default search action
Mitsuaki Akiyama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j55]Satoshi Furutani, Tatsuhiro Aoshima, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida:
Suppressing the Endogenous Negative Influence Through Node Intervention in Social Networks. IEEE Access 13: 9290-9302 (2025) - 2024
- [j54]Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games. IEEE Access 12: 19128-19144 (2024) - [j53]Mitsuaki Akiyama:
Editor's Message to Special Issue of Cybersecurity Technologies for Secure Supply-Chain. J. Inf. Process. 32: 678 (2024) - [j52]Huang Shu-Pei, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
An Investigation of Privacy and Security in VR APPs through URL String Analysis. J. Inf. Process. 32: 779-788 (2024) - [j51]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Understanding the Breakdown of Same-origin Policies in Web Services That Rehost Websites. J. Inf. Process. 32: 801-816 (2024) - [c63]Ko Fujimori, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Evaluation of Adversarial Examples Based on Original Definition. HCI (62) 2024: 36-43 - [c62]Ayako Akiyama Hasegawa, Daisuke Inoue, Mitsuaki Akiyama:
How WEIRD is Usable Privacy and Security Research? USENIX Security Symposium 2024 - 2023
- [j50]Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida:
Analysis of Homophily Effects on Information Diffusion on Social Networks. IEEE Access 11: 79974-79983 (2023) - [j49]Mitsuaki Akiyama, Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, Toshihiro Yamauchi:
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey. Comput. Secur. 133: 103389 (2023) - [j48]Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Naomi Yamashita, Daisuke Inoue, Tatsuya Mori:
Analysis of Non-Experts' Security- and Privacy-Related Questions on a Q&A Site. IEICE Trans. Inf. Syst. 106(9): 1380-1396 (2023) - [j47]Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers. J. Inf. Process. 31: 620-642 (2023) - [j46]Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida:
Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering. IEEE Trans. Inf. Forensics Secur. 18: 1225-1236 (2023) - [c61]Fumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, Mitsuaki Akiyama:
Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries. CHI 2023: 187:1-187:17 - [c60]Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Browser Permission Mechanisms Demystified. NDSS 2023 - [i5]Ayako Akiyama Hasegawa, Daisuke Inoue, Mitsuaki Akiyama:
A Survey on the Geographic Diversity of Usable Privacy and Security Research. CoRR abs/2305.05004 (2023) - 2022
- [j45]Daiki Chiba, Mitsuaki Akiyama, Yuto Otsuki, Hiroki Hada, Takeshi Yagi, Tobias Fiebig, Michel van Eeten:
DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency. IEEE Access 10: 34352-34368 (2022) - [j44]Hiroki Nakano, Daiki Chiba, Takashi Koide, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild. J. Inf. Process. 30: 372-387 (2022) - [j43]Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, Tatsuya Mori:
Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails. J. Inf. Process. 30: 841-858 (2022) - [j42]Naoki Fukushi, Takashi Koide, Daiki Chiba, Hiroki Nakano, Mitsuaki Akiyama:
Understanding Security Risks of Ad-based URL Shortening Services Caused by Users' Behaviors. J. Inf. Process. 30: 865-877 (2022) - [j41]Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori:
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework. Proc. Priv. Enhancing Technol. 2022(4): 140-161 (2022) - [c59]Koji Fujita, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Objection!: Identifying Misclassified Malicious Activities with XAI. ICC 2022: 2065-2070 - [c58]Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida:
Competitive Information Spreading on Modular Networks. NetSci-X 2022: 155-168 - [c57]Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework. RAID 2022: 143-159 - [c56]Ayako Akiyama Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama:
Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site. SOUPS @ USENIX Security Symposium 2022: 39-56 - [e1]Chen-Mou Cheng, Mitsuaki Akiyama:
Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings. Lecture Notes in Computer Science 13504, Springer 2022, ISBN 978-3-031-15254-2 [contents] - [i4]Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida:
Interpreting Graph-based Sybil Detection Methods as Low-Pass Filtering. CoRR abs/2206.10835 (2022) - 2021
- [j40]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 162-181 (2021) - [j39]Takayuki Tomatsuri, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Time-Series Measurement of Parked Domain Names and Their Malicious Uses. IEICE Trans. Commun. 104-B(7): 770-780 (2021) - [j38]Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori:
Identifying the Phishing Websites Using the Patterns of TLS Certificates. J. Cyber Secur. Mobil. 10(2): 451-486 (2021) - [j37]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
A Comprehensive Measurement of Cloud Service Abuse. J. Inf. Process. 29: 93-102 (2021) - [j36]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
Understanding the Fake Removal Information Advertisement Sites. J. Inf. Process. 29: 392-405 (2021) - [j35]Kazuya Nomura, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Auto-creation of Robust Android Malware Family Trees. J. Inf. Process. 29: 801-811 (2021) - [c55]Fumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, Mitsuaki Akiyama:
A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects. ACSAC 2021: 349-364 - [c54]Hiroki Nakano, Daiki Chiba, Takashi Koide, Mitsuaki Akiyama:
Detecting Event-synced Navigation Attacks across User-generated Content Platforms. COMPSAC 2021: 704-713 - [c53]Tenga Matsuura, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori:
Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods. EuroUSEC 2021: 36-47 - [c52]Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Toshinori Fukunaga, Ryohei Suzuki, Masayuki Kanda:
Brand Validation: Security Indicator to Better Indicate Website Identity. HCI (27) 2021: 432-447 - [c51]Kazuya Nomura, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Auto-creation of Android Malware Family Tree. ICC 2021: 1-6 - [c50]Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata:
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions. IWSEC 2021: 99-118 - [c49]Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
A First Look at COVID-19 Domain Names: Origin and Implications. PAM 2021: 39-53 - [c48]Naoki Fukushi, Takashi Koide, Daiki Chiba, Hiroki Nakano, Mitsuaki Akiyama:
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' Behaviors. SecureComm (2) 2021: 3-22 - [c47]Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, Tatsuya Mori:
Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails. SOUPS @ USENIX Security Symposium 2021: 319-338 - [i3]Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
A First Look at COVID-19 Domain Names: Origin and Implications. CoRR abs/2102.05290 (2021) - 2020
- [j34]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel. IEICE Trans. Inf. Syst. 103-D(2): 239-255 (2020) - [j33]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library. IEICE Trans. Inf. Syst. 103-D(2): 276-291 (2020) - [j32]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Exploration into Gray Area: Toward Efficient Labeling for Detecting Malicious Domain Names. IEICE Trans. Commun. 103-B(4): 375-388 (2020) - [j31]Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names. IEICE Trans. Inf. Syst. 103-D(7): 1493-1511 (2020) - [j30]Fumihiro Kanei, Daiki Chiba, Kunio Hato, Katsunari Yoshioka, Tsutomu Matsumoto, Mitsuaki Akiyama:
Detecting and Understanding Online Advertising Fraud in the Wild. IEICE Trans. Inf. Syst. 103-D(7): 1512-1523 (2020) - [j29]Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo:
1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States. IEICE Trans. Inf. Syst. 103-D(7): 1524-1540 (2020) - [j28]Keika Mori, Takuya Watanabe, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori:
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? IEICE Trans. Inf. Syst. 103-D(7): 1541-1555 (2020) - [j27]Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services. J. Inf. Process. 28: 1030-1046 (2020) - [c46]Taiga Hokaguchi, Yuichi Ohsita, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata:
Detecting Malware-infected Hosts Using Templates of Multiple HTTP Requests. CCNC 2020: 1-2 - [c45]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama:
To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web. AsiaCCS 2020: 394-408 - [c44]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
A Large-scale Analysis of Cloud Service Abuse. CNS 2020: 1-9 - [c43]Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites. DIMVA 2020: 171-191 - [c42]Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori:
Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints. EuroS&P Workshops 2020: 522-531 - [c41]Satoshi Furutani, Toshiki Shibahara, Kunio Hato, Mitsuaki Akiyama, Masaki Aida:
Sybil Detection as Graph Filtering. GLOBECOM 2020: 1-6 - [c40]Takayuki Tomatsuri, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Time-series Measurement of Parked Domain Names. GLOBECOM 2020: 1-6 - [c39]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites. NDSS 2020
2010 – 2019
- 2019
- [j26]Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Masayuki Murata:
Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities. IEICE Trans. Inf. Syst. 102-D(3): 430-443 (2019) - [j25]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, Kunio Hato:
Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning. IEICE Trans. Inf. Syst. 102-D(4): 725-736 (2019) - [j24]Tomofumi Nakamori, Daiki Chiba, Mitsuaki Akiyama, Shigeki Goto:
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records. J. Inf. Process. 27: 525-535 (2019) - [j23]Yuta Sawabe, Daiki Chiba, Mitsuaki Akiyama, Shigeki Goto:
Detection Method of Homograph Internationalized Domain Names with OCR. J. Inf. Process. 27: 536-544 (2019) - [j22]Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi:
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes. J. Inf. Process. 27: 545-554 (2019) - [c38]Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama:
I know what you did last login: inconsistent messages tell existence of a target's account to insiders. ACSAC 2019: 732-746 - [c37]Toshiki Shibahara, Hirokazu Kodera, Daiki Chiba, Mitsuaki Akiyama, Kunio Hato, Ola Söderström, Daniel Dalek, Masayuki Murata:
Cross-Vendor Knowledge Transfer for Managed Security Services with Triplet Network. AISec@CCS 2019: 59-69 - [c36]Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo:
A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States. AsiaCCS 2019: 485-492 - [c35]Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:
Poster: A First Look at the Privacy Risks of Voice Assistant Apps. CCS 2019: 2633-2635 - [c34]Tatsuhiko Yasumatsu, Takuya Watanabe, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Understanding the Responsiveness of Mobile App Developers to Software Library Updates. CODASPY 2019: 13-24 - [c33]Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Exploration into Gray Area: Efficient Labeling for Malicious Domain Name Detection. COMPSAC (1) 2019: 770-775 - [c32]Fumihiro Kanei, Daiki Chiba, Kunio Hato, Mitsuaki Akiyama:
Precise and Robust Detection of Advertising Fraud. COMPSAC (1) 2019: 776-785 - [c31]Keika Mori, Takuya Watanabe, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori:
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? EuroS&P Workshops 2019: 159-171 - [c30]Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Kunio Hato, Masaki Aida:
Graph Signal Processing for Directed Graphs Based on the Hermitian Laplacian. ECML/PKDD (1) 2019: 447-463 - [c29]Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Understanding the Risks of Deceptive IDNs. RAID 2019: 413-426 - 2018
- [j21]Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Tatsuya Mori, Shigeki Goto:
DomainChroma: Building actionable threat intelligence from malicious domain names. Comput. Secur. 77: 138-161 (2018) - [j20]Hiroki Nakano, Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Katsunari Yoshioka:
Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities. IEICE Trans. Inf. Syst. 101-D(11): 2576-2583 (2018) - [j19]Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, Tatsuya Mori:
Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps. IEICE Trans. Inf. Syst. 101-D(11): 2584-2599 (2018) - [j18]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Kazuhiko Ohkubo, Shigeki Goto:
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences. IEICE Trans. Inf. Syst. 101-D(11): 2600-2611 (2018) - [j17]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Taiga Hokaguchi, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2149-2161 (2018) - [j16]Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi:
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle. Int. J. Inf. Sec. 17(2): 135-151 (2018) - [j15]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. Int. J. Inf. Sec. 17(6): 661-680 (2018) - [j14]Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori:
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store. J. Inf. Process. 26: 212-223 (2018) - [c28]Elkana Pariwono, Daiki Chiba, Mitsuaki Akiyama, Tatsuya Mori:
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps. AsiaCCS 2018: 147-158 - [c27]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts. EuroS&P 2018: 323-337 - [c26]Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi:
A method for estimating process maliciousness with Seq2Seq model. ICOIN 2018: 255-260 - [c25]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Shigeki Goto:
POSTER: Predicting Website Abuse Using Update Histories. WWW (Companion Volume) 2018: 9-10 - [i2]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts. CoRR abs/1805.05085 (2018) - 2017
- [j13]Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Youki Kadobayashi:
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. Comput. Secur. 69: 155-173 (2017) - [j12]Yumehisa Haga, Yuta Takata, Mitsuaki Akiyama, Tatsuya Mori:
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study. IEICE Trans. Inf. Syst. 100-D(8): 1663-1670 (2017) - [j11]Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
Tracking the Human Mobility Using Mobile Device Sensors. IEICE Trans. Inf. Syst. 100-D(8): 1680-1690 (2017) - [j10]Yuta Ishii, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
APPraiser: A Large Scale Analysis of Android Clone Apps. IEICE Trans. Inf. Syst. 100-D(8): 1703-1713 (2017) - [j9]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces. IEICE Trans. Inf. Syst. 100-D(8): 1714-1728 (2017) - [j8]Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto:
Analysis of malware download sites by focusing on time series variation of malware. J. Comput. Sci. 22: 301-313 (2017) - [c24]Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori:
Characterizing Promotional Attacks in Mobile App Store. ATIS 2017: 113-127 - [c23]Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names. COMPSAC (1) 2017: 643-648 - [c22]Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada:
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities. COMPSAC (1) 2017: 655-664 - [c21]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Malicious URL sequence detection using event de-noising convolutional neural network. ICC 2017: 1-7 - [c20]Hideki Ogawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Mitsuaki Akiyama, Takeshi Yagi:
Malware originated HTTP traffic detection utilizing cluster appearance ratio. ICOIN 2017: 248-253 - [c19]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. MSR 2017: 14-24 - [c18]Yuta Ishii, Takuya Watanabe, Fumihiro Kanei, Yuta Takata, Eitaro Shioji, Mitsuaki Akiyama, Takeshi Yagi, Bo Sun, Tatsuya Mori:
Understanding the security management of global third-party Android marketplaces. WAMA@ESEC/SIGSOFT FSE 2017: 12-18 - [c17]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations. WISE (2) 2017: 278-294 - [i1]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules. CoRR abs/1702.03112 (2017) - 2016
- [j7]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks. IEICE Trans. Inf. Syst. 99-D(4): 860-872 (2016) - [j6]Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori:
Automating URL Blacklist Generation with Similarity Search Approach. IEICE Trans. Inf. Syst. 99-D(4): 873-882 (2016) - [j5]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure. IEICE Trans. Commun. 99-B(5): 1012-1023 (2016) - [c16]Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama:
Evaluation on Malware Classification by Session Sequence of Common Protocols. CANS 2016: 521-531 - [c15]Yuta Ishii, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
Clone or Relative?: Understanding the Origins of Similar Android Apps. IWSPA@CODASPY 2016: 25-32 - [c14]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. DSN 2016: 491-502 - [c13]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, Takeshi Yada:
Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning. GLOBECOM 2016: 1-7 - [c12]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Website Forensic Investigation to Identify Evidence and Impact of Compromise. SecureComm 2016: 431-453 - 2015
- [j4]Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi:
Client Honeypot Multiplication with High Performance and Precise Detection. IEICE Trans. Inf. Syst. 98-D(4): 775-787 (2015) - [j3]Mitsuhiro Hatada, Mitsuaki Akiyama, Takahiro Matsuki, Takahiro Kasama:
Empowering Anti-malware Research in Japan by Sharing the MWS Datasets. J. Inf. Process. 23(5): 579-588 (2015) - [c11]Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, Takeshi Yada:
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains. CCS 2015: 1671-1673 - [c10]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks. COMPSAC 2015: 444-449 - [c9]Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori:
AutoBLG: Automatic URL blacklist generator using search space expansion and filters. ISCC 2015: 625-631 - [c8]Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:
Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps. SOUPS 2015: 241-255 - [c7]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts. TrustCom/BigDataSE/ISPA (1) 2015: 758-765 - [c6]Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility. WOOT 2015 - 2013
- [j2]Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu:
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs. IT Prof. 15(4): 50-56 (2013) - [c5]Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi:
Active Credential Leakage for Observing Web-Based Attack Cycle. RAID 2013: 223-243 - 2012
- [c4]Gregory Blanc, Daisuke Miyamoto, Mitsuaki Akiyama, Youki Kadobayashi:
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts. AINA Workshops 2012: 344-351 - [c3]Mitsuaki Akiyama, Yuhei Kawakoya, Takeo Hariu:
Scalable and Performance-Efficient Client Honeypot on High Interaction System. SAINT 2012: 40-50 - 2011
- [c2]Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh:
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. SAINT 2011: 1-10 - 2010
- [j1]Mitsuaki Akiyama, Makoto Iwamura, Yuhei Kawakoya, Kazufumi Aoki, Mitsutaka Itoh:
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks. IEICE Trans. Commun. 93-B(5): 1131-1139 (2010)
2000 – 2009
- 2007
- [c1]Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi:
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. SAINT Workshops 2007: 82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-28 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint