Login / Signup
Masaki Inokuchi
Publication Activity (10 Years)
Years Active: 2012-2022
Publications (10 Years): 10
Top Topics
Security Vulnerabilities
Attack Graphs
Design Procedure
Knowledge Base
Top Venues
CoRR
CSF
AsiaCCS
ICNC
</>
Publications
</>
Orly Stan
,
Ron Bitton
,
Michal Ezrets
,
Moran Dadon
,
Masaki Inokuchi
,
Yoshinobu Ohta
,
Tomohiko Yagyu
,
Yuval Elovici
,
Asaf Shabtai
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
IEEE Trans. Dependable Secur. Comput.
19 (3) (2022)
Hodaya Binyamini
,
Ron Bitton
,
Masaki Inokuchi
,
Tomohiko Yagyu
,
Yuval Elovici
,
Asaf Shabtai
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions.
KDD
(2021)
Orly Stan
,
Ron Bitton
,
Michal Ezrets
,
Moran Dadon
,
Masaki Inokuchi
,
Yoshinobu Ohta
,
Tomohiko Yagyu
,
Yuval Elovici
,
Asaf Shabtai
Heuristic Approach for Countermeasure Selection Using Attack Graphs.
CSF
(2021)
Noam Moscovich
,
Ron Bitton
,
Yakov Mallah
,
Masaki Inokuchi
,
Tomohiko Yagyu
,
Meir Kalech
,
Yuval Elovici
,
Asaf Shabtai
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities.
CoRR
(2020)
Hodaya Binyamini
,
Ron Bitton
,
Masaki Inokuchi
,
Tomohiko Yagyu
,
Yuval Elovici
,
Asaf Shabtai
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions.
CoRR
(2020)
Orly Stan
,
Ron Bitton
,
Michal Ezrets
,
Moran Dadon
,
Masaki Inokuchi
,
Yoshinobu Ohta
,
Yoshiyuki Yamada
,
Tomohiko Yagyu
,
Yuval Elovici
,
Asaf Shabtai
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
CoRR
(2019)
Masaki Inokuchi
,
Yoshinobu Ohta
,
Shunichi Kinoshita
,
Tomohiko Yagyu
,
Orly Stan
,
Ron Bitton
,
Yuval Elovici
,
Asaf Shabtai
Design Procedure of Knowledge Base for Practical Attack Graph Generation.
AsiaCCS
(2019)
Orly Stan
,
Ron Bitton
,
Michal Ezrets
,
Moran Dadon
,
Masaki Inokuchi
,
Yoshinobu Ohta
,
Tomohiko Yagyu
,
Yuval Elovici
,
Asaf Shabtai
Heuristic Approach Towards Countermeasure Selection using Attack Graphs.
CoRR
(2019)
Ron Bitton
,
Tomer Gluck
,
Orly Stan
,
Masaki Inokuchi
,
Yoshinobu Ohta
,
Yoshiyuki Yamada
,
Tomohiko Yagyu
,
Yuval Elovici
,
Asaf Shabtai
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation.
ESORICS (1)
(2018)
Masaki Inokuchi
,
Hirofumi Ueda
,
Gen Motoyoshi
Throughput improvement by disruption-suppressed channel switching in multi-channel ad-hoc networks.
ICNC
(2017)
Masaki Inokuchi
,
Takamasa Higuchi
,
Hirozumi Yamaguchi
,
Teruo Higashino
Autonomous Recognition of Emergency Site by Wearable Sensors.
GreenCom
(2012)