertation
  • Takayuki Chiwaki, Countermeasure method using Rust against attacks using memory corruption vulnerabilityMaster's Dissertation
  • Yuma Masubuchi, Proposal of Function Embedding Method for Detection of Similar Binary CodeMaster's DissertationWorking Professional
2019
  • Hitoshi Inoue, HTTP request investigation and suggestion of how to identify fake User-Agent valuesMaster's DissertationWorking Professional
  • Masashi Kadoguchi, Intelligence Extraction on the Dark Web Using Machine LearningMaster's Dissertation
  • Atsushi Kanda, Identification of encrypted communication using randomnessMaster's DissertationWorking Professional
  • Hanae Kobayashi, Development of Automatic Classification Expert System for Illegal Harmful Information Spreading on the Dark WebMaster's DissertationWorking Professional
2018
  • Hiroki Inoue, Access Control Policy Protection Method Using TrustZone TechnologyMaster's DissertationWorking Professional
  • Yuka Ogura, Visualization method of secure OS / intrusion prevention effect using Processing languageMaster's Dissertation
  • Naoki Kurihara, Fake Site Detection Using Machine LearningMaster's DissertationWorking Professional
  • Masaki Sugiu, Verification of Effectiveness of Deception Technology Using Decoy SystemMaster's DissertationWorking Professional
  • Shuhei Segawa, Initial study of vulnerability inspection tool for short-range wireless communicationMaster's Dissertation
  • Yasuhiro Mitsuishi, Current Status and Issues of Maritime Cyber SecurityMaster's DissertationWorking Professional
2017
  • Makoto Ashitsu, Study on Evaluation Method of Memory Forensics ToolMaster's DissertationWorking Professional
  • Takuya Koike, Linkage method of malignant activity based on process information and file access informationMaster's DissertationWorking Professional
  • Tadashi Shimomura, Malware detection method by machine learning focusing on the functional type of malignant activityMaster's DissertationWorking Professional
  • Moriyo Tamura, Malware detection method based on similarity of functions in PE using CNNMaster's DissertationWorking Professional
  • Shota Hayashi, Threat Intelligence Extraction Method Using Machine LearningMaster's DissertationWorking Professional
  • Akemi Mizuta, How to Use and Manage Confidential Information in Connected IndustriesMaster's DissertationWorking Professional
2016
  • Nobutaka Suetsugu, Behavior consideration for each malware function classification based on the frequency of API call usageMaster's DissertationWorking Professional
  • Ikuo Tanaka, Functional Evaluation of Memory Forensic Tools for Malware DetectionMaster's DissertationWorking Professional
2015
  • Yudai Tomaru, Proposal of method with process activity link for intrusion preventionMaster's DissertationWorking Professional