Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware
Crossref DOI link: https://doi.org/10.1007/s11416-023-00478-x
Published Online: 2023-05-02
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Yonamine, Shun http://orcid.org/0000-0001-5428-6831
Taenaka, Yuzo
Kadobayashi, Youki
Miyamoto, Daisuke
Text and Data Mining valid from 2023-05-02
Version of Record valid from 2023-05-02
Article History
Received: 16 May 2022
Accepted: 7 April 2023
First Online: 2 May 2023