BibTeX records: Tatsuya Mori

download as .bib file

@article{DBLP:journals/access/KawaokaCWAM24,
  author       = {Ryo Kawaoka and
                  Daiki Chiba and
                  Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Longitudinal Measurement Study of the Domain Names Associated With
                  the Olympic Games},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {19128--19144},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3360108},
  doi          = {10.1109/ACCESS.2024.3360108},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KawaokaCWAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/HasegawaAYIM23,
  author       = {Ayako Akiyama Hasegawa and
                  Mitsuaki Akiyama and
                  Naomi Yamashita and
                  Daisuke Inoue and
                  Tatsuya Mori},
  title        = {Analysis of Non-Experts' Security- and Privacy-Related Questions on
                  a Q{\&}A Site},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {106},
  number       = {9},
  pages        = {1380--1396},
  year         = {2023},
  url          = {https://doi.org/10.1587/transinf.2022icp0006},
  doi          = {10.1587/TRANSINF.2022ICP0006},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/HasegawaAYIM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/NomotoWSAM23,
  author       = {Kazuki Nomoto and
                  Takuya Watanabe and
                  Eitaro Shioji and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Understanding the Inconsistencies in the Permissions Mechanism of
                  Web Browsers},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {620--642},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.620},
  doi          = {10.2197/IPSJJIP.31.620},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/NomotoWSAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/AsomuraIM23,
  author       = {Ichiro Asomura and
                  Ryo Iijima and
                  Tatsuya Mori},
  title        = {Automating the Detection of Fraudulent Activities in Online Banking
                  Service},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {643--653},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.643},
  doi          = {10.2197/IPSJJIP.31.643},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/AsomuraIM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/MoriNTKM23,
  author       = {Keika Mori and
                  Tatsuya Nagai and
                  Yuta Takata and
                  Masaki Kamizono and
                  Tatsuya Mori},
  title        = {Analysis of Privacy Compliance by Classifying Policies Before and
                  After the Japanese Law Revision},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {829--841},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.829},
  doi          = {10.2197/IPSJJIP.31.829},
  timestamp    = {Sun, 18 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/MoriNTKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurousec/SuzukiINOM23,
  author       = {Mei Suzuki and
                  Ryo Iijima and
                  Kazuki Nomoto and
                  Tetsushi Ohki and
                  Tatsuya Mori},
  title        = {PinchKey: {A} Natural and User-Friendly Approach to {VR} User Authentication},
  booktitle    = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC
                  2023, Copenhagen, Denmark, October 16-17, 2023},
  pages        = {192--204},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617072.3617122},
  doi          = {10.1145/3617072.3617122},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurousec/SuzukiINOM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MoriO23,
  author       = {Tatsuya Mori and
                  Tomoaki Ohtsuki},
  title        = {{HAPS} Trajectory Optimization Based on Throughput Heat Map},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {7291--7296},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437324},
  doi          = {10.1109/GLOBECOM54140.2023.10437324},
  timestamp    = {Sun, 10 Mar 2024 10:39:12 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/MoriO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc/MoriFHMAK23,
  author       = {Tatsuya Mori and
                  Daisuke Fujita and
                  Tomokazu Hayashi and
                  Takashi Mizobe and
                  Hideo Aihara and
                  Syoji Kobashi},
  title        = {Radiomics Based Prediction of Symptomatic Carotid Plaque in {MR} Images},
  booktitle    = {International Conference on Machine Learning and Cybernetics, {ICMLC}
                  2023, Adelaide, Australia, July 9-11, 2023},
  pages        = {315--320},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICMLC58545.2023.10327957},
  doi          = {10.1109/ICMLC58545.2023.10327957},
  timestamp    = {Mon, 11 Dec 2023 15:49:01 +0100},
  biburl       = {https://dblp.org/rec/conf/icmlc/MoriFHMAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Nomoto0SAM23,
  author       = {Kazuki Nomoto and
                  Takuya Watanabe and
                  Eitaro Shioji and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Browser Permission Mechanisms Demystified},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/browser-permission-mechanisms-demystified/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Nomoto0SAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/YajimaCYM23,
  author       = {Masanori Yajima and
                  Daiki Chiba and
                  Yoshiro Yoneya and
                  Tatsuya Mori},
  editor       = {Anna Brunstr{\"{o}}m and
                  Marcel Flores and
                  Marco Fiore},
  title        = {A First Look at Brand Indicators for Message Identification {(BIMI)}},
  booktitle    = {Passive and Active Measurement - 24th International Conference, {PAM}
                  2023, Virtual Event, March 21-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13882},
  pages        = {479--495},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-28486-1\_20},
  doi          = {10.1007/978-3-031-28486-1\_20},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/YajimaCYM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/MoriTIKM23,
  author       = {Keika Mori and
                  Yuta Takata and
                  Daiki Ito and
                  Masaki Kamizono and
                  Tatsuya Mori},
  editor       = {Bart P. Knijnenburg and
                  Panos Papadimitratos},
  title        = {Impact Analysis of Organizational Structure of Group Companies on
                  Privacy Policies},
  booktitle    = {Proceedings of the 22nd Workshop on Privacy in the Electronic Society,
                  {WPES} 2023, Copenhagen, Denmark, 26 November 2023},
  pages        = {159--165},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603216.3624954},
  doi          = {10.1145/3603216.3624954},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/MoriTIKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XieYM22,
  author       = {Tianying Xie and
                  Hayato Yamana and
                  Tatsuya Mori},
  title        = {{CHE:} Channel-Wise Homomorphic Encryption for Ciphertext Inference
                  in Convolutional Neural Network},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {107446--107458},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3210134},
  doi          = {10.1109/ACCESS.2022.3210134},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XieYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HasegawaYAM22,
  author       = {Ayako Akiyama Hasegawa and
                  Naomi Yamashita and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Experiences, Behavioral Tendencies, and Concerns of Non-Native English
                  Speakers in Identifying Phishing Emails},
  journal      = {J. Inf. Process.},
  volume       = {30},
  pages        = {841--858},
  year         = {2022},
  url          = {https://doi.org/10.2197/ipsjjip.30.841},
  doi          = {10.2197/IPSJJIP.30.841},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/HasegawaYAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/NomotoAEIM22,
  author       = {Kazuki Nomoto and
                  Mitsuaki Akiyama and
                  Masashi Eto and
                  Atsuo Inomata and
                  Tatsuya Mori},
  title        = {On the Feasibility of Linking Attack to Google/Apple Exposure Notification
                  Framework},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {4},
  pages        = {140--161},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0103},
  doi          = {10.56553/POPETS-2022-0103},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/NomotoAEIM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biotc/SakoMM22,
  author       = {Kentaro Sako and
                  Shin'ichiro Matsuo and
                  Tatsuya Mori},
  title        = {Distributed Random Number Generation Method on Smart Contracts},
  booktitle    = {4th Blockchain and Internet of Things Conference, {BIOTC} 2022, Tokyo,
                  Japan, July 8-10, 2022},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3559795.3559796},
  doi          = {10.1145/3559795.3559796},
  timestamp    = {Wed, 15 Nov 2023 16:53:04 +0100},
  biburl       = {https://dblp.org/rec/conf/biotc/SakoMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/IijimaTM22,
  author       = {Ryo Iijima and
                  Tatsuya Takehisa and
                  Tatsuya Mori},
  editor       = {Luca Sterpone and
                  Andrea Bartolini and
                  Anastasiia Butko},
  title        = {Cyber-physical firewall: monitoring and controlling the threats caused
                  by malicious analog signals},
  booktitle    = {{CF} '22: 19th {ACM} International Conference on Computing Frontiers,
                  Turin, Italy, May 17 - 22, 2022},
  pages        = {296--304},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3528416.3530997},
  doi          = {10.1145/3528416.3530997},
  timestamp    = {Thu, 05 May 2022 15:51:05 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/IijimaTM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NatatsukaI0ASM22,
  author       = {Atsuko Natatsuka and
                  Ryo Iijima and
                  Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tetsuya Sakai and
                  Tatsuya Mori},
  title        = {Understanding the Behavior Transparency of Voice Assistant Applications
                  Using the ChatterBox Framework},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {143--159},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545970},
  doi          = {10.1145/3545948.3545970},
  timestamp    = {Thu, 20 Oct 2022 10:46:43 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NatatsukaI0ASM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HasegawaYMIA22,
  author       = {Ayako Akiyama Hasegawa and
                  Naomi Yamashita and
                  Tatsuya Mori and
                  Daisuke Inoue and
                  Mitsuaki Akiyama},
  editor       = {Sonia Chiasson and
                  Apu Kapadia},
  title        = {Understanding Non-Experts' Security- and Privacy-Related Questions
                  on a Q{\&}A Site},
  booktitle    = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022,
                  Boston, MA, USA, August 7-9, 2022},
  pages        = {39--56},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/soups2022/presentation/hasegawa},
  timestamp    = {Wed, 26 Oct 2022 12:44:43 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/HasegawaYMIA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsi-dat/YanoIYNMKTA22,
  author       = {Yuji Yano and
                  Hisashi Iwamoto and
                  Takuma Yoshimura and
                  Yoshihiro Nishida and
                  Tatsuya Mori and
                  Kiyotaka Komoku and
                  Hidekuni Takao and
                  Kazutami Arimoto},
  title        = {28-m {W} Fully Embedded {AI} Techniques with On-site Learning for
                  Low-Power Handy Tactile Sensing System},
  booktitle    = {2022 International Symposium on {VLSI} Design, Automation and Test,
                  {VLSI-DAT} 2022, Hsinchu, Taiwan, April 18-21, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VLSI-DAT54769.2022.9768071},
  doi          = {10.1109/VLSI-DAT54769.2022.9768071},
  timestamp    = {Mon, 23 May 2022 16:36:24 +0200},
  biburl       = {https://dblp.org/rec/conf/vlsi-dat/YanoIYNMKTA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ChangHLM22,
  author       = {Chun{-}Ming Chang and
                  Hsu{-}Chun Hsiao and
                  Timothy M. Lynar and
                  Tatsuya Mori},
  editor       = {Fr{\'{e}}d{\'{e}}rique Laforest and
                  Rapha{\"{e}}l Troncy and
                  Elena Simperl and
                  Deepak Agarwal and
                  Aristides Gionis and
                  Ivan Herman and
                  Lionel M{\'{e}}dini},
  title        = {Know Your Victim: Tor Browser Setting Identification via Network Traffic
                  Analysis},
  booktitle    = {Companion of The Web Conference 2022, Virtual Event / Lyon, France,
                  April 25 - 29, 2022},
  pages        = {201--204},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3487553.3524244},
  doi          = {10.1145/3487553.3524244},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/ChangHLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SakuraiWOAM21,
  author       = {Yuji Sakurai and
                  Takuya Watanabe and
                  Tetsuya Okuda and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Identifying the Phishing Websites Using the Patterns of {TLS} Certificates},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {2},
  pages        = {451--486},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1026},
  doi          = {10.13052/JCSM2245-1439.1026},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SakuraiWOAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/IijimaMZTTOM21,
  author       = {Ryo Iijima and
                  Shota Minami and
                  Yunao Zhou and
                  Tatsuya Takehisa and
                  Takeshi Takahashi and
                  Yasuhiro Oikawa and
                  Tatsuya Mori},
  title        = {Audio Hotspot Attack: An Attack on Voice Assistance Systems Using
                  Directional Sound Beams and its Feasibility},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {2004--2018},
  year         = {2021},
  url          = {https://doi.org/10.1109/TETC.2019.2953041},
  doi          = {10.1109/TETC.2019.2953041},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/IijimaMZTTOM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurousec/MatsuuraHAM21,
  author       = {Tenga Matsuura and
                  Ayako Akiyama Hasegawa and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Careless Participants Are Essential for Our Phishing Study: Understanding
                  the Impact of Screening Methods},
  booktitle    = {EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe,
                  Germany, October 11 - 12, 2021},
  pages        = {36--47},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3481357.3481515},
  doi          = {10.1145/3481357.3481515},
  timestamp    = {Tue, 14 Dec 2021 14:30:59 +0100},
  biburl       = {https://dblp.org/rec/conf/eurousec/MatsuuraHAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/Yajima0YM21,
  author       = {Masanori Yajima and
                  Daiki Chiba and
                  Yoshiro Yoneya and
                  Tatsuya Mori},
  title        = {Measuring Adoption of {DNS} Security Mechanisms with Cross-Sectional
                  Approach},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2021, Madrid,
                  Spain, December 7-11, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/GLOBECOM46510.2021.9685960},
  doi          = {10.1109/GLOBECOM46510.2021.9685960},
  timestamp    = {Mon, 07 Feb 2022 09:24:07 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/Yajima0YM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/KawaokaCWAM21,
  author       = {Ryo Kawaoka and
                  Daiki Chiba and
                  Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  editor       = {Oliver Hohlfeld and
                  Andra Lutu and
                  Dave Levin},
  title        = {A First Look at {COVID-19} Domain Names: Origin and Implications},
  booktitle    = {Passive and Active Measurement - 22nd International Conference, {PAM}
                  2021, Virtual Event, March 29 - April 1, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12671},
  pages        = {39--53},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-72582-2\_3},
  doi          = {10.1007/978-3-030-72582-2\_3},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/KawaokaCWAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HasegawaYAM21,
  author       = {Ayako Akiyama Hasegawa and
                  Naomi Yamashita and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  editor       = {Sonia Chiasson},
  title        = {Why They Ignore English Emails: The Challenges of Non-Native Speakers
                  in Identifying Phishing Emails},
  booktitle    = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021,
                  August 8-10, 2021},
  pages        = {319--338},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/soups2021/presentation/hasegawa},
  timestamp    = {Wed, 09 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/HasegawaYAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-05290,
  author       = {Ryo Kawaoka and
                  Daiki Chiba and
                  Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {A First Look at {COVID-19} Domain Names: Origin and Implications},
  journal      = {CoRR},
  volume       = {abs/2102.05290},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.05290},
  eprinttype    = {arXiv},
  eprint       = {2102.05290},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-05290.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-08972,
  author       = {Taiga Ono and
                  Takeshi Sugawara and
                  Jun Sakuma and
                  Tatsuya Mori},
  title        = {Application of Adversarial Examples to Physical {ECG} Signals},
  journal      = {CoRR},
  volume       = {abs/2108.08972},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.08972},
  eprinttype    = {arXiv},
  eprint       = {2108.08972},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-08972.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WatanabeSASYM20,
  author       = {Takuya Watanabe and
                  Eitaro Shioji and
                  Mitsuaki Akiyama and
                  Keito Sasaoka and
                  Takeshi Yagi and
                  Tatsuya Mori},
  title        = {Follow Your Silhouette: Identifying the Social Account of Website
                  Visitors through User-Blocking Side Channel},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {2},
  pages        = {239--255},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-d\_2\_239},
  doi          = {10.1587/TRANSINF.2019INP0012},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/WatanabeSASYM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HatadaM20,
  author       = {Mitsuhiro Hatada and
                  Tatsuya Mori},
  title        = {{CLAP:} Classification of Android PUAs by Similarity of {DNS} Queries},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {2},
  pages        = {265--275},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-d\_2\_265},
  doi          = {10.1587/TRANSINF.2019INP0003},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/HatadaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WatanabeAKSTSIS20,
  author       = {Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Fumihiro Kanei and
                  Eitaro Shioji and
                  Yuta Takata and
                  Bo Sun and
                  Yuta Ishii and
                  Toshiki Shibahara and
                  Takeshi Yagi and
                  Tatsuya Mori},
  title        = {Study on the Vulnerabilities of Free and Paid Mobile Apps Associated
                  with Software Library},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {2},
  pages        = {276--291},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-d\_2\_276},
  doi          = {10.1587/TRANSINF.2019INP0011},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/WatanabeAKSTSIS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/MoriWZHAM20,
  author       = {Keika Mori and
                  Takuya Watanabe and
                  Yunao Zhou and
                  Ayako Akiyama Hasegawa and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Comparative Analysis of Three Language Spheres: Are Linguistic and
                  Cultural Differences Reflected in Password Selection Habits?},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {7},
  pages        = {1541--1555},
  year         = {2020},
  url          = {https://doi.org/10.1587/transinf.2019ICP0009},
  doi          = {10.1587/TRANSINF.2019ICP0009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/MoriWZHAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HasegawaWSAM20,
  author       = {Ayako Akiyama Hasegawa and
                  Takuya Watanabe and
                  Eitaro Shioji and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Addressing the Privacy Threat to Identify Existence of a Target's
                  Account on Sensitive Services},
  journal      = {J. Inf. Process.},
  volume       = {28},
  pages        = {1030--1046},
  year         = {2020},
  url          = {https://doi.org/10.2197/ipsjjip.28.1030},
  doi          = {10.2197/IPSJJIP.28.1030},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/HasegawaWSAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/Sakurai0OAM20,
  author       = {Yuji Sakurai and
                  Takuya Watanabe and
                  Tetsuya Okuda and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Discovering HTTPSified Phishing Websites Using the {TLS} Certificates
                  Footprints},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {522--531},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00077},
  doi          = {10.1109/EUROSPW51379.2020.00077},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/Sakurai0OAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/0001SAM20,
  author       = {Takuya Watanabe and
                  Eitaro Shioji and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Melting Pot of Origins: Compromising the Intermediary Web Services
                  that Rehost Websites},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/melting-pot-of-origins-compromising-the-intermediary-web-services-that-rehost-websites/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/0001SAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isrl/Sun0ZM20,
  author       = {Bo Sun and
                  Takeshi Takahashi and
                  Lei Zhu and
                  Tatsuya Mori},
  editor       = {Leslie F. Sikos and
                  Kim{-}Kwang Raymond Choo},
  title        = {Discovering Malicious URLs Using Machine Learning Techniques},
  booktitle    = {Data Science in Cybersecurity and Cyberthreat Intelligence},
  series       = {Intelligent Systems Reference Library},
  volume       = {177},
  pages        = {33--60},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38788-4\_3},
  doi          = {10.1007/978-3-030-38788-4\_3},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isrl/Sun0ZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/YoshidaISMK19,
  author       = {Kanae Yoshida and
                  Hironori Imai and
                  Nana Serizawa and
                  Tatsuya Mori and
                  Akira Kanaoka},
  title        = {Understanding the Origins of Weak Cryptographic Algorithms Used for
                  Signing Android Apps},
  journal      = {J. Inf. Process.},
  volume       = {27},
  pages        = {593--602},
  year         = {2019},
  url          = {https://doi.org/10.2197/ipsjjip.27.593},
  doi          = {10.2197/IPSJJIP.27.593},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/YoshidaISMK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KurogomeOKIHMS19,
  author       = {Yuma Kurogome and
                  Yuto Otsuki and
                  Yuhei Kawakoya and
                  Makoto Iwamura and
                  Syogo Hayashi and
                  Tatsuya Mori and
                  Koushik Sen},
  editor       = {David Balenson},
  title        = {{EIGER:} automated {IOC} generation for accurate and interpretable
                  endpoint malware detection},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {687--701},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359808},
  doi          = {10.1145/3359789.3359808},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KurogomeOKIHMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NatatsukaI0ASM19,
  author       = {Atsuko Natatsuka and
                  Ryo Iijima and
                  Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tetsuya Sakai and
                  Tatsuya Mori},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Poster: {A} First Look at the Privacy Risks of Voice Assistant Apps},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2633--2635},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363274},
  doi          = {10.1145/3319535.3363274},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NatatsukaI0ASM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Yasumatsu0KSAM19,
  author       = {Tatsuhiko Yasumatsu and
                  Takuya Watanabe and
                  Fumihiro Kanei and
                  Eitaro Shioji and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Understanding the Responsiveness of Mobile App Developers to Software
                  Library Updates},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300020},
  doi          = {10.1145/3292006.3300020},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Yasumatsu0KSAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/Mori0ZHAM19,
  author       = {Keika Mori and
                  Takuya Watanabe and
                  Yunao Zhou and
                  Ayako Akiyama Hasegawa and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Comparative Analysis of Three Language Spheres: Are Linguistic and
                  Cultural Differences Reflected in Password Selection Habits?},
  booktitle    = {2019 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {159--171},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSPW.2019.00025},
  doi          = {10.1109/EUROSPW.2019.00025},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/Mori0ZHAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/Suzuki0YMG19,
  author       = {Hiroaki Suzuki and
                  Daiki Chiba and
                  Yoshiro Yoneya and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {ShamFinder: An Automated Framework for Detecting {IDN} Homographs},
  booktitle    = {Proceedings of the Internet Measurement Conference, {IMC} 2019, Amsterdam,
                  The Netherlands, October 21-23, 2019},
  pages        = {449--462},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3355369.3355587},
  doi          = {10.1145/3355369.3355587},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/Suzuki0YMG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HiraokaIMOT19,
  author       = {Takuya Hiraoka and
                  Takahisa Imagawa and
                  Tatsuya Mori and
                  Takashi Onishi and
                  Yoshimasa Tsuruoka},
  editor       = {Hanna M. Wallach and
                  Hugo Larochelle and
                  Alina Beygelzimer and
                  Florence d'Alch{\'{e}}{-}Buc and
                  Emily B. Fox and
                  Roman Garnett},
  title        = {Learning Robust Options by Conditional Value at Risk Optimization},
  booktitle    = {Advances in Neural Information Processing Systems 32: Annual Conference
                  on Neural Information Processing Systems 2019, NeurIPS 2019, December
                  8-14, 2019, Vancouver, BC, Canada},
  pages        = {2615--2625},
  year         = {2019},
  url          = {https://proceedings.neurips.cc/paper/2019/hash/49b8b4f95f02e055801da3b4f58e28b7-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/HiraokaIMOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MaruyamaWM19,
  author       = {Seita Maruyama and
                  Satohiro Wakabayashi and
                  Tatsuya Mori},
  title        = {Tap 'n Ghost: {A} Compilation of Novel Attack Techniques against Smartphone
                  Touchscreens},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {620--637},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00037},
  doi          = {10.1109/SP.2019.00037},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MaruyamaWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-09191,
  author       = {Takuya Hiraoka and
                  Takahisa Imagawa and
                  Tatsuya Mori and
                  Takashi Onishi and
                  Yoshimasa Tsuruoka},
  title        = {Learning Robust Options by Conditional Value at Risk Optimization},
  journal      = {CoRR},
  volume       = {abs/1905.09191},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.09191},
  eprinttype    = {arXiv},
  eprint       = {1905.09191},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-09191.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-07539,
  author       = {Hiroaki Suzuki and
                  Daiki Chiba and
                  Yoshiro Yoneya and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {ShamFinder: An Automated Framework for Detecting {IDN} Homographs},
  journal      = {CoRR},
  volume       = {abs/1909.07539},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.07539},
  eprinttype    = {arXiv},
  eprint       = {1909.07539},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-07539.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChibaAYHMG18,
  author       = {Daiki Chiba and
                  Mitsuaki Akiyama and
                  Takeshi Yagi and
                  Kunio Hato and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {DomainChroma: Building actionable threat intelligence from malicious
                  domain names},
  journal      = {Comput. Secur.},
  volume       = {77},
  pages        = {138--161},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.03.013},
  doi          = {10.1016/J.COSE.2018.03.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChibaAYHMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MizunoHMG18,
  author       = {Sho Mizuno and
                  Mitsuhiro Hatada and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {Detecting Malware-Infected Devices Using the {HTTP} Header Patterns},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {5},
  pages        = {1370--1379},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2017EDP7294},
  doi          = {10.1587/TRANSINF.2017EDP7294},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MizunoHMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WatanabeASWM18,
  author       = {Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tetsuya Sakai and
                  Hironori Washizaki and
                  Tatsuya Mori},
  title        = {Understanding the Inconsistency between Behaviors and Descriptions
                  of Mobile Apps},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {11},
  pages        = {2584--2599},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2017ICP0006},
  doi          = {10.1587/TRANSINF.2017ICP0006},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WatanabeASWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SunFMBTI18,
  author       = {Bo Sun and
                  Akinori Fujino and
                  Tatsuya Mori and
                  Tao Ban and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Automatically Generating Malware Analysis Reports Using Sandbox Logs},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {11},
  pages        = {2622--2632},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2017ICP0011},
  doi          = {10.1587/TRANSINF.2017ICP0011},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SunFMBTI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/0001YASMG18,
  author       = {Daiki Chiba and
                  Takeshi Yagi and
                  Mitsuaki Akiyama and
                  Toshiki Shibahara and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {DomainProfiler: toward accurate and early discovery of domain names
                  abused in future},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {6},
  pages        = {661--680},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0396-7},
  doi          = {10.1007/S10207-017-0396-7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/0001YASMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/SunLAWM18,
  author       = {Bo Sun and
                  Xiapu Luo and
                  Mitsuaki Akiyama and
                  Takuya Watanabe and
                  Tatsuya Mori},
  title        = {PADetective: {A} Systematic Approach to Automate Detection of Promotional
                  Attackers in Mobile App Store},
  journal      = {J. Inf. Process.},
  volume       = {26},
  pages        = {212--223},
  year         = {2018},
  url          = {https://doi.org/10.2197/ipsjjip.26.212},
  doi          = {10.2197/IPSJJIP.26.212},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/SunLAWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Pariwono0AM18,
  author       = {Elkana Pariwono and
                  Daiki Chiba and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Don't throw me away: Threats Caused by the Abandoned Internet Resources
                  Used by Android Apps},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {147--158},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196554},
  doi          = {10.1145/3196494.3196554},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Pariwono0AM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IijimaMYT0OM18,
  author       = {Ryo Iijima and
                  Shota Minami and
                  Yunao Zhou and
                  Tatsuya Takehisa and
                  Takeshi Takahashi and
                  Yasuhiro Oikawa and
                  Tatsuya Mori},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Audio Hotspot Attack: An Attack on Voice Assistance Systems Using
                  Directional Sound Beams},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2222--2224},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3278497},
  doi          = {10.1145/3243734.3278497},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/IijimaMYT0OM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YoshidaISMK18,
  author       = {Kanae Yoshida and
                  Hironori Imai and
                  Nana Serizawa and
                  Tatsuya Mori and
                  Akira Kanaoka},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {Understanding the Origins of Weak Cryptographic Algorithms Used for
                  Signing Android Apps},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
  pages        = {713--718},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.10324},
  doi          = {10.1109/COMPSAC.2018.10324},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/YoshidaISMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JuutiSMA18,
  author       = {Mika Juuti and
                  Bo Sun and
                  Tatsuya Mori and
                  N. Asokan},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {132--151},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_7},
  doi          = {10.1007/978-3-319-99073-6\_7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JuutiSMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/WatanabeSASYM18,
  author       = {Takuya Watanabe and
                  Eitaro Shioji and
                  Mitsuaki Akiyama and
                  Keito Sasaoka and
                  Takeshi Yagi and
                  Tatsuya Mori},
  title        = {User Blocking Considered Harmful? An Attacker-Controllable Side Channel
                  to Identify Social Accounts},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {323--337},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00030},
  doi          = {10.1109/EUROSP.2018.00030},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/WatanabeSASYM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/WakabayashiMMGK18,
  author       = {Satohiro Wakabayashi and
                  Seita Maruyama and
                  Tatsuya Mori and
                  Shigeki Goto and
                  Masahiro Kinugawa and
                  Yu{-}ichi Hayashi},
  editor       = {Christian Rossow and
                  Yves Younan},
  title        = {A Feasibility Study of Radio-frequency Retroreflector Attack},
  booktitle    = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore,
                  MD, USA, August 13-14, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/woot18/presentation/wakabayashi},
  timestamp    = {Mon, 01 Feb 2021 08:41:54 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/WakabayashiMMGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-02400,
  author       = {Mika Juuti and
                  Bo Sun and
                  Tatsuya Mori and
                  N. Asokan},
  title        = {Stay On-Topic: Generating Context-specific Fake Restaurant Reviews},
  journal      = {CoRR},
  volume       = {abs/1805.02400},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.02400},
  eprinttype    = {arXiv},
  eprint       = {1805.02400},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-02400.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-05085,
  author       = {Takuya Watanabe and
                  Eitaro Shioji and
                  Mitsuaki Akiyama and
                  Keito Sasaoka and
                  Takeshi Yagi and
                  Tatsuya Mori},
  title        = {User Blocking Considered Harmful? An Attacker-controllable Side Channel
                  to Identify Social Accounts},
  journal      = {CoRR},
  volume       = {abs/1805.05085},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.05085},
  eprinttype    = {arXiv},
  eprint       = {1805.05085},
  timestamp    = {Thu, 13 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-05085.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AkiyamaYYMK17,
  author       = {Mitsuaki Akiyama and
                  Takeshi Yagi and
                  Takeshi Yada and
                  Tatsuya Mori and
                  Youki Kadobayashi},
  title        = {Analyzing the ecosystem of malicious {URL} redirection through longitudinal
                  observation from honeypots},
  journal      = {Comput. Secur.},
  volume       = {69},
  pages        = {155--173},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.01.003},
  doi          = {10.1016/J.COSE.2017.01.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AkiyamaYYMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HagaTAM17,
  author       = {Yumehisa Haga and
                  Yuta Takata and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Building a Scalable Web Tracking Detection System: Implementation
                  and the Empirical Study},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {8},
  pages        = {1663--1670},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016ICP0020},
  doi          = {10.1587/TRANSINF.2016ICP0020},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HagaTAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WatanabeAM17,
  author       = {Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Tracking the Human Mobility Using Mobile Device Sensors},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {8},
  pages        = {1680--1690},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016ICP0022},
  doi          = {10.1587/TRANSINF.2016ICP0022},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WatanabeAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HatadaM17,
  author       = {Mitsuhiro Hatada and
                  Tatsuya Mori},
  title        = {Finding New Varieties of Malware with the Classification of Network
                  Behavior},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {8},
  pages        = {1691--1702},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016ICP0019},
  doi          = {10.1587/TRANSINF.2016ICP0019},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HatadaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IshiiWAM17,
  author       = {Yuta Ishii and
                  Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {APPraiser: {A} Large Scale Analysis of Android Clone Apps},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {8},
  pages        = {1703--1713},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016ICP0012},
  doi          = {10.1587/TRANSINF.2016ICP0012},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IshiiWAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimuraIMSTNWSS17,
  author       = {Tatsuaki Kimura and
                  Keisuke Ishibashi and
                  Tatsuya Mori and
                  Hiroshi Sawada and
                  Tsuyoshi Toyono and
                  Ken Nishimatsu and
                  Akio Watanabe and
                  Akihiro Shimoda and
                  Kohei Shiomoto},
  title        = {Network Event Extraction from Log Data with Nonnegative Tensor Factorization},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {100-B},
  number       = {10},
  pages        = {1865--1878},
  year         = {2017},
  url          = {https://doi.org/10.1587/transcom.2016EBP3430},
  doi          = {10.1587/TRANSCOM.2016EBP3430},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimuraIMSTNWSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/SunLAWM17,
  author       = {Bo Sun and
                  Xiapu Luo and
                  Mitsuaki Akiyama and
                  Takuya Watanabe and
                  Tatsuya Mori},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Characterizing Promotional Attacks in Mobile App Store},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_10},
  doi          = {10.1007/978-981-10-5421-1\_10},
  timestamp    = {Mon, 26 Jun 2023 20:45:03 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/SunLAWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaruyamaWM17,
  author       = {Seita Maruyama and
                  Satohiro Wakabayashi and
                  Tatsuya Mori},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{POSTER:} {TOUCHFLOOD:} {A} Novel Class of Attacks against Capacitive
                  Touchscreens},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2551--2553},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3138829},
  doi          = {10.1145/3133956.3138829},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MaruyamaWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WakabayashiMMGK17,
  author       = {Satohiro Wakabayashi and
                  Seita Maruyama and
                  Tatsuya Mori and
                  Shigeki Goto and
                  Masahiro Kinugawa and
                  Yu{-}ichi Hayashi},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{POSTER:} Is Active Electromagnetic Side-channel Attack Practical?},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2587--2589},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3138830},
  doi          = {10.1145/3133956.3138830},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WakabayashiMMGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HatadaM17,
  author       = {Mitsuhiro Hatada and
                  Tatsuya Mori},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {Detecting and Classifying Android PUAs by Similarity of {DNS} queries},
  booktitle    = {41st {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 2},
  pages        = {590--595},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMPSAC.2017.103},
  doi          = {10.1109/COMPSAC.2017.103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/HatadaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ChibaAYYMG17,
  author       = {Daiki Chiba and
                  Mitsuaki Akiyama and
                  Takeshi Yagi and
                  Takeshi Yada and
                  Tatsuya Mori and
                  Shigeki Goto},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {DomainChroma: Providing Optimal Countermeasures against Malicious
                  Domain Names},
  booktitle    = {41st {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 1},
  pages        = {643--648},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMPSAC.2017.112},
  doi          = {10.1109/COMPSAC.2017.112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ChibaAYYMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/HottaMUMYI17,
  author       = {Shinji Hotta and
                  Tatsuya Mori and
                  Daisuke Uchida and
                  Kazuho Maeda and
                  Yoshinori Yaginuma and
                  Akihiro Inomata},
  editor       = {Seungyon Claire Lee and
                  Leila Takayama and
                  Khai N. Truong},
  title        = {Eating moment recognition using heart rate responses},
  booktitle    = {Adjunct Proceedings of the 2017 {ACM} International Joint Conference
                  on Pervasive and Ubiquitous Computing and Proceedings of the 2017
                  {ACM} International Symposium on Wearable Computers, UbiComp/ISWC
                  2017, Maui, HI, USA, September 11-15, 2017},
  pages        = {69--72},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3123024.3123093},
  doi          = {10.1145/3123024.3123093},
  timestamp    = {Tue, 06 Nov 2018 16:58:39 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/HottaMUMYI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MizunoHMG17,
  author       = {Sho Mizuno and
                  Mitsuhiro Hatada and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {BotDetector: {A} robust and scalable approach toward detecting malware-infected
                  devices},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7997372},
  doi          = {10.1109/ICC.2017.7997372},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MizunoHMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msr/WatanabeAKSTSIS17,
  author       = {Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Fumihiro Kanei and
                  Eitaro Shioji and
                  Yuta Takata and
                  Bo Sun and
                  Yuta Ishii and
                  Toshiki Shibahara and
                  Takeshi Yagi and
                  Tatsuya Mori},
  editor       = {Jes{\'{u}}s M. Gonz{\'{a}}lez{-}Barahona and
                  Abram Hindle and
                  Lin Tan},
  title        = {Understanding the origins of mobile app vulnerabilities: a large-scale
                  measurement study of free and paid apps},
  booktitle    = {Proceedings of the 14th International Conference on Mining Software
                  Repositories, {MSR} 2017, Buenos Aires, Argentina, May 20-28, 2017},
  pages        = {14--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSR.2017.23},
  doi          = {10.1109/MSR.2017.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msr/WatanabeAKSTSIS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/IshiiWKTSAYSM17,
  author       = {Yuta Ishii and
                  Takuya Watanabe and
                  Fumihiro Kanei and
                  Yuta Takata and
                  Eitaro Shioji and
                  Mitsuaki Akiyama and
                  Takeshi Yagi and
                  Bo Sun and
                  Tatsuya Mori},
  editor       = {Federica Sarro and
                  Emad Shihab and
                  Meiyappan Nagappan and
                  Marie Christin Platenius and
                  Daniel Kaimann},
  title        = {Understanding the security management of global third-party Android
                  marketplaces},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGSOFT} International Workshop on App
                  Market Analytics, WAMA@ESEC/SIGSOFT {FSE} 2017, Paderborn, Germany,
                  September 5, 2017},
  pages        = {12--18},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3121264.3121267},
  doi          = {10.1145/3121264.3121267},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/IshiiWKTSAYSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WatanabeAKSTSIS17,
  author       = {Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Fumihiro Kanei and
                  Eitaro Shioji and
                  Yuta Takata and
                  Bo Sun and
                  Yuta Ishii and
                  Toshiki Shibahara and
                  Takeshi Yagi and
                  Tatsuya Mori},
  title        = {A Study on the Vulnerabilities of Mobiles Apps associated with Software
                  Modules},
  journal      = {CoRR},
  volume       = {abs/1702.03112},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.03112},
  eprinttype    = {arXiv},
  eprint       = {1702.03112},
  timestamp    = {Thu, 13 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/WatanabeAKSTSIS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MaruyamaWM17,
  author       = {Seita Maruyama and
                  Satohiro Wakabayashi and
                  Tatsuya Mori},
  title        = {Trojan of Things: Embedding Malicious {NFC} Tags into Common Objects},
  journal      = {CoRR},
  volume       = {abs/1702.07124},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.07124},
  eprinttype    = {arXiv},
  eprint       = {1702.07124},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MaruyamaWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/MoriISSHIG16,
  author       = {Tatsuya Mori and
                  Takeru Inoue and
                  Akihiro Shimoda and
                  Kazumichi Sato and
                  Shigeaki Harada and
                  Keisuke Ishibashi and
                  Shigeki Goto},
  title        = {Statistical estimation of the names of {HTTPS} servers with domain
                  name graphs},
  journal      = {Comput. Commun.},
  volume       = {94},
  pages        = {104--113},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comcom.2016.01.013},
  doi          = {10.1016/J.COMCOM.2016.01.013},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/MoriISSHIG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SunAYHM16,
  author       = {Bo Sun and
                  Mitsuaki Akiyama and
                  Takeshi Yagi and
                  Mitsuhiro Hatada and
                  Tatsuya Mori},
  title        = {Automating {URL} Blacklist Generation with Similarity Search Approach},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {4},
  pages        = {873--882},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015ICP0027},
  doi          = {10.1587/TRANSINF.2015ICP0027},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SunAYHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/MoriUSONMYI16,
  author       = {Tatsuya Mori and
                  Daisuke Uchida and
                  Masato Sakata and
                  Takuro Oya and
                  Yasuyuki Nakata and
                  Kazuho Maeda and
                  Yoshinori Yaginuma and
                  Akihiro Inomata},
  editor       = {James P. Gilbert and
                  Haim Azhari and
                  Hesham H. Ali and
                  Carla Quint{\~{a}}o and
                  Jan Sliwa and
                  Carolina Ruiz and
                  Ana L. N. Fred and
                  Hugo Gamboa},
  title        = {Continuous Real-time Heart Rate Monitoring from Face Images},
  booktitle    = {Proceedings of the 9th International Joint Conference on Biomedical
                  Engineering Systems and Technologies {(BIOSTEC} 2016) - Volume 4:
                  BIOSIGNALS, Rome, Italy, February 21-23, 2016},
  pages        = {52--56},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005682400520056},
  doi          = {10.5220/0005682400520056},
  timestamp    = {Sat, 21 Sep 2019 10:38:11 +0200},
  biburl       = {https://dblp.org/rec/conf/biostec/MoriUSONMYI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/UchidaMSONMYI16,
  author       = {Daisuke Uchida and
                  Tatsuya Mori and
                  Masato Sakata and
                  Takuro Oya and
                  Yasuyuki Nakata and
                  Kazuho Maeda and
                  Yoshinori Yaginuma and
                  Akihiro Inomata},
  editor       = {Ana L. N. Fred and
                  Hugo Gamboa},
  title        = {Continuous Real-Time Measurement Method for Heart Rate Monitoring
                  Using Face Images},
  booktitle    = {Biomedical Engineering Systems and Technologies - 9th International
                  Joint Conference, {BIOSTEC} 2016, Rome, Italy, February 21-23, 2016,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {690},
  pages        = {224--235},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54717-6\_13},
  doi          = {10.1007/978-3-319-54717-6\_13},
  timestamp    = {Wed, 25 Sep 2019 18:03:44 +0200},
  biburl       = {https://dblp.org/rec/conf/biostec/UchidaMSONMYI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunFM16,
  author       = {Bo Sun and
                  Akinori Fujino and
                  Tatsuya Mori},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{POSTER:} Toward Automating the Generation of Malware Analysis Reports
                  Using the Sandbox Logs},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1814--1816},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2989064},
  doi          = {10.1145/2976749.2989064},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SunFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/IshiiWAM16,
  author       = {Yuta Ishii and
                  Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  editor       = {Rakesh M. Verma and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Clone or Relative?: Understanding the Origins of Similar Android Apps},
  booktitle    = {Proceedings of the 2016 {ACM} on International Workshop on Security
                  And Privacy Analytics, IWSPA@CODASPY 2016, New Orleans, LA, USA, March
                  11, 2016},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2875475.2875480},
  doi          = {10.1145/2875475.2875480},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/IshiiWAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ChibaYASYMG16,
  author       = {Daiki Chiba and
                  Takeshi Yagi and
                  Mitsuaki Akiyama and
                  Toshiki Shibahara and
                  Takeshi Yada and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {DomainProfiler: Discovering Domain Names Abused in Future},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016},
  pages        = {491--502},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN.2016.51},
  doi          = {10.1109/DSN.2016.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ChibaYASYMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/TianMO16,
  author       = {Guifen Tian and
                  Tatsuya Mori and
                  Yuji Okuda},
  title        = {Spoofing detection for embedded face recognition system using a low
                  cost stereo camera},
  booktitle    = {23rd International Conference on Pattern Recognition, {ICPR} 2016,
                  Canc{\'{u}}n, Mexico, December 4-8, 2016},
  pages        = {1017--1022},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICPR.2016.7899769},
  doi          = {10.1109/ICPR.2016.7899769},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icpr/TianMO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/FujinoMM15,
  author       = {Akinori Fujino and
                  Junichi Murakami and
                  Tatsuya Mori},
  title        = {Discovering similar malware samples using {API} call topics},
  booktitle    = {12th Annual {IEEE} Consumer Communications and Networking Conference,
                  {CCNC} 2015, Las Vegas, NV, USA, January 9-12, 2015},
  pages        = {140--147},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CCNC.2015.7157960},
  doi          = {10.1109/CCNC.2015.7157960},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/FujinoMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HagaSMG15,
  author       = {Yumehisa Haga and
                  Akira Saso and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {Increasing the Darkness of Darknet Traffic},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7416973},
  doi          = {10.1109/GLOCOM.2014.7416973},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HagaSMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ShimodaISTISTTM15,
  author       = {Akihiro Shimoda and
                  Keisuke Ishibashi and
                  Kazumichi Sato and
                  Masayuki Tsujino and
                  Takeru Inoue and
                  Masaki Shimura and
                  Takanori Takebe and
                  Kazuki Takahashi and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {Inferring Popularity of Domain Names with {DNS} Traffic: Exploiting
                  Cache Timeout Heuristics},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7417638},
  doi          = {10.1109/GLOCOM.2014.7417638},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ShimodaISTISTTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/SunAYHM15,
  author       = {Bo Sun and
                  Mitsuaki Akiyama and
                  Takeshi Yagi and
                  Mitsuhiro Hatada and
                  Tatsuya Mori},
  title        = {AutoBLG: Automatic {URL} blacklist generator using search space expansion
                  and filters},
  booktitle    = {2015 {IEEE} Symposium on Computers and Communication, {ISCC} 2015,
                  Larnaca, Cyprus, July 6-9, 2015},
  pages        = {625--631},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISCC.2015.7405584},
  doi          = {10.1109/ISCC.2015.7405584},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/SunAYHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/WatanabeASM15,
  author       = {Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tetsuya Sakai and
                  Tatsuya Mori},
  editor       = {Lorrie Faith Cranor and
                  Robert Biddle and
                  Sunny Consolvo},
  title        = {Understanding the Inconsistencies between Text Descriptions and the
                  Use of Privacy-sensitive Resources of Mobile Apps},
  booktitle    = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa,
                  Canada, July 22-24, 2015},
  pages        = {241--255},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/soups2015/proceedings/presentation/watanabe},
  timestamp    = {Thu, 13 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/WatanabeASM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/MoriISSIG15,
  author       = {Tatsuya Mori and
                  Takeru Inoue and
                  Akihiro Shimoda and
                  Kazumichi Sato and
                  Keisuke Ishibashi and
                  Shigeki Goto},
  editor       = {Moritz Steiner and
                  Pere Barlet{-}Ros and
                  Olivier Bonaventure},
  title        = {SFMap: Inferring Services over Encrypted Web Flows Using Dynamical
                  Domain Name Graphs},
  booktitle    = {Traffic Monitoring and Analysis - 7th International Workshop, {TMA}
                  2015, Barcelona, Spain, April 21-24, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9053},
  pages        = {126--139},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17172-2\_9},
  doi          = {10.1007/978-3-319-17172-2\_9},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tma/MoriISSIG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/WatanabeAM15,
  author       = {Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  editor       = {Aur{\'{e}}lien Francillon and
                  Thomas Ptacek},
  title        = {RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal
                  Regularity of Human Mobility},
  booktitle    = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington,
                  DC, USA, August 10-11, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/woot15/workshop-program/presentation/watanabe},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/WatanabeAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HatadaTM14,
  author       = {Mitsuhiro Hatada and
                  Masato Terada and
                  Tatsuya Mori},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Seven Years in {MWS:} Experiences of Sharing Datasets with
                  Anti-malware Research Community in Japan},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1433--1435},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662357},
  doi          = {10.1145/2660267.2662357},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HatadaTM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KimuraIMSTNWSS14,
  author       = {Tatsuaki Kimura and
                  Keisuke Ishibashi and
                  Tatsuya Mori and
                  Hiroshi Sawada and
                  Tsuyoshi Toyono and
                  Ken Nishimatsu and
                  Akio Watanabe and
                  Akihiro Shimoda and
                  Kohei Shiomoto},
  title        = {Spatio-temporal factorization of log data for understanding network
                  events},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {610--618},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6847986},
  doi          = {10.1109/INFOCOM.2014.6847986},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/KimuraIMSTNWSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KamiyamaMK13,
  author       = {Noriaki Kamiyama and
                  Tatsuya Mori and
                  Ryoichi Kawahara},
  title        = {Autonomic load balancing of flow monitors},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {3},
  pages        = {741--761},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.10.018},
  doi          = {10.1016/J.COMNET.2012.10.018},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KamiyamaMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KawaharaTMKI13,
  author       = {Ryoichi Kawahara and
                  Tetsuya Takine and
                  Tatsuya Mori and
                  Noriaki Kamiyama and
                  Keisuke Ishibashi},
  title        = {Mean-variance relationship of the number of flows in traffic aggregation
                  and its application to traffic management},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {6},
  pages        = {1560--1576},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2013.02.010},
  doi          = {10.1016/J.COMNET.2013.02.010},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KawaharaTMKI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KamiyamaKMH13,
  author       = {Noriaki Kamiyama and
                  Ryoichi Kawahara and
                  Tatsuya Mori and
                  Haruhisa Hasegawa},
  title        = {Effect of Limiting Pre-Distribution and Clustering Users on Multicast
                  Pre-Distribution VoD},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {96-B},
  number       = {1},
  pages        = {143--154},
  year         = {2013},
  url          = {https://doi.org/10.1587/transcom.E96.B.143},
  doi          = {10.1587/TRANSCOM.E96.B.143},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KamiyamaKMH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IkedaKKKM13,
  author       = {Yasuhiro Ikeda and
                  Ryoichi Kawahara and
                  Noriaki Kamiyama and
                  Tatsuaki Kimura and
                  Tatsuya Mori},
  title        = {Analyzing Characteristics of {TCP} Quality Metrics with Respect to
                  Type of Connection through Measured Traffic Data},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {96-B},
  number       = {2},
  pages        = {533--542},
  year         = {2013},
  url          = {https://doi.org/10.1587/transcom.E96.B.533},
  doi          = {10.1587/TRANSCOM.E96.B.533},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IkedaKKKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KamiyamaMKH13,
  author       = {Noriaki Kamiyama and
                  Tatsuya Mori and
                  Ryoichi Kawahara and
                  Haruhisa Hasegawa},
  title        = {Optimally Designing ISP-Operated {CDN}},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {96-B},
  number       = {3},
  pages        = {790--801},
  year         = {2013},
  url          = {https://doi.org/10.1587/transcom.E96.B.790},
  doi          = {10.1587/TRANSCOM.E96.B.790},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KamiyamaMKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KamiyamaKMH13a,
  author       = {Noriaki Kamiyama and
                  Ryoichi Kawahara and
                  Tatsuya Mori and
                  Haruhisa Hasegawa},
  title        = {Multicast Pre-Distribution VoD System},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {96-B},
  number       = {6},
  pages        = {1459--1471},
  year         = {2013},
  url          = {https://doi.org/10.1587/transcom.E96.B.1459},
  doi          = {10.1587/TRANSCOM.E96.B.1459},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KamiyamaKMH13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakahashiMHTM13,
  author       = {Kazuya Takahashi and
                  Tatsuya Mori and
                  Yusuke Hirota and
                  Hideki Tode and
                  Koso Murakami},
  title        = {A Resilient Forest-Based Application Level Multicast for Real-Time
                  Streaming},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {96-B},
  number       = {7},
  pages        = {1874--1885},
  year         = {2013},
  url          = {https://doi.org/10.1587/transcom.E96.B.1874},
  doi          = {10.1587/TRANSCOM.E96.B.1874},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TakahashiMHTM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KamiyamaMKH13a,
  author       = {Noriaki Kamiyama and
                  Tatsuya Mori and
                  Ryoichi Kawahara and
                  Shigeaki Harada},
  title        = {Optimally Identifying Worm-Infected Hosts},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {96-B},
  number       = {8},
  pages        = {2084--2094},
  year         = {2013},
  url          = {https://doi.org/10.1587/transcom.E96.B.2084},
  doi          = {10.1587/TRANSCOM.E96.B.2084},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KamiyamaMKH13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/ChibaTMG13,
  author       = {Daiki Chiba and
                  Kazuhiro Tobe and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {Analyzing Spatial Structure of {IP} Addresses for Detecting Malicious
                  Websites},
  journal      = {J. Inf. Process.},
  volume       = {21},
  number       = {3},
  pages        = {539--550},
  year         = {2013},
  url          = {https://doi.org/10.2197/ipsjjip.21.539},
  doi          = {10.2197/IPSJJIP.21.539},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/ChibaTMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/KamiyamaMKHH13,
  author       = {Noriaki Kamiyama and
                  Tatsuya Mori and
                  Ryoichi Kawahara and
                  Shigeaki Harada and
                  Haruhisa Hasegawa},
  title        = {Analyzing influence of network topology on designing ISP-operated
                  {CDN}},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {969--977},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9605-2},
  doi          = {10.1007/S11235-011-9605-2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/KamiyamaMKHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/MakiNSTMKK13,
  author       = {Naoya Maki and
                  Takayuki Nishio and
                  Ryoichi Shinkuma and
                  Tatsuro Takahashi and
                  Tatsuya Mori and
                  Noriaki Kamiyama and
                  Ryoichi Kawahara},
  title        = {Expected traffic reduction by content-oriented incentive in peer-assisted
                  content delivery networks},
  booktitle    = {The International Conference on Information Networking 2013, {ICOIN}
                  2013, Bangkok, Thailand, January 28-30, 2013},
  pages        = {450--455},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICOIN.2013.6496421},
  doi          = {10.1109/ICOIN.2013.6496421},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/MakiNSTMKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kaleidoscope/MakiSMKK13,
  author       = {Naoya Maki and
                  Ryoichi Shinkuma and
                  Tatsuya Mori and
                  Noriaki Kamiyama and
                  Ryoichi Kawahara},
  title        = {A periodic combined-content distribution mechanism in peer-assisted
                  content delivery networks},
  booktitle    = {Proceedings of the 2013 {ITU} Kaleidoscope: Building Sustainable Communities,
                  Kyoto, Japan, April 22-24, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6533770/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kaleidoscope/MakiSMKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cis/MoriMAMSIN12,
  author       = {Tatsuya Mori and
                  Yoshikazu Maekawa and
                  Yoko Akiyama and
                  Fumihito Mishima and
                  Koichi Sutani and
                  Sunao Iwaki and
                  Shigehiro Nishijima},
  title        = {Fundamental Study for Controlling Environment using Biological signal},
  journal      = {Control. Intell. Syst.},
  volume       = {40},
  number       = {3},
  year         = {2012},
  url          = {https://doi.org/10.2316/Journal.201.2012.3.201-2342},
  doi          = {10.2316/JOURNAL.201.2012.3.201-2342},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cis/MoriMAMSIN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IshibashiKMKA12,
  author       = {Keisuke Ishibashi and
                  Ryoichi Kawahara and
                  Tatsuya Mori and
                  Tsuyoshi Kondoh and
                  Shoichiro Asano},
  title        = {Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring
                  on Anomaly Detectability},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {95-B},
  number       = {2},
  pages        = {466--476},
  year         = {2012},
  url          = {https://doi.org/10.1587/transcom.E95.B.466},
  doi          = {10.1587/TRANSCOM.E95.B.466},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IshibashiKMKA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShimodaMG12,
  author       = {Akihiro Shimoda and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {Extended Darknet: Multi-Dimensional Internet Threat Monitoring System},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {95-B},
  number       = {6},
  pages        = {1915--1923},
  year         = {2012},
  url          = {https://doi.org/10.1587/transcom.E95.B.1915},
  doi          = {10.1587/TRANSCOM.E95.B.1915},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShimodaMG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KawaharaMYK12,
  author       = {Ryoichi Kawahara and
                  Tatsuya Mori and
                  Takeshi Yada and
                  Noriaki Kamiyama},
  title        = {Analyzing and Reducing the Impact of Traffic on Large-Scale {NAT}},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {95-B},
  number       = {9},
  pages        = {2815--2827},
  year         = {2012},
  url          = {https://doi.org/10.1587/transcom.E95.B.2815},
  doi          = {10.1587/TRANSCOM.E95.B.2815},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KawaharaMYK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MakiNSMKKT12,
  author       = {Naoya Maki and
                  Takayuki Nishio and
                  Ryoichi Shinkuma and
                  Tatsuya Mori and
                  Noriaki Kamiyama and
                  Ryoichi Kawahara and
                  Tatsuro Takahashi},
  title        = {Traffic Engineering of Peer-Assisted Content Delivery Network with
                  Content-Oriented Incentive Mechanism},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {95-D},
  number       = {12},
  pages        = {2860--2869},
  year         = {2012},
  url          = {https://doi.org/10.1587/transinf.E95.D.2860},
  doi          = {10.1587/TRANSINF.E95.D.2860},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MakiNSMKKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijssc/MoriNI12,
  author       = {Tatsuya Mori and
                  Makoto Nakashima and
                  Tetsuro Ito},
  title        = {SpACCE: a sophisticated ad hoc cloud computing environment built by
                  server migration to facilitate distributed collaboration},
  journal      = {Int. J. Space Based Situated Comput.},
  volume       = {2},
  number       = {4},
  pages        = {230--239},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSSC.2012.050000},
  doi          = {10.1504/IJSSC.2012.050000},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijssc/MoriNI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/MoriNI12,
  author       = {Tatsuya Mori and
                  Makoto Nakashima and
                  Tetsuro Ito},
  editor       = {Leonard Barolli and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {A Sophisticated Ad Hoc Cloud Computing Environment Built by the Migration
                  of a Server to Facilitate Distributed Collaboration},
  booktitle    = {26th International Conference on Advanced Information Networking and
                  Applications Workshops, {WAINA} 2012, Fukuoka, Japan, March 26-29,
                  2012},
  pages        = {1196--1202},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/WAINA.2012.54},
  doi          = {10.1109/WAINA.2012.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/MoriNI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KamiyamaMK12,
  author       = {Noriaki Kamiyama and
                  Tatsuya Mori and
                  Ryoichi Kawahara},
  title        = {Autonomic load balancing for flow monitoring},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {2684--2688},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6363789},
  doi          = {10.1109/ICC.2012.6363789},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KamiyamaMK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/ChibaTMG12,
  author       = {Daiki Chiba and
                  Kazuhiro Tobe and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {Detecting Malicious Websites by Learning {IP} Address Features},
  booktitle    = {12th {IEEE/IPSJ} International Symposium on Applications and the Internet,
                  {SAINT} 2012, Izmir, Turkey, July 16-20, 2012},
  pages        = {29--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SAINT.2012.14},
  doi          = {10.1109/SAINT.2012.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/ChibaTMG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KamiyamaKMHH11,
  author       = {Noriaki Kamiyama and
                  Ryoichi Kawahara and
                  Tatsuya Mori and
                  Shigeaki Harada and
                  Haruhisa Hasegawa},
  title        = {Optimally designing caches to reduce {P2P} traffic},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {7},
  pages        = {883--897},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.10.009},
  doi          = {10.1016/J.COMCOM.2010.10.009},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/KamiyamaKMHH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KamiyamaKMHH11a,
  author       = {Noriaki Kamiyama and
                  Ryoichi Kawahara and
                  Tatsuya Mori and
                  Shigeaki Harada and
                  Haruhisa Hasegawa},
  title        = {Parallel video streaming optimizing network throughput},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {10},
  pages        = {1182--1194},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.12.003},
  doi          = {10.1016/J.COMCOM.2010.12.003},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/KamiyamaKMHH11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KawaharaIMKHHA11,
  author       = {Ryoichi Kawahara and
                  Keisuke Ishibashi and
                  Tatsuya Mori and
                  Noriaki Kamiyama and
                  Shigeaki Harada and
                  Haruhisa Hasegawa and
                  Shoichiro Asano},
  title        = {Detection accuracy of network anomalies using sampled flow statistics},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {6},
  pages        = {513--535},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.777},
  doi          = {10.1002/NEM.777},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KawaharaIMKHHA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/KawaharaKMH11,
  author       = {Ryoichi Kawahara and
                  Noriaki Kamiyama and
                  Tatsuya Mori and
                  Haruhisa Hasegawa},
  title        = {Performance evaluation of peer-assisted content distribution},
  booktitle    = {2011 {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2011, Las Vegas, NV, 9-12 January, 2011},
  pages        = {725--729},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CCNC.2011.5766586},
  doi          = {10.1109/CCNC.2011.5766586},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/KawaharaKMH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceas/MoriSTI11,
  author       = {Tatsuya Mori and
                  Kazumichi Sato and
                  Yousuke Takahashi and
                  Keisuke Ishibashi},
  editor       = {Vidyasagar M. Potdar},
  title        = {How is e-mail sender authentication used and misused?},
  booktitle    = {The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and
                  Spam Conference, {CEAS} 2011, Perth, Australia, September 1-2, 2011,
                  Proceedings},
  pages        = {31--37},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2030376.2030380},
  doi          = {10.1145/2030376.2030380},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ceas/MoriSTI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KawaharaHKMHN11,
  author       = {Ryoichi Kawahara and
                  Shigeaki Harada and
                  Noriaki Kamiyama and
                  Tatsuya Mori and
                  Haruhisa Hasegawa and
                  Akihiro Nakao},
  title        = {Traffic Engineering Using Overlay Network},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/icc.2011.5963441},
  doi          = {10.1109/ICC.2011.5963441},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KawaharaHKMHN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/KamiyamaKMH11,
  author       = {Noriaki Kamiyama and
                  Ryoichi Kawahara and
                  Tatsuya Mori and
                  Haruhisa Hasegawa},
  editor       = {Nazim Agoulmine and
                  Claudio Bartolini and
                  Tom Pfeifer and
                  Declan O'Sullivan},
  title        = {Limiting pre-distribution and clustering users on multicast pre-distribution
                  VoD},
  booktitle    = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated
                  Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011},
  pages        = {706--709},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INM.2011.5990661},
  doi          = {10.1109/INM.2011.5990661},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/KamiyamaKMH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/EsquivelAM10,
  author       = {Holly Esquivel and
                  Aditya Akella and
                  Tatsuya Mori},
  editor       = {P. R. Kumar and
                  Henning Schulzrinne and
                  Harrick M. Vin},
  title        = {On the effectiveness of {IP} reputation for spam filtering},
  booktitle    = {Second International Conference on Communication Systems and Networks,
                  {COMSNETS} 2010, Bangalore, India, January 5-9, 2010},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/COMSNETS.2010.5431981},
  doi          = {10.1109/COMSNETS.2010.5431981},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/EsquivelAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KamiyamaKMHH10,
  author       = {Noriaki Kamiyama and
                  Ryoichi Kawahara and
                  Tatsuya Mori and
                  Shigeaki Harada and
                  Haruhisa Hasegawa},
  title        = {Optimally Designing Capacity and Location of Caches to Reduce {P2P}
                  Traffic},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5501837},
  doi          = {10.1109/ICC.2010.5501837},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KamiyamaKMHH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/KamiyamaKMHH10,
  author       = {Noriaki Kamiyama and
                  Ryoichi Kawahara and
                  Tatsuya Mori and
                  Shigeaki Harada and
                  Haruhisa Hasegawa},
  editor       = {Yoshiaki Kiriha and
                  Lisandro Zambenedetti Granville and
                  Deep Medhi and
                  Toshio Tonouchi and
                  Myung{-}Sup Kim},
  title        = {Impact of topology on parallel video streaming},
  booktitle    = {{IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2010,
                  19-23 April 2010, Osaka, Japan},
  pages        = {607--614},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/NOMS.2010.5488436},
  doi          = {10.1109/NOMS.2010.5488436},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/KamiyamaKMHH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/ShimodaMG10,
  author       = {Akihiro Shimoda and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using
                  Virtualization Technologies},
  booktitle    = {Tenth Annual International Symposium on Applications and the Internet,
                  {SAINT} 2010, Seoul, Korea, 19-23 July, 2010, Proceedings},
  pages        = {22--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SAINT.2010.42},
  doi          = {10.1109/SAINT.2010.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/ShimodaMG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/MoriKHS10,
  author       = {Tatsuya Mori and
                  Ryoichi Kawahara and
                  Haruhisa Hasegawa and
                  Shinsuke Shimogawa},
  editor       = {Fabio Ricciato and
                  Marco Mellia and
                  Ernst W. Biersack},
  title        = {Characterizing Traffic Flows Originating from Large-Scale Video Sharing
                  Services},
  booktitle    = {Traffic Monitoring and Analysis, Second International Workshop, {TMA}
                  2010, Zurich, Switzerland, April 7, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6003},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12365-8\_2},
  doi          = {10.1007/978-3-642-12365-8\_2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tma/MoriKHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jssc/MoriUNTSFKMMAMO09,
  author       = {Tatsuya Mori and
                  Yasuyuki Ueda and
                  Nobuhiro Nonogaki and
                  Toshihiro Terazawa and
                  Milosz Sroka and
                  Tetsuya Fujita and
                  Takeshi Kodaka and
                  Takayuki Mori and
                  Kumiko Morita and
                  Hideho Arakida and
                  Takashi Miura and
                  Yuji Okuda and
                  Toshiki Kizu and
                  Yoshiro Tsuboi},
  title        = {A Power, Performance Scalable Eight-Cores Media Processor for Mobile
                  Multimedia Applications},
  journal      = {{IEEE} J. Solid State Circuits},
  volume       = {44},
  number       = {11},
  pages        = {2957--2965},
  year         = {2009},
  url          = {https://doi.org/10.1109/JSSC.2009.2028936},
  doi          = {10.1109/JSSC.2009.2028936},
  timestamp    = {Sun, 30 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jssc/MoriUNTSFKMMAMO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/KodakaSTONKMUAOKTM09,
  author       = {Takeshi Kodaka and
                  Shunsuke Sasaki and
                  Takahiro Tokuyoshi and
                  Ryuichiro Ohyama and
                  Nobuhiro Nonogaki and
                  Koji Kitayama and
                  Tatsuya Mori and
                  Yasuyuki Ueda and
                  Hideho Arakida and
                  Yuji Okuda and
                  Toshiki Kizu and
                  Yoshiro Tsuboi and
                  Nobu Matsumoto},
  editor       = {Luca Benini and
                  Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller},
  title        = {Design and implementation of scalable, transparent threads for multi-core
                  media processor},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2009, Nice, France,
                  April 20-24, 2009},
  pages        = {1035--1039},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/DATE.2009.5090816},
  doi          = {10.1109/DATE.2009.5090816},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/KodakaSTONKMUAOKTM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MoriKHHK09,
  author       = {Tatsuya Mori and
                  Noriaki Kamiyama and
                  Shigeaki Harada and
                  Haruhisa Hasegawa and
                  Ryoichi Kawahara},
  title        = {Improving Deployability of Peer-Assisted {CDN} Platform with Incentive},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425962},
  doi          = {10.1109/GLOCOM.2009.5425962},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/MoriKHHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KawaharaMKHH09,
  author       = {Ryoichi Kawahara and
                  Tatsuya Mori and
                  Noriaki Kamiyama and
                  Shigeaki Harada and
                  Haruhisa Hasegawa},
  title        = {Adaptive Bandwidth Control to Handle Long-Duration Large Flows},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5198696},
  doi          = {10.1109/ICC.2009.5198696},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KawaharaMKHH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jcdl/KiyotaNSMM09,
  author       = {Yoji Kiyota and
                  Hiroshi Nakagawa and
                  Satoshi Sakai and
                  Tatsuya Mori and
                  Hidetaka Masuda},
  editor       = {Fred Heath and
                  Mary Lynn Rice{-}Lively and
                  Richard Furuta},
  title        = {Exploitation of the wikipedia category system for enhancing the value
                  of {LCSH}},
  booktitle    = {Proceedings of the 2009 Joint International Conference on Digital
                  Libraries, {JCDL} 2009, Austin, TX, USA, June 15-19, 2009},
  pages        = {411--412},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1555400.1555488},
  doi          = {10.1145/1555400.1555488},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/jcdl/KiyotaNSMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KawaharaMIKY08,
  author       = {Ryoichi Kawahara and
                  Tatsuya Mori and
                  Keisuke Ishibashi and
                  Noriaki Kamiyama and
                  Hideaki Yoshino},
  title        = {Packet Sampling {TCP} Flow Rate Estimation and Performance Degradation
                  Detection Method},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {91-B},
  number       = {5},
  pages        = {1309--1319},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietcom/e91-b.5.1309},
  doi          = {10.1093/IETCOM/E91-B.5.1309},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KawaharaMIKY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IshibashiMKHKYSA08,
  author       = {Keisuke Ishibashi and
                  Tatsuya Mori and
                  Ryoichi Kawahara and
                  Yutaka Hirokawa and
                  Atsushi Kobayashi and
                  Kimihiro Yamamoto and
                  Hitoaki Sakamoto and
                  Shoichiro Asano},
  title        = {Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its
                  Application to Anomaly Detection},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {91-B},
  number       = {5},
  pages        = {1331--1339},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietcom/e91-b.5.1331},
  doi          = {10.1093/IETCOM/E91-B.5.1331},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IshibashiMKHKYSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HaradaKMKHY08,
  author       = {Shigeaki Harada and
                  Ryoichi Kawahara and
                  Tatsuya Mori and
                  Noriaki Kamiyama and
                  Haruhisa Hasegawa and
                  Hideaki Yoshino},
  title        = {A Method of Detecting Network Anomalies in Cyclic Traffic},
  booktitle    = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
                  2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  pages        = {2057--2061},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/GLOCOM.2008.ECP.396},
  doi          = {10.1109/GLOCOM.2008.ECP.396},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HaradaKMKHY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MoriTM08,
  author       = {Tatsuya Mori and
                  Hideki Tode and
                  Koso Murakami},
  title        = {Integrated Method for Loss-Resilient Multicast Source Authentication
                  and Data Reconstruction},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2008, Beijing, China, 19-23 May 2008},
  pages        = {5844--5848},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICC.2008.1093},
  doi          = {10.1109/ICC.2008.1093},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MoriTM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipom/KamiyamaMKH08,
  author       = {Noriaki Kamiyama and
                  Tatsuya Mori and
                  Ryoichi Kawahara and
                  Shigeaki Harada},
  editor       = {Nail Akar and
                  Michal Pi{\'{o}}ro and
                  Charalabos Skianis},
  title        = {Optimum Identification of Worm-Infected Hosts},
  booktitle    = {{IP} Operations and Management, 8th {IEEE} International Workshop,
                  {IPOM} 2008, Samos Island, Greece, September 22-26, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5275},
  pages        = {103--116},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87357-0\_9},
  doi          = {10.1007/978-3-540-87357-0\_9},
  timestamp    = {Sun, 02 Oct 2022 16:08:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ipom/KamiyamaMKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/KamiyamaMKHY08,
  author       = {Noriaki Kamiyama and
                  Tatsuya Mori and
                  Ryoichi Kawahara and
                  Shigeaki Harada and
                  Hideaki Yoshino},
  title        = {Extracting Worm-Infected Hosts Using White List},
  booktitle    = {Proceedings of the 2008 International Symposium on Applications and
                  the Internet, {SAINT} 2008, 28 July - 1 August 2008, Turku, Finland},
  pages        = {68--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SAINT.2008.77},
  doi          = {10.1109/SAINT.2008.77},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/KamiyamaMKHY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MoriTPKUG07,
  author       = {Tatsuya Mori and
                  Tetsuya Takine and
                  Jianping Pan and
                  Ryoichi Kawahara and
                  Masato Uchida and
                  Shigeki Goto},
  title        = {Identifying Heavy-Hitter Flows from Sampled Flow Statistics},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {90-B},
  number       = {11},
  pages        = {3061--3072},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietcom/e90-b.11.3061},
  doi          = {10.1093/IETCOM/E90-B.11.3061},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MoriTPKUG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KawaharaIMKHA07,
  author       = {Ryoichi Kawahara and
                  Keisuke Ishibashi and
                  Tatsuya Mori and
                  Noriaki Kamiyama and
                  Shigeaki Harada and
                  Shoichiro Asano},
  title        = {Detection Accuracy of Network Anomalies Using Sampled Flow Statistics},
  booktitle    = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
                  '07, Washington, DC, USA, 26-30 November 2007},
  pages        = {1959--1964},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/GLOCOM.2007.376},
  doi          = {10.1109/GLOCOM.2007.376},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/KawaharaIMKHA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/KamiyamaMKL07,
  author       = {Noriaki Kamiyama and
                  Tatsuya Mori and
                  Ryoichi Kawahara and
                  Eng Keong Lua},
  title        = {Efficient Timeout Checking Mechanism for Traffic Control},
  booktitle    = {Proceedings of the 16th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2007, Turtle Bay Resort, Honolulu, Hawaii,
                  USA, August 13-16, 2007},
  pages        = {327--333},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICCCN.2007.4317840},
  doi          = {10.1109/ICCCN.2007.4317840},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/KamiyamaMKL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KamiyamaMK07,
  author       = {Noriaki Kamiyama and
                  Tatsuya Mori and
                  Ryoichi Kawahara},
  title        = {Simple and Adaptive Identification of Superspreaders by Flow Sampling},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {2481--2485},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.305},
  doi          = {10.1109/INFCOM.2007.305},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/KamiyamaMK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/KawaharaMKHA07,
  author       = {Ryoichi Kawahara and
                  Tatsuya Mori and
                  Noriaki Kamiyama and
                  Shigeaki Harada and
                  Shoichiro Asano},
  title        = {A Study on Detecting Network Anomalies Using Sampled Flow Statistics},
  booktitle    = {2007 International Symposium on Applications and the Internet - Workshops
                  {(SAINT} 2007 Workshops), 15-19 January 2007, Hiroshima, Japan},
  pages        = {81},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SAINT-W.2007.17},
  doi          = {10.1109/SAINT-W.2007.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/KawaharaMKHA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/IshibashiMKTOA07,
  author       = {Keisuke Ishibashi and
                  Tatsuya Mori and
                  Ryoichi Kawahara and
                  Katsuyasu Toyama and
                  Shunichi Osawa and
                  Shoichiro Asano},
  title        = {2-D Bitmap for Summarizing Inter-Host Communication Patterns},
  booktitle    = {2007 International Symposium on Applications and the Internet - Workshops
                  {(SAINT} 2007 Workshops), 15-19 January 2007, Hiroshima, Japan},
  pages        = {83},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SAINT-W.2007.1},
  doi          = {10.1109/SAINT-W.2007.1},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/IshibashiMKTOA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/MoriKKH07,
  author       = {Tatsuya Mori and
                  Ryoichi Kawahara and
                  Noriaki Kamiyama and
                  Shigeaki Harada},
  title        = {Inferring Original Traffic Pattern from Sampled Flow Statistics},
  booktitle    = {2007 International Symposium on Applications and the Internet - Workshops
                  {(SAINT} 2007 Workshops), 15-19 January 2007, Hiroshima, Japan},
  pages        = {85},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SAINT-W.2007.51},
  doi          = {10.1109/SAINT-W.2007.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/MoriKKH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KawaharaMIKA06,
  author       = {Ryoichi Kawahara and
                  Tatsuya Mori and
                  Keisuke Ishibashi and
                  Noriaki Kamiyama and
                  Takeo Abe},
  title        = {Estimating Flow Rate from Sampled Packet Streams for Detection of
                  Performance Degradation at {TCP} Flow Level},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
                  '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GLOCOM.2006.446},
  doi          = {10.1109/GLOCOM.2006.446},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/KawaharaMIKA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KawaharaMA06,
  author       = {Ryoichi Kawahara and
                  Tatsuya Mori and
                  Takeo Abe},
  title        = {QoS control to handle long-duration large flows and its performance
                  evaluation},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {579--584},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.254857},
  doi          = {10.1109/ICC.2006.254857},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KawaharaMA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/IshibashiMKHKYS06,
  author       = {Keisuke Ishibashi and
                  Tatsuya Mori and
                  Ryoichi Kawahara and
                  Yutaka Hirokawa and
                  Atsushi Kobayashi and
                  Kimihiro Yamamoto and
                  Hitoaki Sakamoto},
  editor       = {Roger S. Barga and
                  Xiaofang Zhou},
  title        = {Estimating Top {N} Hosts in Cardinality Using Small Memory Resources},
  booktitle    = {Proceedings of the 22nd International Conference on Data Engineering
                  Workshops, {ICDE} 2006, 3-7 April 2006, Atlanta, GA, {USA}},
  pages        = {29},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDEW.2006.56},
  doi          = {10.1109/ICDEW.2006.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/IshibashiMKHKYS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KamiyamaM06,
  author       = {Noriaki Kamiyama and
                  Tatsuya Mori},
  title        = {Simple and Accurate Identification of High-Rate Flows by Packet Sampling},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.324},
  doi          = {10.1109/INFOCOM.2006.324},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/KamiyamaM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KawaharaIMOA05,
  author       = {Ryoichi Kawahara and
                  Keisuke Ishibashi and
                  Tatsuya Mori and
                  Toshihisa Ozawa and
                  Takeo Abe},
  title        = {Method of Bandwidth Dimensioning and Management for Aggregated {TCP}
                  Flows with Heterogeneous Access Links},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {88-B},
  number       = {12},
  pages        = {4605--4615},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietcom/e88-b.12.4605},
  doi          = {10.1093/IETCOM/E88-B.12.4605},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KawaharaIMOA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/MoriUG05,
  author       = {Tatsuya Mori and
                  Masato Uchida and
                  Shigeki Goto},
  title        = {Flow analysis of internet traffic: World Wide Web versus peer-to-peer},
  journal      = {Syst. Comput. Jpn.},
  volume       = {36},
  number       = {11},
  pages        = {70--81},
  year         = {2005},
  url          = {https://doi.org/10.1002/scj.20283},
  doi          = {10.1002/SCJ.20283},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/MoriUG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MoriKNG04,
  author       = {Tatsuya Mori and
                  Ryoichi Kawahara and
                  Shozo Naito and
                  Shigeki Goto},
  title        = {On the Characteristics of Internet Traffic Variability: Spikes and
                  Elephants},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {87-D},
  number       = {12},
  pages        = {2644--2653},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-d\_12\_2644},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MoriKNG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/MoriUKPG04,
  author       = {Tatsuya Mori and
                  Masato Uchida and
                  Ryoichi Kawahara and
                  Jianping Pan and
                  Shigeki Goto},
  editor       = {Alfio Lombardo and
                  James F. Kurose},
  title        = {Identifying elephant flows through periodically sampled packets},
  booktitle    = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004},
  pages        = {115--120},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1028788.1028803},
  doi          = {10.1145/1028788.1028803},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/MoriUKPG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/MoriKNG04,
  author       = {Tatsuya Mori and
                  Ryoichi Kawahara and
                  Shozo Naito and
                  Shigeki Goto},
  title        = {On the Characteristics of Internet Traffic Variability: Spikes and
                  Elephants},
  booktitle    = {2004 Symposium on Applications and the Internet {(SAINT} 2004), 26-30
                  January 2004, Tokyo, Japan},
  pages        = {99--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SAINT.2004.1266104},
  doi          = {10.1109/SAINT.2004.1266104},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/MoriKNG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-NI-0201004,
  author       = {Tatsuya Mori and
                  Ryoichi Kawahara and
                  Shozo Naito},
  title        = {Analysis of Non-Gaussian Nature of Network Traffic},
  journal      = {CoRR},
  volume       = {cs.NI/0201004},
  year         = {2002},
  url          = {https://arxiv.org/abs/cs/0201004},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-NI-0201004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-NI-0209004,
  author       = {Tatsuya Mori and
                  Ryoichi Kawahara and
                  Shozo Naito},
  title        = {Analysis of Non-Gaussian Nature of Network Traffic and its Implication
                  on Network Performance},
  journal      = {CoRR},
  volume       = {cs.NI/0209004},
  year         = {2002},
  url          = {https://arxiv.org/abs/cs/0209004},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-NI-0209004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics