*Basic Information
-Name: Jungsuk Song~
  • Address: 4-2-1, Nukui-Kitamachi, Koganei, Tokyo 184-8795, Japan
  1. -Address: 245 Daehangno, Yuseong-gu, Daejeon, 305-806, Korea
    • Tel: 042-327-6906 (hot line)
  2. -Tel: +82-42-869-0729 (hot line)
    • Fax: 042-327-6640
  3. -Fax: +82-42-869-1119
    • E-mail: song AT nict.go.jp
  4. -E-mail: song AT kisti.re.kr
    //[[(Japanese Page):http://www.net.ist.i.kyoto-u.ac.jp/ja/index.php?%C1%D7%20%C3%E6%BC%E2]]
    //#ref(song.jpg,center)
    //*Photos
    //#ref(song1.jpg,noimg,left)
    //-[[My Public Gallery:http://picasaweb.google.co.jp/ZzabuTosS]]
    
    *Current Position
    • Title: Researcher (tenure-track)
  5. -Title: Senior Researcher (tenure-track)
    • Affiliation: National Institute of Information and Communications (NICT), Tokyo, Japan
  6. -Affiliation: Korea Institute of Science and Technology Information (KISTI), Daejeon, Korea
    • Department: Network Security Incident Response Group, Information Security Research Center
    • Director: Koji Nakao
    *Research Topics and Interests
    -Spam and Malicious Web Sites Analysis
    
    -IPv6 Security Issues
    
    -Network Security
    
    -Data Mining, Machine Learning
    
    -Building Benchmark Data for IDS Evaluation (Visit for more detail [[http://www.takakura.com/kyoto_data:http://www.takakura.com/kyoto_data]])
    
    
    *Work Experence
    • Oct. 2010 - Current
  • Researcher (tenure-track), National Institute of Information and Communications Technology (NICT)
  1. -Oct. 2011 - Present
  2. Senior Researcher (tenure-track),Korea Institute of Science and Technology Information (KISTI), Korea
  3. -Oct. 2010 - Sep. 2011
  4. Researcher (tenure-track), National Institute of Information and Communications Technology (NICT), Japan
    -Apr. 2009 - Sep. 2010~
  • Expert Researcher (full-time), National Institute of Information and Communications Technology (NICT)
  1. Expert Researcher (full-time), National Institute of Information and Communications Technology (NICT), Japan
    -Apr. 2008 - Sep. 2008~
    Part-time Instructor, Information Science and Technology,
    Osaka Institute of Technology
    
    -Apr. 2008 - Mar. 2009~
    Part-time Instructor, Kyoto Prefectural University
    
    -Jun. 2006 - Dec. 2006~
    Research Assistant, Department of Networking Research~
    Academic Center for Computing and Media Studies , Kyoto University~
    
    
    
    *Education
    -Apr. 2006 - Mar. 2009~
    Ph.D. in Informatics, Kyoto University~
    Thesis: Studies on High-Performance Network Intrusion Detection System Based on Unsupervised Machine Learning~
    Advisor: Yasuo Okabe
    
    -Apr. 2005 - Mar. 2006~
    Research student~
    Department of Intelligence Science and Technology~
    Graduate School of Informatics, Kyoto University
    
    -Mar. 2003 - Feb. 2005~
    M.S. in Information, Korea Aerospace University~
    Thesis: An RTSD System against Various Attacks for Low False Positive Rate Based on Patterns of Attacker”Ēs Behaviors~
    Advisor: Yongjin Kwon
    
    -Mar. 1998 - Feb. 2003~
    B.S. in Telecommunication and Information, Korea Aerospace University
    
    *Professional Activities
    -Co-supervisor of Unitec (New Zealand) since Apr. 2011
    
    -Visiting member of the board of directors of [[the Korea Institute of Information Security and Cryptology (KIISC):http://www.kiisc.or.kr/]] since Jan. 2011
    
    -Organizing Chair of [[CDMC 2011 (The 2nd International Cybersecurity Data Mining Competition):http://www.csmining.org/cdmc2011/]]
    
    -Associate editor of IEICE Transactions on Communications since May. 2010
    
  2. -Japanese delegate of ITU-T Study Group 17 (Security) (Sep. 2009 ~ Sep. 2011).
    • Member of IPv6 Technical Verification Consortium since Sep. 2010
  3. -Member of IPv6 Technical Verification Consortium since (Sep. 2010 ~ Sep. 2011)
    -Session chair (Malware) and PC member of [[6th Workshop on Secure Network Protocols (NPSec 2010):http://webgaki.inf.shizuoka.ac.jp/~npsec2010/]]
    
    -PC member of [[SAINT Workshop - the First Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2010):http://infonet.cse.kyutech.ac.jp/conf/saint10/workshop-CFPaper/ws-cfp-4.html]]
    
    
    *Awards and Scholarships
    -Apr. 2008 - Mar. 2009~
    Honors Scholarship, Japan Student Services Organization (JASSO)
    -Second Prize at 2003 Goyang-city Software Contest, Korea
    
    
    *Technical Skills
    -Programming languages:  C, C++, Perl, SQL, MATLAB, etc. 
    *Languages
    -English
    -Japanese
    -Korean(native speaker)
    
    
    *Memberships
    -IEEE, IEICE
    
    
    *Publications
    **Book Chapters
    +Jungsuk Song, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon, ''Correlation Analysis Between Honeypot Data and IDS Alerts Using One-class SVM,'' Intrusion Detection Systems, [[InTech Open Access Publisher:http://www.intechweb.org/]], pp.173-192, Mar. 2011.(pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/Intrusion_Detection_Systems.pdf]])~
    ~
    **Referred Journal Papers
    +Junji NAKAZATO, Jungsuk SONG, Masashi ETO, Daisuke INOUE, and Koji NAKAO,
    ''A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads'', IEICE Transactions on Information and Systems (Special Section on Information and Communication System Security), Vol.E94-D,No.11,pp.-,Nov. 2011.(to appear)~
    ~
    +Hyung Chan KIM, Tatsunori ORII, Katsunari YOSHIOKA, Daisuke INOUE,
    Jungsuk SONG, Masashi ETO, Junji SHIKATA, Tsutomu MATSUMOTO, and Koji NAKAO,
    ''An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation'', IEICE Transactions on Information and Systems, Vol.E94-D,No.9,pp.-,Sep. 2011.(pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/IEICE2011-ED%20%28An%20Empirical%20Evaluation%20of%20an%20Unpacking%20Method%20Implemented%20with%20Dynamic%20Binary%20Instrumentation%29.pdf]])~
    ~
    +Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim and Koji Nakao,
    ''O-means : An Optimized Clustering Method for Analyzing Spam Based Attacks'',
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Cryptography and Information Security), Vol.E94-A, No.1, pp.245-254, Jan. 2011.(pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/IEICE2011-EA%28O-means%20An%20Optimized%20Clustering%20Method%20for%20Analyzing%20Spam%20Based%20Attacks%29.pdf]])~
    ~
    +Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao,
    ''A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data'',
    IEICE Transactions on Information and Systems, Vol.E93-D,No.9,pp.2544-2554, Sep. 2010.(pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/IEICE2010%28A%20Comparative%20Study%20of%20Unsupervised%20Anomaly%20Detection%20Techniques%20Using%20Honeypot%20Data%29.pdf]])~
    ~
    +Kenji Ohira, Jungsuk Song, Hiroki Takakura and Yasuo Okabe, 
    ''Construction and Operation of a Generic Honeypot System to Detect Attack Activities on Various Applications'',
    [[IEICE Transactions on Information and Systems, Vol.J93-D, No.7, pp.1125-1134:http://search.ieice.org/bin/index.php?category=D&lang=J&curr=1]], Jul. 2010. (In Japanese, pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/IEICE2010-JD%28Construction%20and%20Operation%20of%20a%20Generic%20Honeypot%20System%20to%20Detect%20Attack%20Activities%20on%20Various%20Applications%29.pdf]])~
    ~
    +Jungsuk Song, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon, 
    ''Unsupervised Anomaly Detection Based on Clustering and Multiple One-class SVM'',
    [[IEICE Transactions on Communications, Vol.E92-B, No.6, pp.1981-1990:http://search.ieice.org/bin/summary.php?id=e92-b_6_1981&category=B&year=2009&lang=E&abst=]], Jun. 2009. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/IEICE2009%28Unsupervised%20Anomaly%20Detection%20Based%20on%20Clustering%20and%20Multiple%20One-class%20SVM%29.pdf]])~
    ~
    +Jungsuk Song, Kenji Ohira, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon, 
    ''A Clustering Method for Improving Performance of Anomaly-based Intrusion Detection System'',
    [[IEICE Transactions on Information and Systems (Special Section on Information and Communication System Security), Vol.E91-D, No.5, pp.1282-1291:http://search.ieice.org/bin/summary.php?id=e91-d_5_1282&category=D&year=2008&lang=E&abst=&auth=1]], May. 2008. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/IEICE2008%28A%20Clustering%20Method%20for%20Improving%20Performance%20of%20Anomaly-based%20Intrusion%20Detection%20System%29.pdf]])~
    ~
    +J. Song and Y. Kwon, 
    ''An RTSD System against Various Attacks for Low False Positive Rate Based on Patterns of Attacker's Behaviors'',
    [[IEICE Transactions on Information and Systems, Vol. E89-D, No. 10, pp. 2637-2643:http://search.ieice.org/bin/summary.php?id=e89-d_10_2637&category=D&year=2006&lang=E&abst=&auth=1]], Oct. 2006. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/IEICE2006%28An%20RTSD%20System%20against%20Various%20Attacks%20for%20Low%20False%20Positive%20Rate%20Based%20on%20Patterns%20of%20Attacker%27s%20Behaviors%29.pdf]])~
    ~
    +J. Song and Y. Kwon, 
    ''A Real Time Scan Detection System against Attacks based on Port Scanning Techniques'',
    Journal of KISS(Korea Information Science Society):Information Networking, Vol. 31, No. 2, pp. 171-178, Apr. 2004.(In Korean)
    
    
    
    
    
    ** Referred Symposium, Conference, and Workshop Papers 
    +Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao,
    ''Correlation Analysis between Spamming Botnets and Malware Infected Hosts'',
    [[SAINT 2011 Workshop on Network Technologies for Security, Administration and Protection (NETSAP):http://snowman.nagaokaut.ac.jp/saint/workshop-CFPaper/ws-4.html]], IEEE CS Press, pp.372--375, Munich, Germany, 18-22 July 2011.(pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/SAINT%202011%20%28Correlation%20Analysis%20between%20Spamming%20Botnets%20and%20Malware%20Infected%20Hosts%29.pdf]])~
    ~
    +Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue and Koji Nakao,
    ''Statistical Analysis of Honeypot Data and Building of Kyoto 2006+ Dataset for NIDS Evaluation'',
    [[Workshop on development of large scale security-related data collection and analysis initiatives(BADGERS 2011):http://iseclab.org/badgers2011/]], ACM, pp.29-36, Salzburg, Austria, 10-13 April 2011.(pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/BADGERS2011%28Statistical%20Analysis%20of%20Honeypot%20Data%20and%20Building%20of%20Kyoto%202006%20Dataset%20for%20NIDS%20Evaluation%29.pdf]])~
    ~
    +Masashi Eto, Daisuke Inoue, Jungsuk Song, Junji Nakazato, Kazuhiro Ohtaka, Koji Nakao,
    ''nicter : A Large-Scale Network Incident Analysis System'',
    [[Workshop on development of large scale security-related data collection and analysis initiatives(BADGERS 2011):http://iseclab.org/badgers2011/]], ACM, pp.37-45, Salzburg, Austria, 10-13 April 2011.(pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/BADGERS2011%28nicter%20-%20A%20Large-Scale%20Network%20Incident%20Analysis%20System%29.pdf]])~
    ~
    +Jungsuk Song, Masashi Eto, Hyung Chan Kim, Daisuke Inoue and Koji Nakao,
    ''A Heuristic-based Feature Selection Method for Clustering Spam Emails'',
    [[17th International Conference on Neural Information Processing(ICONIP 2010):http://cs.anu.edu.au/iconip2010/]], LNCS 6443, Part I, pp.290-297, Sydney, Australia, 22-25 November 2010. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/ICONIP2010%20%28A%20Heuristic-Based%20Feature%20Selection%20Method%20for%20Clustering%20Spam%20Emails%29.pdf]])~
    ~
    +Junji Nakazato, Jungsuk Song, Masashi Eto, Daisuke Inoue and Koji Nakao,
    ''A Malware Classification Method Based on Threaded Function Call Traces'',
    [[The 5th Joint Workshop on Information Security (JWIS 2010):http://www2.nict.go.jp/y/y211/jwis2010/]], pp.52-66, Guangzhou, China, 5-6 August 2010. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/JWIS2010%28Nakazato%29.pdf]])~
    ~
    +Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song and Koji Nakao,
    ''On the Applicability of a DBI-Based Generic Unpacking Implementation'',
    [[The 5th Joint Workshop on Information Security (JWIS 2010):http://www2.nict.go.jp/y/y211/jwis2010/]], pp.331-345, Guangzhou, China, 5-6 August 2010. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/JWIS2010%28KIM%29.pdf]])~
    ~
    +Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim and Koji Nakao,
    ''An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers'',
    [[SAINT 2010 Workshop on Network Technologies for Security, Administration and Protection (NETSAP):http://infonet.cse.kyutech.ac.jp/conf/saint10/workshop-CFPaper/ws-cfp-4.html]], IEEE CS Press, pp. 257-260, Seoul, Korea, 19-23 July 2010. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/SAINT2010%28An%20Empirical%20Study%20of%20Spam-Analyzing%20Spam%20Sending%20Systems%20and%20Malicious%20Web%20Servers%29.pdf]])~
    ~
    +Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song and Koji Nakao,
    ''How to Locate a Target Binary Process and Its Derivatives in System Emulator'',
    [[SAINT 2010 Workshop on Convergence Security and Privacy (CSnP):http://infonet.cse.kyutech.ac.jp/conf/saint10/workshop-CFPaper/ws-cfp-9.html]], IEEE CS Press, pp. 273-276, Seoul, Korea, 19-23 July 2010. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/SAINT2010%28How%20to%20Locate%20a%20Target%20Binary%20Process%20and%20Its%20Derivatives%20in%20System%20Emulator%29.pdf]])~
    ~
    +Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song and Koji Nakao,
    ''Working Towards a Primary Binary Analysis System'',
    [[The 2010 International Conference on Security and Management (SAM2010):http://www.world-academy-of-science.org/worldcomp10/ws/conferences/sam10]], pp. 459-465, Las Vegas, USA, 12-15 July 2010. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/SAM2010%28Working%20Towards%20a%20Primary%20Binary%20Analysis%20System%29.pdf]])~
    ~
    +Jungsuk Song, Daisuke Inoue, Masashi Eto, Mio Suzuki, Satoshi Hayashi and Koji Nakao,
    ''A Methodology for Analyzing Overall Flow of Spam-based Attacks'',
    [[16th International Conference on Neural Information Processing(ICONIP 2009):http://www.iconip09.org/]], LNCS 5864, pp. 556-564, Bangkok, Thailand, 1-5 December 2009. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/ICONIP2009%28A%20Methodology%20for%20Analyzing%20Overall%20Flow%20of%20Spam-Based%20Attacks%29.pdf]])~
    ~
    +Jungsuk Song, Hiroki Takakura and Yongjin Kwon,
    ''A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts'',
    [[The 2008 International Symposium on Applications and the Internet(SAINT2008):http://www.icta.ufl.edu/saint08/]], IEEE CS Press, pp. 51-56, Turku, FINLAND, 28 July - 1 Aug. 2008. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/SAINT%282008%29A%20Generalized%20Feature%20Extraction%20Scheme%20to%20Detect%200-Day%20Attacks%20via%20IDS%20Alerts.pdf]])~
    ~
    +Jungsuk Song, Hiroki Takakura and Yasuo Okabe,
    ''Cooperation of Intelligent Honeypots to Detect Unknown Malicious Codes'',
    WOMBAT Workshop on Information Security Threat Data Collection and Sharing (WISTDCS 2008), IEEE CS Press, pp. 31-39, Amsterdam, Netherlands, 21-22 April 2008. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/Wombat2008%28Cooperation%20of%20Intelligent%20Honeypots%20to%20Detect%20Unknown%20Malicious%20Codes%29.pdf]])~
    ~
    +Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira and Yongjin Kwon,
    ''A Comprehensive Approach to Detect Unknown Attacks via Intrusion Detection Alerts'',
    [[The twelfth Asian Computing Science Conference(ASIAN2007) Focusing on Computer and Network Security:http://www.qatar.cmu.edu/asian07/]], LNCS 4846, 
    pp. 247-253, Doha, Qatar, 9-11 December 2007. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/ASIAN2007%28A%20Comprehensive%20Approach%20to%20Detect%20Unknown%20Attacks%20Via%20Intrusion%20Detection%20Alerts%29.pdf]])~
    ~
    +Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon,
    ''A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-based Intrusion Detection System'',
    [[Proc. 12th International Conference on Database Systems for Advanced Applications (DASFAA2007),(Lecture Notes in Computer Science 4443):http://www.dasfaa07.ait.ac.th/index.htm]], pp. 140-151, Bangkok, Thailand, 9-12 April 2007. (pdf is available [[here:http://dl.dropbox.com/u/5408851/Published%20papers/DASFAA2007%28A%20Robust%20Feature%20Normalization%20Scheme%20and%20an%20Optimized%20Clustering%20Method%20for%20Anomaly-Based%20Intrusion%20Detection%20System%29.pdf]])~
    ~
    +J. Song and Y. Kwon,
    ''A Visual RTSD System against Various Attacks for Low False Positive Rate Based on Patterns of Attacker's Behaviors'',
    Pre-Proceedings of the 5th International Workshop on Information Security Applications (WISA 2004), Vol. 5, pp. 695-704, Jeju-island, Korea, 23-25 August 2004.
    
    
    **Technical Reports and Oral Presentations
    +Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao, ''A Preliminary Investigation for Analyzing Network Incidents Caused by Spam'',
    The Symposium on Cryptography and Information Security (SCIS2010), Takamatsu, Japan, Jan. 19-22, 2010.~
    ~
    +Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao,
    ''An Extended QEMU Emulator for Primary Binary Analysis'',
    The Symposium on Cryptography and Information Security (SCIS2010), Takamatsu, Japan, Jan. 19-22, 2010.~
    ~
    +Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao,
    ''An Implementation of a Generic Unpacking Method on Bochs Emulator'',
    [[Proc. of the Computer Security Symposium 2009 (CSS2009):http://www.iwsec.org/css/2009/index.html]], vol. 2, pp. 997-1002, 26-28 October 2009.~
    ~
    +Hiroki Takakura, Jungsuk Song, Takayuki Ito,
    ''How 77DDoS attack observed in the Japanese Internet'',
    [[International Workshop on DDoS Attacks and Defenses:http://caislab.kaist.ac.kr/77ddos/index.html]], KAIST-ICC, Daejeon, Korea, September 29-30, 2009.~
    ~
    +Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
    ''A Network Intrusion Detection System Based on Clustering and Multiple One-class SVM'',
    12th Core University Program Seminar on Next Generation Internet Technologies, Beppu, Japan, Feb. 2009.~
    ~
    +Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
    ''Performance Evaluation of Unsupervised Machine Learning Techniques for Intrusion Detection'',
    11th Core University Program Seminar on Next Generation Internet Technologies, Busan, Korea, Aug. 2008.~
    ~
    +Hiroki Takakura and Jungsuk Song, ''Situation of Zero-Day Attacks on the Internet and their Detection Method'',[[SIG-FPAI-A801-05:http://www-ikn.ist.hokudai.ac.jp/sigfpai/next.html]], July 4, 2008.(in Japanese).~
    ~
    +Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
    ''Data Mining and Visualization of IDS Alerts to Extract Malicious Activities'',
    9th Core University Program Seminar on Next Generation Internet Technologies,
    Oct. 2007.~
    ~
    +Jungsuk Song, Hiroki Takakura, Yasuo Okabe, 
    ''A Proposal of New Benchmark Data to Evaluate Mining Algorithms for Intrusion Detection'', [[23th APAN Meeting in Manila:http://www.apan.net/meetings/manila2007/]], Jan. 2007.~
    ~
    +Hayato Ohba, Jungsuk Song, Hiroki Takakura and Yasuo Okabe,
    ''Analysis and Visualization of Network IDS Data Using Machine Learning'',
    [[IEICE Technical Report:http://www.ieice.org/ken/program/index.php?layout=&tgs_regid=1545c1b774b71e42087ebaa183b62577550e92ac1626328f20ef04a7777f6cf7&cmd=show_form&form_code=AAqi]], vol. 106, no. 465, IA2006-36, pp. 31-36, Jan. 2007.(in Japanese)~
    ~
    +Kenji Ohira, Jungsuk Song, Hiroki Takakura and Yasuo Okabe,
    ''A Construction Method of a Honeypot System to Safely Collect Unknown alicious Codes'',
    [[IEICE Technical Report:http://www.ieice.org/ken/program/index.php?layout=&tgs_regid=83500c5ef710462682c5a5a75f1cfbc30f915a70abaa549a430f17f19aab1c17&cmd=show_form&form_code=VAkp]], vol. 106, no.62, IA2006-1, pp. 1-6, May 2006.(in Japanese)~
    ~
    +J. Song, H. Takakura, Y. Okabe, Y. Kwon, ''A Study on Accuracy Improvement of Intrusion Detection System Based on Data Mining'', In Proceedings of KISS (Korea Information Science Society) Korea Computer Congress 2005 , Vol.32, No.1, pp.208-210, July 6-8, 2005.
    
    
    *Hobbies
    -Watching Computer Games, Especially [[Starcraft:http://en.wikipedia.org/wiki/StarCraft]]
    -Playing and Watching Soccer
    -Watching Baseball
    
    
    *Dreams
    Song Microsystems CEO
    
    
    *Links
    -[[Okabe Lab.:http://www.net.ist.i.kyoto-u.ac.jp/ja/index.php?%B2%AC%C9%F4%B8%A6%B5%E6%BC%BC]]
    -[[IEICE Review Process:https://review.ieice.org/index_j.aspx]]
    -[[Journal Search SCI:http://scientific.thomsonreuters.com/cgi-bin/jrnlst/jloptions.cgi?PC=K]]
    -[[Journal Search SCIE:http://scientific.thomsonreuters.com/cgi-bin/jrnlst/jloptions.cgi?PC=D]]
    -[[ACM Transactions on Information and System Security(SCIE):http://tissec.acm.org/]]
    -[[ACM Transactions on Information Systems(SCI):http://tois.acm.org/]]
    -[[The IEEE/ACM Transactions on Networking(SCI):http://www.ton.cs.umass.edu/]]
    -[[IEEE Security & Privacy(Magazine, SCIE):http://www.computer.org/portal/site/security/]]
    -[[IEEE Network(Magazine, SCI):http://www.comsoc.org/livepubs/ni/]]
    -[[IEEE Transactions on Dependable and Secure Computing(SCIE):http://www.computer.org/portal/web/tdsc]]
    -[[IEEE Transactions on Computers(SCI):http://www.computer.org/portal/web/tc]]
    -[[IEEE Transactions on Visualization and Computer Graphics(SCI):http://www.computer.org/portal/web/tvcg]]
    -[[ELSEVIER Computers & Security(SCIE):http://www.elsevier.com/wps/find/journaldescription.cws_home/405877/description#description]]
    -[[ELSEVIER Computer Networks(SCIE):http://www.elsevier.com/wps/find/journaldescription.cws_home/505606/description#description]]
    -[[ELSEVIER Computer Communications(SCIE):http://www.elsevier.com/wps/find/journaldescription.cws_home/525440/description#description]]
    -[[ELSEVIER Information Sciences(SCI):http://www.elsevier.com/wps/find/journaldescription.authors/505730/description]]
    -[[IEEE Computer Society's Technical Committee on Security and Privacy:http://www.ieee-security.org/]]
    -[[Computer Security Foundations Symposium:http://www.ieee-security.org/CSFWweb/]]
    -[[Journal of Computer Security:http://www.mitre.org/public/jcs/]]
    -[[ACM/SIGCOMM:http://www.sigcomm.org/]]
    -[[RAID2008:http://www.ll.mit.edu/RAID2008/index.html]]
    -[[USENIX:http://www.usenix.org/]]
    -[[DASFAA2007:http://www.dasfaa07.ait.ac.th/index.htm]]
    -[[ASIAN2007:http://www.qatar.cmu.edu/asian07/]]
    -[[ICONIP2009:http://www.iconip09.org/]]
    -[[SAINT:http://www.saintconference.org/]]
    -[[NPSec2010:http://webgaki.inf.shizuoka.ac.jp/~npsec2010/]]
    -[[NETSAP2010:http://infonet.cse.kyutech.ac.jp/conf/saint10/workshop-CFPaper/ws-cfp-4.html]]