Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tatsuya Mori
@article{DBLP:journals/access/KawaokaCWAM24, author = {Ryo Kawaoka and Daiki Chiba and Takuya Watanabe and Mitsuaki Akiyama and Tatsuya Mori}, title = {Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games}, journal = {{IEEE} Access}, volume = {12}, pages = {19128--19144}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3360108}, doi = {10.1109/ACCESS.2024.3360108}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KawaokaCWAM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/HasegawaAYIM23, author = {Ayako Akiyama Hasegawa and Mitsuaki Akiyama and Naomi Yamashita and Daisuke Inoue and Tatsuya Mori}, title = {Analysis of Non-Experts' Security- and Privacy-Related Questions on a Q{\&}A Site}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {106}, number = {9}, pages = {1380--1396}, year = {2023}, url = {https://doi.org/10.1587/transinf.2022icp0006}, doi = {10.1587/TRANSINF.2022ICP0006}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/HasegawaAYIM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/NomotoWSAM23, author = {Kazuki Nomoto and Takuya Watanabe and Eitaro Shioji and Mitsuaki Akiyama and Tatsuya Mori}, title = {Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers}, journal = {J. Inf. Process.}, volume = {31}, pages = {620--642}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.620}, doi = {10.2197/IPSJJIP.31.620}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/NomotoWSAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/AsomuraIM23, author = {Ichiro Asomura and Ryo Iijima and Tatsuya Mori}, title = {Automating the Detection of Fraudulent Activities in Online Banking Service}, journal = {J. Inf. Process.}, volume = {31}, pages = {643--653}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.643}, doi = {10.2197/IPSJJIP.31.643}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/AsomuraIM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/MoriNTKM23, author = {Keika Mori and Tatsuya Nagai and Yuta Takata and Masaki Kamizono and Tatsuya Mori}, title = {Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision}, journal = {J. Inf. Process.}, volume = {31}, pages = {829--841}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.829}, doi = {10.2197/IPSJJIP.31.829}, timestamp = {Sun, 18 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/MoriNTKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurousec/SuzukiINOM23, author = {Mei Suzuki and Ryo Iijima and Kazuki Nomoto and Tetsushi Ohki and Tatsuya Mori}, title = {PinchKey: {A} Natural and User-Friendly Approach to {VR} User Authentication}, booktitle = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023}, pages = {192--204}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617072.3617122}, doi = {10.1145/3617072.3617122}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurousec/SuzukiINOM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/MoriO23, author = {Tatsuya Mori and Tomoaki Ohtsuki}, title = {{HAPS} Trajectory Optimization Based on Throughput Heat Map}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {7291--7296}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437324}, doi = {10.1109/GLOBECOM54140.2023.10437324}, timestamp = {Sun, 10 Mar 2024 10:39:12 +0100}, biburl = {https://dblp.org/rec/conf/globecom/MoriO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlc/MoriFHMAK23, author = {Tatsuya Mori and Daisuke Fujita and Tomokazu Hayashi and Takashi Mizobe and Hideo Aihara and Syoji Kobashi}, title = {Radiomics Based Prediction of Symptomatic Carotid Plaque in {MR} Images}, booktitle = {International Conference on Machine Learning and Cybernetics, {ICMLC} 2023, Adelaide, Australia, July 9-11, 2023}, pages = {315--320}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICMLC58545.2023.10327957}, doi = {10.1109/ICMLC58545.2023.10327957}, timestamp = {Mon, 11 Dec 2023 15:49:01 +0100}, biburl = {https://dblp.org/rec/conf/icmlc/MoriFHMAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Nomoto0SAM23, author = {Kazuki Nomoto and Takuya Watanabe and Eitaro Shioji and Mitsuaki Akiyama and Tatsuya Mori}, title = {Browser Permission Mechanisms Demystified}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/browser-permission-mechanisms-demystified/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Nomoto0SAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/YajimaCYM23, author = {Masanori Yajima and Daiki Chiba and Yoshiro Yoneya and Tatsuya Mori}, editor = {Anna Brunstr{\"{o}}m and Marcel Flores and Marco Fiore}, title = {A First Look at Brand Indicators for Message Identification {(BIMI)}}, booktitle = {Passive and Active Measurement - 24th International Conference, {PAM} 2023, Virtual Event, March 21-23, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13882}, pages = {479--495}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-28486-1\_20}, doi = {10.1007/978-3-031-28486-1\_20}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/YajimaCYM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/MoriTIKM23, author = {Keika Mori and Yuta Takata and Daiki Ito and Masaki Kamizono and Tatsuya Mori}, editor = {Bart P. Knijnenburg and Panos Papadimitratos}, title = {Impact Analysis of Organizational Structure of Group Companies on Privacy Policies}, booktitle = {Proceedings of the 22nd Workshop on Privacy in the Electronic Society, {WPES} 2023, Copenhagen, Denmark, 26 November 2023}, pages = {159--165}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603216.3624954}, doi = {10.1145/3603216.3624954}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/MoriTIKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XieYM22, author = {Tianying Xie and Hayato Yamana and Tatsuya Mori}, title = {{CHE:} Channel-Wise Homomorphic Encryption for Ciphertext Inference in Convolutional Neural Network}, journal = {{IEEE} Access}, volume = {10}, pages = {107446--107458}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3210134}, doi = {10.1109/ACCESS.2022.3210134}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XieYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/HasegawaYAM22, author = {Ayako Akiyama Hasegawa and Naomi Yamashita and Mitsuaki Akiyama and Tatsuya Mori}, title = {Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails}, journal = {J. Inf. Process.}, volume = {30}, pages = {841--858}, year = {2022}, url = {https://doi.org/10.2197/ipsjjip.30.841}, doi = {10.2197/IPSJJIP.30.841}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/HasegawaYAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/NomotoAEIM22, author = {Kazuki Nomoto and Mitsuaki Akiyama and Masashi Eto and Atsuo Inomata and Tatsuya Mori}, title = {On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {140--161}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0103}, doi = {10.56553/POPETS-2022-0103}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/NomotoAEIM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biotc/SakoMM22, author = {Kentaro Sako and Shin'ichiro Matsuo and Tatsuya Mori}, title = {Distributed Random Number Generation Method on Smart Contracts}, booktitle = {4th Blockchain and Internet of Things Conference, {BIOTC} 2022, Tokyo, Japan, July 8-10, 2022}, pages = {1--10}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3559795.3559796}, doi = {10.1145/3559795.3559796}, timestamp = {Wed, 15 Nov 2023 16:53:04 +0100}, biburl = {https://dblp.org/rec/conf/biotc/SakoMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/IijimaTM22, author = {Ryo Iijima and Tatsuya Takehisa and Tatsuya Mori}, editor = {Luca Sterpone and Andrea Bartolini and Anastasiia Butko}, title = {Cyber-physical firewall: monitoring and controlling the threats caused by malicious analog signals}, booktitle = {{CF} '22: 19th {ACM} International Conference on Computing Frontiers, Turin, Italy, May 17 - 22, 2022}, pages = {296--304}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3528416.3530997}, doi = {10.1145/3528416.3530997}, timestamp = {Thu, 05 May 2022 15:51:05 +0200}, biburl = {https://dblp.org/rec/conf/cf/IijimaTM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NatatsukaI0ASM22, author = {Atsuko Natatsuka and Ryo Iijima and Takuya Watanabe and Mitsuaki Akiyama and Tetsuya Sakai and Tatsuya Mori}, title = {Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {143--159}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545970}, doi = {10.1145/3545948.3545970}, timestamp = {Thu, 20 Oct 2022 10:46:43 +0200}, biburl = {https://dblp.org/rec/conf/raid/NatatsukaI0ASM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HasegawaYMIA22, author = {Ayako Akiyama Hasegawa and Naomi Yamashita and Tatsuya Mori and Daisuke Inoue and Mitsuaki Akiyama}, editor = {Sonia Chiasson and Apu Kapadia}, title = {Understanding Non-Experts' Security- and Privacy-Related Questions on a Q{\&}A Site}, booktitle = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022, Boston, MA, USA, August 7-9, 2022}, pages = {39--56}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/soups2022/presentation/hasegawa}, timestamp = {Wed, 26 Oct 2022 12:44:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/HasegawaYMIA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsi-dat/YanoIYNMKTA22, author = {Yuji Yano and Hisashi Iwamoto and Takuma Yoshimura and Yoshihiro Nishida and Tatsuya Mori and Kiyotaka Komoku and Hidekuni Takao and Kazutami Arimoto}, title = {28-m {W} Fully Embedded {AI} Techniques with On-site Learning for Low-Power Handy Tactile Sensing System}, booktitle = {2022 International Symposium on {VLSI} Design, Automation and Test, {VLSI-DAT} 2022, Hsinchu, Taiwan, April 18-21, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VLSI-DAT54769.2022.9768071}, doi = {10.1109/VLSI-DAT54769.2022.9768071}, timestamp = {Mon, 23 May 2022 16:36:24 +0200}, biburl = {https://dblp.org/rec/conf/vlsi-dat/YanoIYNMKTA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ChangHLM22, author = {Chun{-}Ming Chang and Hsu{-}Chun Hsiao and Timothy M. Lynar and Tatsuya Mori}, editor = {Fr{\'{e}}d{\'{e}}rique Laforest and Rapha{\"{e}}l Troncy and Elena Simperl and Deepak Agarwal and Aristides Gionis and Ivan Herman and Lionel M{\'{e}}dini}, title = {Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis}, booktitle = {Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25 - 29, 2022}, pages = {201--204}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3487553.3524244}, doi = {10.1145/3487553.3524244}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/ChangHLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SakuraiWOAM21, author = {Yuji Sakurai and Takuya Watanabe and Tetsuya Okuda and Mitsuaki Akiyama and Tatsuya Mori}, title = {Identifying the Phishing Websites Using the Patterns of {TLS} Certificates}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {2}, pages = {451--486}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1026}, doi = {10.13052/JCSM2245-1439.1026}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SakuraiWOAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/IijimaMZTTOM21, author = {Ryo Iijima and Shota Minami and Yunao Zhou and Tatsuya Takehisa and Takeshi Takahashi and Yasuhiro Oikawa and Tatsuya Mori}, title = {Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {9}, number = {4}, pages = {2004--2018}, year = {2021}, url = {https://doi.org/10.1109/TETC.2019.2953041}, doi = {10.1109/TETC.2019.2953041}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/IijimaMZTTOM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurousec/MatsuuraHAM21, author = {Tenga Matsuura and Ayako Akiyama Hasegawa and Mitsuaki Akiyama and Tatsuya Mori}, title = {Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods}, booktitle = {EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11 - 12, 2021}, pages = {36--47}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3481357.3481515}, doi = {10.1145/3481357.3481515}, timestamp = {Tue, 14 Dec 2021 14:30:59 +0100}, biburl = {https://dblp.org/rec/conf/eurousec/MatsuuraHAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/Yajima0YM21, author = {Masanori Yajima and Daiki Chiba and Yoshiro Yoneya and Tatsuya Mori}, title = {Measuring Adoption of {DNS} Security Mechanisms with Cross-Sectional Approach}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2021, Madrid, Spain, December 7-11, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/GLOBECOM46510.2021.9685960}, doi = {10.1109/GLOBECOM46510.2021.9685960}, timestamp = {Mon, 07 Feb 2022 09:24:07 +0100}, biburl = {https://dblp.org/rec/conf/globecom/Yajima0YM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/KawaokaCWAM21, author = {Ryo Kawaoka and Daiki Chiba and Takuya Watanabe and Mitsuaki Akiyama and Tatsuya Mori}, editor = {Oliver Hohlfeld and Andra Lutu and Dave Levin}, title = {A First Look at {COVID-19} Domain Names: Origin and Implications}, booktitle = {Passive and Active Measurement - 22nd International Conference, {PAM} 2021, Virtual Event, March 29 - April 1, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12671}, pages = {39--53}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-72582-2\_3}, doi = {10.1007/978-3-030-72582-2\_3}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/KawaokaCWAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HasegawaYAM21, author = {Ayako Akiyama Hasegawa and Naomi Yamashita and Mitsuaki Akiyama and Tatsuya Mori}, editor = {Sonia Chiasson}, title = {Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails}, booktitle = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021, August 8-10, 2021}, pages = {319--338}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/soups2021/presentation/hasegawa}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/HasegawaYAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-05290, author = {Ryo Kawaoka and Daiki Chiba and Takuya Watanabe and Mitsuaki Akiyama and Tatsuya Mori}, title = {A First Look at {COVID-19} Domain Names: Origin and Implications}, journal = {CoRR}, volume = {abs/2102.05290}, year = {2021}, url = {https://arxiv.org/abs/2102.05290}, eprinttype = {arXiv}, eprint = {2102.05290}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-05290.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-08972, author = {Taiga Ono and Takeshi Sugawara and Jun Sakuma and Tatsuya Mori}, title = {Application of Adversarial Examples to Physical {ECG} Signals}, journal = {CoRR}, volume = {abs/2108.08972}, year = {2021}, url = {https://arxiv.org/abs/2108.08972}, eprinttype = {arXiv}, eprint = {2108.08972}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-08972.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WatanabeSASYM20, author = {Takuya Watanabe and Eitaro Shioji and Mitsuaki Akiyama and Keito Sasaoka and Takeshi Yagi and Tatsuya Mori}, title = {Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {2}, pages = {239--255}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-d\_2\_239}, doi = {10.1587/TRANSINF.2019INP0012}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WatanabeSASYM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HatadaM20, author = {Mitsuhiro Hatada and Tatsuya Mori}, title = {{CLAP:} Classification of Android PUAs by Similarity of {DNS} Queries}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {2}, pages = {265--275}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-d\_2\_265}, doi = {10.1587/TRANSINF.2019INP0003}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/HatadaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WatanabeAKSTSIS20, author = {Takuya Watanabe and Mitsuaki Akiyama and Fumihiro Kanei and Eitaro Shioji and Yuta Takata and Bo Sun and Yuta Ishii and Toshiki Shibahara and Takeshi Yagi and Tatsuya Mori}, title = {Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {2}, pages = {276--291}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-d\_2\_276}, doi = {10.1587/TRANSINF.2019INP0011}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WatanabeAKSTSIS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/MoriWZHAM20, author = {Keika Mori and Takuya Watanabe and Yunao Zhou and Ayako Akiyama Hasegawa and Mitsuaki Akiyama and Tatsuya Mori}, title = {Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {7}, pages = {1541--1555}, year = {2020}, url = {https://doi.org/10.1587/transinf.2019ICP0009}, doi = {10.1587/TRANSINF.2019ICP0009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/MoriWZHAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/HasegawaWSAM20, author = {Ayako Akiyama Hasegawa and Takuya Watanabe and Eitaro Shioji and Mitsuaki Akiyama and Tatsuya Mori}, title = {Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services}, journal = {J. Inf. Process.}, volume = {28}, pages = {1030--1046}, year = {2020}, url = {https://doi.org/10.2197/ipsjjip.28.1030}, doi = {10.2197/IPSJJIP.28.1030}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/HasegawaWSAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/Sakurai0OAM20, author = {Yuji Sakurai and Takuya Watanabe and Tetsuya Okuda and Mitsuaki Akiyama and Tatsuya Mori}, title = {Discovering HTTPSified Phishing Websites Using the {TLS} Certificates Footprints}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {522--531}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00077}, doi = {10.1109/EUROSPW51379.2020.00077}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/Sakurai0OAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/0001SAM20, author = {Takuya Watanabe and Eitaro Shioji and Mitsuaki Akiyama and Tatsuya Mori}, title = {Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/melting-pot-of-origins-compromising-the-intermediary-web-services-that-rehost-websites/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/0001SAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isrl/Sun0ZM20, author = {Bo Sun and Takeshi Takahashi and Lei Zhu and Tatsuya Mori}, editor = {Leslie F. Sikos and Kim{-}Kwang Raymond Choo}, title = {Discovering Malicious URLs Using Machine Learning Techniques}, booktitle = {Data Science in Cybersecurity and Cyberthreat Intelligence}, series = {Intelligent Systems Reference Library}, volume = {177}, pages = {33--60}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38788-4\_3}, doi = {10.1007/978-3-030-38788-4\_3}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isrl/Sun0ZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/YoshidaISMK19, author = {Kanae Yoshida and Hironori Imai and Nana Serizawa and Tatsuya Mori and Akira Kanaoka}, title = {Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps}, journal = {J. Inf. Process.}, volume = {27}, pages = {593--602}, year = {2019}, url = {https://doi.org/10.2197/ipsjjip.27.593}, doi = {10.2197/IPSJJIP.27.593}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/YoshidaISMK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KurogomeOKIHMS19, author = {Yuma Kurogome and Yuto Otsuki and Yuhei Kawakoya and Makoto Iwamura and Syogo Hayashi and Tatsuya Mori and Koushik Sen}, editor = {David Balenson}, title = {{EIGER:} automated {IOC} generation for accurate and interpretable endpoint malware detection}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {687--701}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359808}, doi = {10.1145/3359789.3359808}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KurogomeOKIHMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NatatsukaI0ASM19, author = {Atsuko Natatsuka and Ryo Iijima and Takuya Watanabe and Mitsuaki Akiyama and Tetsuya Sakai and Tatsuya Mori}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Poster: {A} First Look at the Privacy Risks of Voice Assistant Apps}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2633--2635}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363274}, doi = {10.1145/3319535.3363274}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NatatsukaI0ASM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Yasumatsu0KSAM19, author = {Tatsuhiko Yasumatsu and Takuya Watanabe and Fumihiro Kanei and Eitaro Shioji and Mitsuaki Akiyama and Tatsuya Mori}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Understanding the Responsiveness of Mobile App Developers to Software Library Updates}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {13--24}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300020}, doi = {10.1145/3292006.3300020}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Yasumatsu0KSAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/Mori0ZHAM19, author = {Keika Mori and Takuya Watanabe and Yunao Zhou and Ayako Akiyama Hasegawa and Mitsuaki Akiyama and Tatsuya Mori}, title = {Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?}, booktitle = {2019 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {159--171}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSPW.2019.00025}, doi = {10.1109/EUROSPW.2019.00025}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/Mori0ZHAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/Suzuki0YMG19, author = {Hiroaki Suzuki and Daiki Chiba and Yoshiro Yoneya and Tatsuya Mori and Shigeki Goto}, title = {ShamFinder: An Automated Framework for Detecting {IDN} Homographs}, booktitle = {Proceedings of the Internet Measurement Conference, {IMC} 2019, Amsterdam, The Netherlands, October 21-23, 2019}, pages = {449--462}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3355369.3355587}, doi = {10.1145/3355369.3355587}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/Suzuki0YMG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HiraokaIMOT19, author = {Takuya Hiraoka and Takahisa Imagawa and Tatsuya Mori and Takashi Onishi and Yoshimasa Tsuruoka}, editor = {Hanna M. Wallach and Hugo Larochelle and Alina Beygelzimer and Florence d'Alch{\'{e}}{-}Buc and Emily B. Fox and Roman Garnett}, title = {Learning Robust Options by Conditional Value at Risk Optimization}, booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada}, pages = {2615--2625}, year = {2019}, url = {https://proceedings.neurips.cc/paper/2019/hash/49b8b4f95f02e055801da3b4f58e28b7-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/HiraokaIMOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MaruyamaWM19, author = {Seita Maruyama and Satohiro Wakabayashi and Tatsuya Mori}, title = {Tap 'n Ghost: {A} Compilation of Novel Attack Techniques against Smartphone Touchscreens}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {620--637}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00037}, doi = {10.1109/SP.2019.00037}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MaruyamaWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-09191, author = {Takuya Hiraoka and Takahisa Imagawa and Tatsuya Mori and Takashi Onishi and Yoshimasa Tsuruoka}, title = {Learning Robust Options by Conditional Value at Risk Optimization}, journal = {CoRR}, volume = {abs/1905.09191}, year = {2019}, url = {http://arxiv.org/abs/1905.09191}, eprinttype = {arXiv}, eprint = {1905.09191}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-09191.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-07539, author = {Hiroaki Suzuki and Daiki Chiba and Yoshiro Yoneya and Tatsuya Mori and Shigeki Goto}, title = {ShamFinder: An Automated Framework for Detecting {IDN} Homographs}, journal = {CoRR}, volume = {abs/1909.07539}, year = {2019}, url = {http://arxiv.org/abs/1909.07539}, eprinttype = {arXiv}, eprint = {1909.07539}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-07539.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChibaAYHMG18, author = {Daiki Chiba and Mitsuaki Akiyama and Takeshi Yagi and Kunio Hato and Tatsuya Mori and Shigeki Goto}, title = {DomainChroma: Building actionable threat intelligence from malicious domain names}, journal = {Comput. Secur.}, volume = {77}, pages = {138--161}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.03.013}, doi = {10.1016/J.COSE.2018.03.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChibaAYHMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MizunoHMG18, author = {Sho Mizuno and Mitsuhiro Hatada and Tatsuya Mori and Shigeki Goto}, title = {Detecting Malware-Infected Devices Using the {HTTP} Header Patterns}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {5}, pages = {1370--1379}, year = {2018}, url = {https://doi.org/10.1587/transinf.2017EDP7294}, doi = {10.1587/TRANSINF.2017EDP7294}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MizunoHMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WatanabeASWM18, author = {Takuya Watanabe and Mitsuaki Akiyama and Tetsuya Sakai and Hironori Washizaki and Tatsuya Mori}, title = {Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {11}, pages = {2584--2599}, year = {2018}, url = {https://doi.org/10.1587/transinf.2017ICP0006}, doi = {10.1587/TRANSINF.2017ICP0006}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WatanabeASWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SunFMBTI18, author = {Bo Sun and Akinori Fujino and Tatsuya Mori and Tao Ban and Takeshi Takahashi and Daisuke Inoue}, title = {Automatically Generating Malware Analysis Reports Using Sandbox Logs}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {11}, pages = {2622--2632}, year = {2018}, url = {https://doi.org/10.1587/transinf.2017ICP0011}, doi = {10.1587/TRANSINF.2017ICP0011}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SunFMBTI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/0001YASMG18, author = {Daiki Chiba and Takeshi Yagi and Mitsuaki Akiyama and Toshiki Shibahara and Tatsuya Mori and Shigeki Goto}, title = {DomainProfiler: toward accurate and early discovery of domain names abused in future}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {6}, pages = {661--680}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0396-7}, doi = {10.1007/S10207-017-0396-7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/0001YASMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/SunLAWM18, author = {Bo Sun and Xiapu Luo and Mitsuaki Akiyama and Takuya Watanabe and Tatsuya Mori}, title = {PADetective: {A} Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store}, journal = {J. Inf. Process.}, volume = {26}, pages = {212--223}, year = {2018}, url = {https://doi.org/10.2197/ipsjjip.26.212}, doi = {10.2197/IPSJJIP.26.212}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/SunLAWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Pariwono0AM18, author = {Elkana Pariwono and Daiki Chiba and Mitsuaki Akiyama and Tatsuya Mori}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {147--158}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196554}, doi = {10.1145/3196494.3196554}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Pariwono0AM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IijimaMYT0OM18, author = {Ryo Iijima and Shota Minami and Yunao Zhou and Tatsuya Takehisa and Takeshi Takahashi and Yasuhiro Oikawa and Tatsuya Mori}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2222--2224}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3278497}, doi = {10.1145/3243734.3278497}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IijimaMYT0OM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/YoshidaISMK18, author = {Kanae Yoshida and Hironori Imai and Nana Serizawa and Tatsuya Mori and Akira Kanaoka}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps}, booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference, {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2}, pages = {713--718}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/COMPSAC.2018.10324}, doi = {10.1109/COMPSAC.2018.10324}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/YoshidaISMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JuutiSMA18, author = {Mika Juuti and Bo Sun and Tatsuya Mori and N. Asokan}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {132--151}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_7}, doi = {10.1007/978-3-319-99073-6\_7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JuutiSMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/WatanabeSASYM18, author = {Takuya Watanabe and Eitaro Shioji and Mitsuaki Akiyama and Keito Sasaoka and Takeshi Yagi and Tatsuya Mori}, title = {User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {323--337}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00030}, doi = {10.1109/EUROSP.2018.00030}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/WatanabeSASYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/WakabayashiMMGK18, author = {Satohiro Wakabayashi and Seita Maruyama and Tatsuya Mori and Shigeki Goto and Masahiro Kinugawa and Yu{-}ichi Hayashi}, editor = {Christian Rossow and Yves Younan}, title = {A Feasibility Study of Radio-frequency Retroreflector Attack}, booktitle = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore, MD, USA, August 13-14, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/woot18/presentation/wakabayashi}, timestamp = {Mon, 01 Feb 2021 08:41:54 +0100}, biburl = {https://dblp.org/rec/conf/woot/WakabayashiMMGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-02400, author = {Mika Juuti and Bo Sun and Tatsuya Mori and N. Asokan}, title = {Stay On-Topic: Generating Context-specific Fake Restaurant Reviews}, journal = {CoRR}, volume = {abs/1805.02400}, year = {2018}, url = {http://arxiv.org/abs/1805.02400}, eprinttype = {arXiv}, eprint = {1805.02400}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-02400.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-05085, author = {Takuya Watanabe and Eitaro Shioji and Mitsuaki Akiyama and Keito Sasaoka and Takeshi Yagi and Tatsuya Mori}, title = {User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts}, journal = {CoRR}, volume = {abs/1805.05085}, year = {2018}, url = {http://arxiv.org/abs/1805.05085}, eprinttype = {arXiv}, eprint = {1805.05085}, timestamp = {Thu, 13 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-05085.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AkiyamaYYMK17, author = {Mitsuaki Akiyama and Takeshi Yagi and Takeshi Yada and Tatsuya Mori and Youki Kadobayashi}, title = {Analyzing the ecosystem of malicious {URL} redirection through longitudinal observation from honeypots}, journal = {Comput. Secur.}, volume = {69}, pages = {155--173}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.01.003}, doi = {10.1016/J.COSE.2017.01.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AkiyamaYYMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HagaTAM17, author = {Yumehisa Haga and Yuta Takata and Mitsuaki Akiyama and Tatsuya Mori}, title = {Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {8}, pages = {1663--1670}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016ICP0020}, doi = {10.1587/TRANSINF.2016ICP0020}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HagaTAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WatanabeAM17, author = {Takuya Watanabe and Mitsuaki Akiyama and Tatsuya Mori}, title = {Tracking the Human Mobility Using Mobile Device Sensors}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {8}, pages = {1680--1690}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016ICP0022}, doi = {10.1587/TRANSINF.2016ICP0022}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WatanabeAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HatadaM17, author = {Mitsuhiro Hatada and Tatsuya Mori}, title = {Finding New Varieties of Malware with the Classification of Network Behavior}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {8}, pages = {1691--1702}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016ICP0019}, doi = {10.1587/TRANSINF.2016ICP0019}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HatadaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IshiiWAM17, author = {Yuta Ishii and Takuya Watanabe and Mitsuaki Akiyama and Tatsuya Mori}, title = {APPraiser: {A} Large Scale Analysis of Android Clone Apps}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {8}, pages = {1703--1713}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016ICP0012}, doi = {10.1587/TRANSINF.2016ICP0012}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IshiiWAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimuraIMSTNWSS17, author = {Tatsuaki Kimura and Keisuke Ishibashi and Tatsuya Mori and Hiroshi Sawada and Tsuyoshi Toyono and Ken Nishimatsu and Akio Watanabe and Akihiro Shimoda and Kohei Shiomoto}, title = {Network Event Extraction from Log Data with Nonnegative Tensor Factorization}, journal = {{IEICE} Trans. Commun.}, volume = {100-B}, number = {10}, pages = {1865--1878}, year = {2017}, url = {https://doi.org/10.1587/transcom.2016EBP3430}, doi = {10.1587/TRANSCOM.2016EBP3430}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimuraIMSTNWSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/SunLAWM17, author = {Bo Sun and Xiapu Luo and Mitsuaki Akiyama and Takuya Watanabe and Tatsuya Mori}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Characterizing Promotional Attacks in Mobile App Store}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {113--127}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_10}, doi = {10.1007/978-981-10-5421-1\_10}, timestamp = {Mon, 26 Jun 2023 20:45:03 +0200}, biburl = {https://dblp.org/rec/conf/atis/SunLAWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaruyamaWM17, author = {Seita Maruyama and Satohiro Wakabayashi and Tatsuya Mori}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} {TOUCHFLOOD:} {A} Novel Class of Attacks against Capacitive Touchscreens}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2551--2553}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138829}, doi = {10.1145/3133956.3138829}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaruyamaWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WakabayashiMMGK17, author = {Satohiro Wakabayashi and Seita Maruyama and Tatsuya Mori and Shigeki Goto and Masahiro Kinugawa and Yu{-}ichi Hayashi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Is Active Electromagnetic Side-channel Attack Practical?}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2587--2589}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138830}, doi = {10.1145/3133956.3138830}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WakabayashiMMGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HatadaM17, author = {Mitsuhiro Hatada and Tatsuya Mori}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {Detecting and Classifying Android PUAs by Similarity of {DNS} queries}, booktitle = {41st {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 2}, pages = {590--595}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/COMPSAC.2017.103}, doi = {10.1109/COMPSAC.2017.103}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/HatadaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ChibaAYYMG17, author = {Daiki Chiba and Mitsuaki Akiyama and Takeshi Yagi and Takeshi Yada and Tatsuya Mori and Shigeki Goto}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names}, booktitle = {41st {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 1}, pages = {643--648}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/COMPSAC.2017.112}, doi = {10.1109/COMPSAC.2017.112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ChibaAYYMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/HottaMUMYI17, author = {Shinji Hotta and Tatsuya Mori and Daisuke Uchida and Kazuho Maeda and Yoshinori Yaginuma and Akihiro Inomata}, editor = {Seungyon Claire Lee and Leila Takayama and Khai N. Truong}, title = {Eating moment recognition using heart rate responses}, booktitle = {Adjunct Proceedings of the 2017 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 {ACM} International Symposium on Wearable Computers, UbiComp/ISWC 2017, Maui, HI, USA, September 11-15, 2017}, pages = {69--72}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3123024.3123093}, doi = {10.1145/3123024.3123093}, timestamp = {Tue, 06 Nov 2018 16:58:39 +0100}, biburl = {https://dblp.org/rec/conf/huc/HottaMUMYI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MizunoHMG17, author = {Sho Mizuno and Mitsuhiro Hatada and Tatsuya Mori and Shigeki Goto}, title = {BotDetector: {A} robust and scalable approach toward detecting malware-infected devices}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7997372}, doi = {10.1109/ICC.2017.7997372}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/MizunoHMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msr/WatanabeAKSTSIS17, author = {Takuya Watanabe and Mitsuaki Akiyama and Fumihiro Kanei and Eitaro Shioji and Yuta Takata and Bo Sun and Yuta Ishii and Toshiki Shibahara and Takeshi Yagi and Tatsuya Mori}, editor = {Jes{\'{u}}s M. Gonz{\'{a}}lez{-}Barahona and Abram Hindle and Lin Tan}, title = {Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps}, booktitle = {Proceedings of the 14th International Conference on Mining Software Repositories, {MSR} 2017, Buenos Aires, Argentina, May 20-28, 2017}, pages = {14--24}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MSR.2017.23}, doi = {10.1109/MSR.2017.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msr/WatanabeAKSTSIS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/IshiiWKTSAYSM17, author = {Yuta Ishii and Takuya Watanabe and Fumihiro Kanei and Yuta Takata and Eitaro Shioji and Mitsuaki Akiyama and Takeshi Yagi and Bo Sun and Tatsuya Mori}, editor = {Federica Sarro and Emad Shihab and Meiyappan Nagappan and Marie Christin Platenius and Daniel Kaimann}, title = {Understanding the security management of global third-party Android marketplaces}, booktitle = {Proceedings of the 2nd {ACM} {SIGSOFT} International Workshop on App Market Analytics, WAMA@ESEC/SIGSOFT {FSE} 2017, Paderborn, Germany, September 5, 2017}, pages = {12--18}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3121264.3121267}, doi = {10.1145/3121264.3121267}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/IshiiWKTSAYSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WatanabeAKSTSIS17, author = {Takuya Watanabe and Mitsuaki Akiyama and Fumihiro Kanei and Eitaro Shioji and Yuta Takata and Bo Sun and Yuta Ishii and Toshiki Shibahara and Takeshi Yagi and Tatsuya Mori}, title = {A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules}, journal = {CoRR}, volume = {abs/1702.03112}, year = {2017}, url = {http://arxiv.org/abs/1702.03112}, eprinttype = {arXiv}, eprint = {1702.03112}, timestamp = {Thu, 13 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/WatanabeAKSTSIS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MaruyamaWM17, author = {Seita Maruyama and Satohiro Wakabayashi and Tatsuya Mori}, title = {Trojan of Things: Embedding Malicious {NFC} Tags into Common Objects}, journal = {CoRR}, volume = {abs/1702.07124}, year = {2017}, url = {http://arxiv.org/abs/1702.07124}, eprinttype = {arXiv}, eprint = {1702.07124}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MaruyamaWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/MoriISSHIG16, author = {Tatsuya Mori and Takeru Inoue and Akihiro Shimoda and Kazumichi Sato and Shigeaki Harada and Keisuke Ishibashi and Shigeki Goto}, title = {Statistical estimation of the names of {HTTPS} servers with domain name graphs}, journal = {Comput. Commun.}, volume = {94}, pages = {104--113}, year = {2016}, url = {https://doi.org/10.1016/j.comcom.2016.01.013}, doi = {10.1016/J.COMCOM.2016.01.013}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/MoriISSHIG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SunAYHM16, author = {Bo Sun and Mitsuaki Akiyama and Takeshi Yagi and Mitsuhiro Hatada and Tatsuya Mori}, title = {Automating {URL} Blacklist Generation with Similarity Search Approach}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {4}, pages = {873--882}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015ICP0027}, doi = {10.1587/TRANSINF.2015ICP0027}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SunAYHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/MoriUSONMYI16, author = {Tatsuya Mori and Daisuke Uchida and Masato Sakata and Takuro Oya and Yasuyuki Nakata and Kazuho Maeda and Yoshinori Yaginuma and Akihiro Inomata}, editor = {James P. Gilbert and Haim Azhari and Hesham H. Ali and Carla Quint{\~{a}}o and Jan Sliwa and Carolina Ruiz and Ana L. N. Fred and Hugo Gamboa}, title = {Continuous Real-time Heart Rate Monitoring from Face Images}, booktitle = {Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies {(BIOSTEC} 2016) - Volume 4: BIOSIGNALS, Rome, Italy, February 21-23, 2016}, pages = {52--56}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005682400520056}, doi = {10.5220/0005682400520056}, timestamp = {Sat, 21 Sep 2019 10:38:11 +0200}, biburl = {https://dblp.org/rec/conf/biostec/MoriUSONMYI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/UchidaMSONMYI16, author = {Daisuke Uchida and Tatsuya Mori and Masato Sakata and Takuro Oya and Yasuyuki Nakata and Kazuho Maeda and Yoshinori Yaginuma and Akihiro Inomata}, editor = {Ana L. N. Fred and Hugo Gamboa}, title = {Continuous Real-Time Measurement Method for Heart Rate Monitoring Using Face Images}, booktitle = {Biomedical Engineering Systems and Technologies - 9th International Joint Conference, {BIOSTEC} 2016, Rome, Italy, February 21-23, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {690}, pages = {224--235}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54717-6\_13}, doi = {10.1007/978-3-319-54717-6\_13}, timestamp = {Wed, 25 Sep 2019 18:03:44 +0200}, biburl = {https://dblp.org/rec/conf/biostec/UchidaMSONMYI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunFM16, author = {Bo Sun and Akinori Fujino and Tatsuya Mori}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{POSTER:} Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1814--1816}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2989064}, doi = {10.1145/2976749.2989064}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SunFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/IshiiWAM16, author = {Yuta Ishii and Takuya Watanabe and Mitsuaki Akiyama and Tatsuya Mori}, editor = {Rakesh M. Verma and Micha{\"{e}}l Rusinowitch}, title = {Clone or Relative?: Understanding the Origins of Similar Android Apps}, booktitle = {Proceedings of the 2016 {ACM} on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2016, New Orleans, LA, USA, March 11, 2016}, pages = {25--32}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2875475.2875480}, doi = {10.1145/2875475.2875480}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/IshiiWAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ChibaYASYMG16, author = {Daiki Chiba and Takeshi Yagi and Mitsuaki Akiyama and Toshiki Shibahara and Takeshi Yada and Tatsuya Mori and Shigeki Goto}, title = {DomainProfiler: Discovering Domain Names Abused in Future}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {491--502}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN.2016.51}, doi = {10.1109/DSN.2016.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ChibaYASYMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/TianMO16, author = {Guifen Tian and Tatsuya Mori and Yuji Okuda}, title = {Spoofing detection for embedded face recognition system using a low cost stereo camera}, booktitle = {23rd International Conference on Pattern Recognition, {ICPR} 2016, Canc{\'{u}}n, Mexico, December 4-8, 2016}, pages = {1017--1022}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICPR.2016.7899769}, doi = {10.1109/ICPR.2016.7899769}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icpr/TianMO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/FujinoMM15, author = {Akinori Fujino and Junichi Murakami and Tatsuya Mori}, title = {Discovering similar malware samples using {API} call topics}, booktitle = {12th Annual {IEEE} Consumer Communications and Networking Conference, {CCNC} 2015, Las Vegas, NV, USA, January 9-12, 2015}, pages = {140--147}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CCNC.2015.7157960}, doi = {10.1109/CCNC.2015.7157960}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/FujinoMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HagaSMG15, author = {Yumehisa Haga and Akira Saso and Tatsuya Mori and Shigeki Goto}, title = {Increasing the Darkness of Darknet Traffic}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7416973}, doi = {10.1109/GLOCOM.2014.7416973}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HagaSMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ShimodaISTISTTM15, author = {Akihiro Shimoda and Keisuke Ishibashi and Kazumichi Sato and Masayuki Tsujino and Takeru Inoue and Masaki Shimura and Takanori Takebe and Kazuki Takahashi and Tatsuya Mori and Shigeki Goto}, title = {Inferring Popularity of Domain Names with {DNS} Traffic: Exploiting Cache Timeout Heuristics}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7417638}, doi = {10.1109/GLOCOM.2014.7417638}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ShimodaISTISTTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/SunAYHM15, author = {Bo Sun and Mitsuaki Akiyama and Takeshi Yagi and Mitsuhiro Hatada and Tatsuya Mori}, title = {AutoBLG: Automatic {URL} blacklist generator using search space expansion and filters}, booktitle = {2015 {IEEE} Symposium on Computers and Communication, {ISCC} 2015, Larnaca, Cyprus, July 6-9, 2015}, pages = {625--631}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ISCC.2015.7405584}, doi = {10.1109/ISCC.2015.7405584}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/SunAYHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/WatanabeASM15, author = {Takuya Watanabe and Mitsuaki Akiyama and Tetsuya Sakai and Tatsuya Mori}, editor = {Lorrie Faith Cranor and Robert Biddle and Sunny Consolvo}, title = {Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps}, booktitle = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa, Canada, July 22-24, 2015}, pages = {241--255}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/soups2015/proceedings/presentation/watanabe}, timestamp = {Thu, 13 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/WatanabeASM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/MoriISSIG15, author = {Tatsuya Mori and Takeru Inoue and Akihiro Shimoda and Kazumichi Sato and Keisuke Ishibashi and Shigeki Goto}, editor = {Moritz Steiner and Pere Barlet{-}Ros and Olivier Bonaventure}, title = {SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs}, booktitle = {Traffic Monitoring and Analysis - 7th International Workshop, {TMA} 2015, Barcelona, Spain, April 21-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9053}, pages = {126--139}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17172-2\_9}, doi = {10.1007/978-3-319-17172-2\_9}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tma/MoriISSIG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/WatanabeAM15, author = {Takuya Watanabe and Mitsuaki Akiyama and Tatsuya Mori}, editor = {Aur{\'{e}}lien Francillon and Thomas Ptacek}, title = {RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility}, booktitle = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington, DC, USA, August 10-11, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/woot15/workshop-program/presentation/watanabe}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/WatanabeAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HatadaTM14, author = {Mitsuhiro Hatada and Masato Terada and Tatsuya Mori}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Seven Years in {MWS:} Experiences of Sharing Datasets with Anti-malware Research Community in Japan}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1433--1435}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662357}, doi = {10.1145/2660267.2662357}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HatadaTM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KimuraIMSTNWSS14, author = {Tatsuaki Kimura and Keisuke Ishibashi and Tatsuya Mori and Hiroshi Sawada and Tsuyoshi Toyono and Ken Nishimatsu and Akio Watanabe and Akihiro Shimoda and Kohei Shiomoto}, title = {Spatio-temporal factorization of log data for understanding network events}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {610--618}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6847986}, doi = {10.1109/INFOCOM.2014.6847986}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/KimuraIMSTNWSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KamiyamaMK13, author = {Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara}, title = {Autonomic load balancing of flow monitors}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {741--761}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.018}, doi = {10.1016/J.COMNET.2012.10.018}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KamiyamaMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KawaharaTMKI13, author = {Ryoichi Kawahara and Tetsuya Takine and Tatsuya Mori and Noriaki Kamiyama and Keisuke Ishibashi}, title = {Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1560--1576}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.010}, doi = {10.1016/J.COMNET.2013.02.010}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KawaharaTMKI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KamiyamaKMH13, author = {Noriaki Kamiyama and Ryoichi Kawahara and Tatsuya Mori and Haruhisa Hasegawa}, title = {Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-Distribution VoD}, journal = {{IEICE} Trans. Commun.}, volume = {96-B}, number = {1}, pages = {143--154}, year = {2013}, url = {https://doi.org/10.1587/transcom.E96.B.143}, doi = {10.1587/TRANSCOM.E96.B.143}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KamiyamaKMH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IkedaKKKM13, author = {Yasuhiro Ikeda and Ryoichi Kawahara and Noriaki Kamiyama and Tatsuaki Kimura and Tatsuya Mori}, title = {Analyzing Characteristics of {TCP} Quality Metrics with Respect to Type of Connection through Measured Traffic Data}, journal = {{IEICE} Trans. Commun.}, volume = {96-B}, number = {2}, pages = {533--542}, year = {2013}, url = {https://doi.org/10.1587/transcom.E96.B.533}, doi = {10.1587/TRANSCOM.E96.B.533}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IkedaKKKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KamiyamaMKH13, author = {Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara and Haruhisa Hasegawa}, title = {Optimally Designing ISP-Operated {CDN}}, journal = {{IEICE} Trans. Commun.}, volume = {96-B}, number = {3}, pages = {790--801}, year = {2013}, url = {https://doi.org/10.1587/transcom.E96.B.790}, doi = {10.1587/TRANSCOM.E96.B.790}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KamiyamaMKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KamiyamaKMH13a, author = {Noriaki Kamiyama and Ryoichi Kawahara and Tatsuya Mori and Haruhisa Hasegawa}, title = {Multicast Pre-Distribution VoD System}, journal = {{IEICE} Trans. Commun.}, volume = {96-B}, number = {6}, pages = {1459--1471}, year = {2013}, url = {https://doi.org/10.1587/transcom.E96.B.1459}, doi = {10.1587/TRANSCOM.E96.B.1459}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KamiyamaKMH13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TakahashiMHTM13, author = {Kazuya Takahashi and Tatsuya Mori and Yusuke Hirota and Hideki Tode and Koso Murakami}, title = {A Resilient Forest-Based Application Level Multicast for Real-Time Streaming}, journal = {{IEICE} Trans. Commun.}, volume = {96-B}, number = {7}, pages = {1874--1885}, year = {2013}, url = {https://doi.org/10.1587/transcom.E96.B.1874}, doi = {10.1587/TRANSCOM.E96.B.1874}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TakahashiMHTM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KamiyamaMKH13a, author = {Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara and Shigeaki Harada}, title = {Optimally Identifying Worm-Infected Hosts}, journal = {{IEICE} Trans. Commun.}, volume = {96-B}, number = {8}, pages = {2084--2094}, year = {2013}, url = {https://doi.org/10.1587/transcom.E96.B.2084}, doi = {10.1587/TRANSCOM.E96.B.2084}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KamiyamaMKH13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/ChibaTMG13, author = {Daiki Chiba and Kazuhiro Tobe and Tatsuya Mori and Shigeki Goto}, title = {Analyzing Spatial Structure of {IP} Addresses for Detecting Malicious Websites}, journal = {J. Inf. Process.}, volume = {21}, number = {3}, pages = {539--550}, year = {2013}, url = {https://doi.org/10.2197/ipsjjip.21.539}, doi = {10.2197/IPSJJIP.21.539}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/ChibaTMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/KamiyamaMKHH13, author = {Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara and Shigeaki Harada and Haruhisa Hasegawa}, title = {Analyzing influence of network topology on designing ISP-operated {CDN}}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {969--977}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9605-2}, doi = {10.1007/S11235-011-9605-2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/KamiyamaMKHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/MakiNSTMKK13, author = {Naoya Maki and Takayuki Nishio and Ryoichi Shinkuma and Tatsuro Takahashi and Tatsuya Mori and Noriaki Kamiyama and Ryoichi Kawahara}, title = {Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks}, booktitle = {The International Conference on Information Networking 2013, {ICOIN} 2013, Bangkok, Thailand, January 28-30, 2013}, pages = {450--455}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICOIN.2013.6496421}, doi = {10.1109/ICOIN.2013.6496421}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/MakiNSTMKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kaleidoscope/MakiSMKK13, author = {Naoya Maki and Ryoichi Shinkuma and Tatsuya Mori and Noriaki Kamiyama and Ryoichi Kawahara}, title = {A periodic combined-content distribution mechanism in peer-assisted content delivery networks}, booktitle = {Proceedings of the 2013 {ITU} Kaleidoscope: Building Sustainable Communities, Kyoto, Japan, April 22-24, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6533770/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kaleidoscope/MakiSMKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cis/MoriMAMSIN12, author = {Tatsuya Mori and Yoshikazu Maekawa and Yoko Akiyama and Fumihito Mishima and Koichi Sutani and Sunao Iwaki and Shigehiro Nishijima}, title = {Fundamental Study for Controlling Environment using Biological signal}, journal = {Control. Intell. Syst.}, volume = {40}, number = {3}, year = {2012}, url = {https://doi.org/10.2316/Journal.201.2012.3.201-2342}, doi = {10.2316/JOURNAL.201.2012.3.201-2342}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cis/MoriMAMSIN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IshibashiKMKA12, author = {Keisuke Ishibashi and Ryoichi Kawahara and Tatsuya Mori and Tsuyoshi Kondoh and Shoichiro Asano}, title = {Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability}, journal = {{IEICE} Trans. Commun.}, volume = {95-B}, number = {2}, pages = {466--476}, year = {2012}, url = {https://doi.org/10.1587/transcom.E95.B.466}, doi = {10.1587/TRANSCOM.E95.B.466}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IshibashiKMKA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShimodaMG12, author = {Akihiro Shimoda and Tatsuya Mori and Shigeki Goto}, title = {Extended Darknet: Multi-Dimensional Internet Threat Monitoring System}, journal = {{IEICE} Trans. Commun.}, volume = {95-B}, number = {6}, pages = {1915--1923}, year = {2012}, url = {https://doi.org/10.1587/transcom.E95.B.1915}, doi = {10.1587/TRANSCOM.E95.B.1915}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShimodaMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KawaharaMYK12, author = {Ryoichi Kawahara and Tatsuya Mori and Takeshi Yada and Noriaki Kamiyama}, title = {Analyzing and Reducing the Impact of Traffic on Large-Scale {NAT}}, journal = {{IEICE} Trans. Commun.}, volume = {95-B}, number = {9}, pages = {2815--2827}, year = {2012}, url = {https://doi.org/10.1587/transcom.E95.B.2815}, doi = {10.1587/TRANSCOM.E95.B.2815}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KawaharaMYK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MakiNSMKKT12, author = {Naoya Maki and Takayuki Nishio and Ryoichi Shinkuma and Tatsuya Mori and Noriaki Kamiyama and Ryoichi Kawahara and Tatsuro Takahashi}, title = {Traffic Engineering of Peer-Assisted Content Delivery Network with Content-Oriented Incentive Mechanism}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {95-D}, number = {12}, pages = {2860--2869}, year = {2012}, url = {https://doi.org/10.1587/transinf.E95.D.2860}, doi = {10.1587/TRANSINF.E95.D.2860}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MakiNSMKKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijssc/MoriNI12, author = {Tatsuya Mori and Makoto Nakashima and Tetsuro Ito}, title = {SpACCE: a sophisticated ad hoc cloud computing environment built by server migration to facilitate distributed collaboration}, journal = {Int. J. Space Based Situated Comput.}, volume = {2}, number = {4}, pages = {230--239}, year = {2012}, url = {https://doi.org/10.1504/IJSSC.2012.050000}, doi = {10.1504/IJSSC.2012.050000}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijssc/MoriNI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/MoriNI12, author = {Tatsuya Mori and Makoto Nakashima and Tetsuro Ito}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {A Sophisticated Ad Hoc Cloud Computing Environment Built by the Migration of a Server to Facilitate Distributed Collaboration}, booktitle = {26th International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2012, Fukuoka, Japan, March 26-29, 2012}, pages = {1196--1202}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/WAINA.2012.54}, doi = {10.1109/WAINA.2012.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/MoriNI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KamiyamaMK12, author = {Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara}, title = {Autonomic load balancing for flow monitoring}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {2684--2688}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6363789}, doi = {10.1109/ICC.2012.6363789}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KamiyamaMK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/ChibaTMG12, author = {Daiki Chiba and Kazuhiro Tobe and Tatsuya Mori and Shigeki Goto}, title = {Detecting Malicious Websites by Learning {IP} Address Features}, booktitle = {12th {IEEE/IPSJ} International Symposium on Applications and the Internet, {SAINT} 2012, Izmir, Turkey, July 16-20, 2012}, pages = {29--39}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SAINT.2012.14}, doi = {10.1109/SAINT.2012.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/ChibaTMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KamiyamaKMHH11, author = {Noriaki Kamiyama and Ryoichi Kawahara and Tatsuya Mori and Shigeaki Harada and Haruhisa Hasegawa}, title = {Optimally designing caches to reduce {P2P} traffic}, journal = {Comput. Commun.}, volume = {34}, number = {7}, pages = {883--897}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.10.009}, doi = {10.1016/J.COMCOM.2010.10.009}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/KamiyamaKMHH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KamiyamaKMHH11a, author = {Noriaki Kamiyama and Ryoichi Kawahara and Tatsuya Mori and Shigeaki Harada and Haruhisa Hasegawa}, title = {Parallel video streaming optimizing network throughput}, journal = {Comput. Commun.}, volume = {34}, number = {10}, pages = {1182--1194}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.12.003}, doi = {10.1016/J.COMCOM.2010.12.003}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/KamiyamaKMHH11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KawaharaIMKHHA11, author = {Ryoichi Kawahara and Keisuke Ishibashi and Tatsuya Mori and Noriaki Kamiyama and Shigeaki Harada and Haruhisa Hasegawa and Shoichiro Asano}, title = {Detection accuracy of network anomalies using sampled flow statistics}, journal = {Int. J. Netw. Manag.}, volume = {21}, number = {6}, pages = {513--535}, year = {2011}, url = {https://doi.org/10.1002/nem.777}, doi = {10.1002/NEM.777}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/KawaharaIMKHHA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/KawaharaKMH11, author = {Ryoichi Kawahara and Noriaki Kamiyama and Tatsuya Mori and Haruhisa Hasegawa}, title = {Performance evaluation of peer-assisted content distribution}, booktitle = {2011 {IEEE} Consumer Communications and Networking Conference, {CCNC} 2011, Las Vegas, NV, 9-12 January, 2011}, pages = {725--729}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CCNC.2011.5766586}, doi = {10.1109/CCNC.2011.5766586}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/KawaharaKMH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ceas/MoriSTI11, author = {Tatsuya Mori and Kazumichi Sato and Yousuke Takahashi and Keisuke Ishibashi}, editor = {Vidyasagar M. Potdar}, title = {How is e-mail sender authentication used and misused?}, booktitle = {The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, {CEAS} 2011, Perth, Australia, September 1-2, 2011, Proceedings}, pages = {31--37}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2030376.2030380}, doi = {10.1145/2030376.2030380}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ceas/MoriSTI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KawaharaHKMHN11, author = {Ryoichi Kawahara and Shigeaki Harada and Noriaki Kamiyama and Tatsuya Mori and Haruhisa Hasegawa and Akihiro Nakao}, title = {Traffic Engineering Using Overlay Network}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2011, Kyoto, Japan, 5-9 June, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/icc.2011.5963441}, doi = {10.1109/ICC.2011.5963441}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KawaharaHKMHN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/KamiyamaKMH11, author = {Noriaki Kamiyama and Ryoichi Kawahara and Tatsuya Mori and Haruhisa Hasegawa}, editor = {Nazim Agoulmine and Claudio Bartolini and Tom Pfeifer and Declan O'Sullivan}, title = {Limiting pre-distribution and clustering users on multicast pre-distribution VoD}, booktitle = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011}, pages = {706--709}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INM.2011.5990661}, doi = {10.1109/INM.2011.5990661}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/KamiyamaKMH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/EsquivelAM10, author = {Holly Esquivel and Aditya Akella and Tatsuya Mori}, editor = {P. R. Kumar and Henning Schulzrinne and Harrick M. Vin}, title = {On the effectiveness of {IP} reputation for spam filtering}, booktitle = {Second International Conference on Communication Systems and Networks, {COMSNETS} 2010, Bangalore, India, January 5-9, 2010}, pages = {1--10}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/COMSNETS.2010.5431981}, doi = {10.1109/COMSNETS.2010.5431981}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/EsquivelAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KamiyamaKMHH10, author = {Noriaki Kamiyama and Ryoichi Kawahara and Tatsuya Mori and Shigeaki Harada and Haruhisa Hasegawa}, title = {Optimally Designing Capacity and Location of Caches to Reduce {P2P} Traffic}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5501837}, doi = {10.1109/ICC.2010.5501837}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KamiyamaKMHH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/KamiyamaKMHH10, author = {Noriaki Kamiyama and Ryoichi Kawahara and Tatsuya Mori and Shigeaki Harada and Haruhisa Hasegawa}, editor = {Yoshiaki Kiriha and Lisandro Zambenedetti Granville and Deep Medhi and Toshio Tonouchi and Myung{-}Sup Kim}, title = {Impact of topology on parallel video streaming}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2010, 19-23 April 2010, Osaka, Japan}, pages = {607--614}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/NOMS.2010.5488436}, doi = {10.1109/NOMS.2010.5488436}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/KamiyamaKMHH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/ShimodaMG10, author = {Akihiro Shimoda and Tatsuya Mori and Shigeki Goto}, title = {Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies}, booktitle = {Tenth Annual International Symposium on Applications and the Internet, {SAINT} 2010, Seoul, Korea, 19-23 July, 2010, Proceedings}, pages = {22--30}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SAINT.2010.42}, doi = {10.1109/SAINT.2010.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/ShimodaMG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/MoriKHS10, author = {Tatsuya Mori and Ryoichi Kawahara and Haruhisa Hasegawa and Shinsuke Shimogawa}, editor = {Fabio Ricciato and Marco Mellia and Ernst W. Biersack}, title = {Characterizing Traffic Flows Originating from Large-Scale Video Sharing Services}, booktitle = {Traffic Monitoring and Analysis, Second International Workshop, {TMA} 2010, Zurich, Switzerland, April 7, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6003}, pages = {17--31}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12365-8\_2}, doi = {10.1007/978-3-642-12365-8\_2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tma/MoriKHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jssc/MoriUNTSFKMMAMO09, author = {Tatsuya Mori and Yasuyuki Ueda and Nobuhiro Nonogaki and Toshihiro Terazawa and Milosz Sroka and Tetsuya Fujita and Takeshi Kodaka and Takayuki Mori and Kumiko Morita and Hideho Arakida and Takashi Miura and Yuji Okuda and Toshiki Kizu and Yoshiro Tsuboi}, title = {A Power, Performance Scalable Eight-Cores Media Processor for Mobile Multimedia Applications}, journal = {{IEEE} J. Solid State Circuits}, volume = {44}, number = {11}, pages = {2957--2965}, year = {2009}, url = {https://doi.org/10.1109/JSSC.2009.2028936}, doi = {10.1109/JSSC.2009.2028936}, timestamp = {Sun, 30 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jssc/MoriUNTSFKMMAMO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/KodakaSTONKMUAOKTM09, author = {Takeshi Kodaka and Shunsuke Sasaki and Takahiro Tokuyoshi and Ryuichiro Ohyama and Nobuhiro Nonogaki and Koji Kitayama and Tatsuya Mori and Yasuyuki Ueda and Hideho Arakida and Yuji Okuda and Toshiki Kizu and Yoshiro Tsuboi and Nobu Matsumoto}, editor = {Luca Benini and Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller}, title = {Design and implementation of scalable, transparent threads for multi-core media processor}, booktitle = {Design, Automation and Test in Europe, {DATE} 2009, Nice, France, April 20-24, 2009}, pages = {1035--1039}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/DATE.2009.5090816}, doi = {10.1109/DATE.2009.5090816}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/KodakaSTONKMUAOKTM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/MoriKHHK09, author = {Tatsuya Mori and Noriaki Kamiyama and Shigeaki Harada and Haruhisa Hasegawa and Ryoichi Kawahara}, title = {Improving Deployability of Peer-Assisted {CDN} Platform with Incentive}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425962}, doi = {10.1109/GLOCOM.2009.5425962}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/MoriKHHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KawaharaMKHH09, author = {Ryoichi Kawahara and Tatsuya Mori and Noriaki Kamiyama and Shigeaki Harada and Haruhisa Hasegawa}, title = {Adaptive Bandwidth Control to Handle Long-Duration Large Flows}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5198696}, doi = {10.1109/ICC.2009.5198696}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KawaharaMKHH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jcdl/KiyotaNSMM09, author = {Yoji Kiyota and Hiroshi Nakagawa and Satoshi Sakai and Tatsuya Mori and Hidetaka Masuda}, editor = {Fred Heath and Mary Lynn Rice{-}Lively and Richard Furuta}, title = {Exploitation of the wikipedia category system for enhancing the value of {LCSH}}, booktitle = {Proceedings of the 2009 Joint International Conference on Digital Libraries, {JCDL} 2009, Austin, TX, USA, June 15-19, 2009}, pages = {411--412}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1555400.1555488}, doi = {10.1145/1555400.1555488}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/jcdl/KiyotaNSMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KawaharaMIKY08, author = {Ryoichi Kawahara and Tatsuya Mori and Keisuke Ishibashi and Noriaki Kamiyama and Hideaki Yoshino}, title = {Packet Sampling {TCP} Flow Rate Estimation and Performance Degradation Detection Method}, journal = {{IEICE} Trans. Commun.}, volume = {91-B}, number = {5}, pages = {1309--1319}, year = {2008}, url = {https://doi.org/10.1093/ietcom/e91-b.5.1309}, doi = {10.1093/IETCOM/E91-B.5.1309}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KawaharaMIKY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IshibashiMKHKYSA08, author = {Keisuke Ishibashi and Tatsuya Mori and Ryoichi Kawahara and Yutaka Hirokawa and Atsushi Kobayashi and Kimihiro Yamamoto and Hitoaki Sakamoto and Shoichiro Asano}, title = {Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection}, journal = {{IEICE} Trans. Commun.}, volume = {91-B}, number = {5}, pages = {1331--1339}, year = {2008}, url = {https://doi.org/10.1093/ietcom/e91-b.5.1331}, doi = {10.1093/IETCOM/E91-B.5.1331}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IshibashiMKHKYSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HaradaKMKHY08, author = {Shigeaki Harada and Ryoichi Kawahara and Tatsuya Mori and Noriaki Kamiyama and Haruhisa Hasegawa and Hideaki Yoshino}, title = {A Method of Detecting Network Anomalies in Cyclic Traffic}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {2057--2061}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.396}, doi = {10.1109/GLOCOM.2008.ECP.396}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HaradaKMKHY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MoriTM08, author = {Tatsuya Mori and Hideki Tode and Koso Murakami}, title = {Integrated Method for Loss-Resilient Multicast Source Authentication and Data Reconstruction}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2008, Beijing, China, 19-23 May 2008}, pages = {5844--5848}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICC.2008.1093}, doi = {10.1109/ICC.2008.1093}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/MoriTM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipom/KamiyamaMKH08, author = {Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara and Shigeaki Harada}, editor = {Nail Akar and Michal Pi{\'{o}}ro and Charalabos Skianis}, title = {Optimum Identification of Worm-Infected Hosts}, booktitle = {{IP} Operations and Management, 8th {IEEE} International Workshop, {IPOM} 2008, Samos Island, Greece, September 22-26, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5275}, pages = {103--116}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87357-0\_9}, doi = {10.1007/978-3-540-87357-0\_9}, timestamp = {Sun, 02 Oct 2022 16:08:48 +0200}, biburl = {https://dblp.org/rec/conf/ipom/KamiyamaMKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/KamiyamaMKHY08, author = {Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara and Shigeaki Harada and Hideaki Yoshino}, title = {Extracting Worm-Infected Hosts Using White List}, booktitle = {Proceedings of the 2008 International Symposium on Applications and the Internet, {SAINT} 2008, 28 July - 1 August 2008, Turku, Finland}, pages = {68--75}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SAINT.2008.77}, doi = {10.1109/SAINT.2008.77}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/KamiyamaMKHY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MoriTPKUG07, author = {Tatsuya Mori and Tetsuya Takine and Jianping Pan and Ryoichi Kawahara and Masato Uchida and Shigeki Goto}, title = {Identifying Heavy-Hitter Flows from Sampled Flow Statistics}, journal = {{IEICE} Trans. Commun.}, volume = {90-B}, number = {11}, pages = {3061--3072}, year = {2007}, url = {https://doi.org/10.1093/ietcom/e90-b.11.3061}, doi = {10.1093/IETCOM/E90-B.11.3061}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MoriTPKUG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/KawaharaIMKHA07, author = {Ryoichi Kawahara and Keisuke Ishibashi and Tatsuya Mori and Noriaki Kamiyama and Shigeaki Harada and Shoichiro Asano}, title = {Detection Accuracy of Network Anomalies Using Sampled Flow Statistics}, booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM} '07, Washington, DC, USA, 26-30 November 2007}, pages = {1959--1964}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/GLOCOM.2007.376}, doi = {10.1109/GLOCOM.2007.376}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/KawaharaIMKHA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/KamiyamaMKL07, author = {Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara and Eng Keong Lua}, title = {Efficient Timeout Checking Mechanism for Traffic Control}, booktitle = {Proceedings of the 16th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007}, pages = {327--333}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICCCN.2007.4317840}, doi = {10.1109/ICCCN.2007.4317840}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/KamiyamaMKL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KamiyamaMK07, author = {Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara}, title = {Simple and Adaptive Identification of Superspreaders by Flow Sampling}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {2481--2485}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.305}, doi = {10.1109/INFCOM.2007.305}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/KamiyamaMK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/KawaharaMKHA07, author = {Ryoichi Kawahara and Tatsuya Mori and Noriaki Kamiyama and Shigeaki Harada and Shoichiro Asano}, title = {A Study on Detecting Network Anomalies Using Sampled Flow Statistics}, booktitle = {2007 International Symposium on Applications and the Internet - Workshops {(SAINT} 2007 Workshops), 15-19 January 2007, Hiroshima, Japan}, pages = {81}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SAINT-W.2007.17}, doi = {10.1109/SAINT-W.2007.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/KawaharaMKHA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/IshibashiMKTOA07, author = {Keisuke Ishibashi and Tatsuya Mori and Ryoichi Kawahara and Katsuyasu Toyama and Shunichi Osawa and Shoichiro Asano}, title = {2-D Bitmap for Summarizing Inter-Host Communication Patterns}, booktitle = {2007 International Symposium on Applications and the Internet - Workshops {(SAINT} 2007 Workshops), 15-19 January 2007, Hiroshima, Japan}, pages = {83}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SAINT-W.2007.1}, doi = {10.1109/SAINT-W.2007.1}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/IshibashiMKTOA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/MoriKKH07, author = {Tatsuya Mori and Ryoichi Kawahara and Noriaki Kamiyama and Shigeaki Harada}, title = {Inferring Original Traffic Pattern from Sampled Flow Statistics}, booktitle = {2007 International Symposium on Applications and the Internet - Workshops {(SAINT} 2007 Workshops), 15-19 January 2007, Hiroshima, Japan}, pages = {85}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SAINT-W.2007.51}, doi = {10.1109/SAINT-W.2007.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/MoriKKH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/KawaharaMIKA06, author = {Ryoichi Kawahara and Tatsuya Mori and Keisuke Ishibashi and Noriaki Kamiyama and Takeo Abe}, title = {Estimating Flow Rate from Sampled Packet Streams for Detection of Performance Degradation at {TCP} Flow Level}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.446}, doi = {10.1109/GLOCOM.2006.446}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/KawaharaMIKA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KawaharaMA06, author = {Ryoichi Kawahara and Tatsuya Mori and Takeo Abe}, title = {QoS control to handle long-duration large flows and its performance evaluation}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {579--584}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.254857}, doi = {10.1109/ICC.2006.254857}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KawaharaMA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/IshibashiMKHKYS06, author = {Keisuke Ishibashi and Tatsuya Mori and Ryoichi Kawahara and Yutaka Hirokawa and Atsushi Kobayashi and Kimihiro Yamamoto and Hitoaki Sakamoto}, editor = {Roger S. Barga and Xiaofang Zhou}, title = {Estimating Top {N} Hosts in Cardinality Using Small Memory Resources}, booktitle = {Proceedings of the 22nd International Conference on Data Engineering Workshops, {ICDE} 2006, 3-7 April 2006, Atlanta, GA, {USA}}, pages = {29}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDEW.2006.56}, doi = {10.1109/ICDEW.2006.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/IshibashiMKHKYS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KamiyamaM06, author = {Noriaki Kamiyama and Tatsuya Mori}, title = {Simple and Accurate Identification of High-Rate Flows by Packet Sampling}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.324}, doi = {10.1109/INFOCOM.2006.324}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/KamiyamaM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KawaharaIMOA05, author = {Ryoichi Kawahara and Keisuke Ishibashi and Tatsuya Mori and Toshihisa Ozawa and Takeo Abe}, title = {Method of Bandwidth Dimensioning and Management for Aggregated {TCP} Flows with Heterogeneous Access Links}, journal = {{IEICE} Trans. Commun.}, volume = {88-B}, number = {12}, pages = {4605--4615}, year = {2005}, url = {https://doi.org/10.1093/ietcom/e88-b.12.4605}, doi = {10.1093/IETCOM/E88-B.12.4605}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KawaharaIMOA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/MoriUG05, author = {Tatsuya Mori and Masato Uchida and Shigeki Goto}, title = {Flow analysis of internet traffic: World Wide Web versus peer-to-peer}, journal = {Syst. Comput. Jpn.}, volume = {36}, number = {11}, pages = {70--81}, year = {2005}, url = {https://doi.org/10.1002/scj.20283}, doi = {10.1002/SCJ.20283}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/MoriUG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MoriKNG04, author = {Tatsuya Mori and Ryoichi Kawahara and Shozo Naito and Shigeki Goto}, title = {On the Characteristics of Internet Traffic Variability: Spikes and Elephants}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {87-D}, number = {12}, pages = {2644--2653}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-d\_12\_2644}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MoriKNG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/MoriUKPG04, author = {Tatsuya Mori and Masato Uchida and Ryoichi Kawahara and Jianping Pan and Shigeki Goto}, editor = {Alfio Lombardo and James F. Kurose}, title = {Identifying elephant flows through periodically sampled packets}, booktitle = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004}, pages = {115--120}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1028788.1028803}, doi = {10.1145/1028788.1028803}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/MoriUKPG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/MoriKNG04, author = {Tatsuya Mori and Ryoichi Kawahara and Shozo Naito and Shigeki Goto}, title = {On the Characteristics of Internet Traffic Variability: Spikes and Elephants}, booktitle = {2004 Symposium on Applications and the Internet {(SAINT} 2004), 26-30 January 2004, Tokyo, Japan}, pages = {99--106}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SAINT.2004.1266104}, doi = {10.1109/SAINT.2004.1266104}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/MoriKNG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-NI-0201004, author = {Tatsuya Mori and Ryoichi Kawahara and Shozo Naito}, title = {Analysis of Non-Gaussian Nature of Network Traffic}, journal = {CoRR}, volume = {cs.NI/0201004}, year = {2002}, url = {https://arxiv.org/abs/cs/0201004}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-NI-0201004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-NI-0209004, author = {Tatsuya Mori and Ryoichi Kawahara and Shozo Naito}, title = {Analysis of Non-Gaussian Nature of Network Traffic and its Implication on Network Performance}, journal = {CoRR}, volume = {cs.NI/0209004}, year = {2002}, url = {https://arxiv.org/abs/cs/0209004}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-NI-0209004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.