List of completed thesis titles
List of graduates and thesis titles
2022
- Bozhou Lin, Proposal of ransomware defense system based on decoy file and behavior analysis
- Kunihito Adachi, Developing Security Checklists to Raise Awareness of Legacy Industrial Control System Operators
- Keisuke Sakai, An automatic detection system for fake shopping sites from newly registered domains using fastText and LightGBM
2021
- Yasutaka Kimura, Development of an Intelligence Extraction System for the Dark Web using AI
- Keisuke Shiraishi, Research on Resilient Architecture for Autonomous IoT Systems
- Huang Mingyang, Relationship between Occupation and Phishing Success Rate
- Kazuki Kato, Development of a Web Crawling System for Detecting Fake Sites
2020
- Moritoshi Aoyagi, Feature extraction method for binary code similarity comparison using neural machine translation model
- Yusuke Kobayashi, Proposal of security policy analysis method for TOMOYO Linux
- Kosuke Takahashi, Client delegation method for cheat countermeasures on servers using Intel SGX
- Takayuki Chiwaki, Countermeasure method using Rust against attacks using memory corruption vulnerability
- Ima Masubuchi, Proposal of Function Embedding Method for Detection of Similar Binary Code
2019
- Hitoshi Inoue, HTTP request investigation and suggestion of how to identify fake User-Agent values
- Masashi Kadoguchi, Intelligence Extraction on the Dark Web Using Machine Learning
- Atsushi Kanda, Identification of encrypted communication using randomness
- Hanae Kobayashi, Development of Automatic Classification Expert System for Illegal Harmful Information Spreading on the Dark Web
2018
- Hiroki Inoue, Access Control Policy Protection Method Using TrustZone Technology
- Yuka Ogura, Visualization method of secure OS / intrusion prevention effect using Processing language
- Naoki Kurihara, Fake Site Detection Using Machine Learning
- Masaki Sugio, Verification of Effectiveness of Deception Technology Using Decoy System
- Shuhei Segawa, Initial study of vulnerability inspection tool for short-range wireless communication
- Yasuhiro Mitsuishi, Current Status and Issues of Maritime Cyber Security
2017
- Makoto Ashizu, Study on Evaluation Method of Memory Forensics Tool
- Takuya Koike, Linkage method of malignant activity based on process information and file access information
- Tadashi Shimomura, Malware detection method by machine learning focusing on the functional type of malignant activity
- Takeyo Tamura, Malware detection method based on similarity of functions in PE using CNN
- Shota Hayashi, Threat Intelligence Extraction Method Using Machine Learning
- Akemi Mizuta, How to Use and Manage Confidential Information in Connected Industries
2016
- Nobutaka Suetsugu, Behavior consideration for each malware function classification based on the frequency of API call usage
- Ikuo Tanaka, Functional Evaluation of Memory Forensic Tools for Malware Detection
2015
- Yudai Tomaru, Proposal of method with process activity link for intrusion prevention