Kernel-based behavior analysis for android malware detection
T Isohara, K Takemori, A Kubota - 2011 seventh international …, 2011 - ieeexplore.ieee.org
The most major threat of Android users is malware infection via Android application markets.
In case of the Android Market, as security inspections are not applied for many users have …
In case of the Android Market, as security inspections are not applied for many users have …
Self-confidence trumps knowledge: A cross-cultural study of security behavior
Y Sawaya, M Sharif, N Christin, A Kubota… - Proceedings of the …, 2017 - dl.acm.org
Computer security tools usually provide universal solutions without taking user characteristics
(origin, income level, ...) into account. In this paper, we test the validity of using such …
(origin, income level, ...) into account. In this paper, we test the validity of using such …
SIBRA: Scalable internet bandwidth reservation architecture
This paper proposes a Scalable Internet Bandwidth Reservation Architecture (SIBRA) as a
new approach against DDoS attacks, which, until now, continue to be a menace on today's …
new approach against DDoS attacks, which, until now, continue to be a menace on today's …
Effect of exercise therapy on muscle mass and physical functioning in patients undergoing allogeneic hematopoietic stem cell transplantation
…, Y Murayama, A Maeda, N Nakano, A Kubota… - Supportive Care in …, 2015 - Springer
Purpose Allogeneic hematopoietic stem cell transplantation (allo-HSCT) is associated with
transplant-related toxicities, which may have a profound impact on a patient’s physical …
transplant-related toxicities, which may have a profound impact on a patient’s physical …
Predicting impending exposure to malicious content from user behavior
M Sharif, J Urakawa, N Christin, A Kubota… - Proceedings of the 2018 …, 2018 - dl.acm.org
Many computer-security defenses are reactive---they operate only when security incidents
take place, or immediately thereafter. Recent efforts have attempted to predict security …
take place, or immediately thereafter. Recent efforts have attempted to predict security …
Passive OS fingerprinting by DNS traffic analysis
…, A Yamada, A Kubota - 2013 IEEE 27th …, 2013 - ieeexplore.ieee.org
In this paper, we propose a new passive OS fingerprinting method which only requires DNS
traffic analysis. The method utilizes characteristics on DNS queries specific to each OS, eg …
traffic analysis. The method utilizes characteristics on DNS queries specific to each OS, eg …
OCALA: An Architecture for Supporting Legacy Applications over Overlays.
DA Joseph, J Kannan, A Kubota, K Lakshminarayanan… - NSDI, 2006 - usenix.org
In order for overlays and new network architectures to gain real user acceptance, users
should be able to leverage overlay functionality without any modifications to their applications …
should be able to leverage overlay functionality without any modifications to their applications …
Effect of anti‐CCR 4 monoclonal antibody (mogamulizumab) on adult T‐cell leukemia–lymphoma: Cutaneous adverse reactions may predict the prognosis
…, N Nakano, M Tokunaga, A Kubota… - The Journal of …, 2014 - Wiley Online Library
Adult T ‐cell leukemia–lymphoma ( ATL ) is one of the most malignant lymphomas with poor
prognosis. ATL cells express CC chemokine receptor 4 ( CCR 4) and mogamulizumab, a …
prognosis. ATL cells express CC chemokine receptor 4 ( CCR 4) and mogamulizumab, a …
Clinical significance of cutaneous adverse reaction to mogamulizumab in relapsed or refractory adult T-cell leukaemia-lymphoma.
…, N Nakano, Y Kamada, A Kubota… - British Journal of …, 2018 - search.ebscohost.com
The article focuses on findings of a study on clinical significance of cutaneous adverse reaction
to mogamulizumab in relapsed or refractory adult T-cell leukaemia-lymphoma. It states …
to mogamulizumab in relapsed or refractory adult T-cell leukaemia-lymphoma. It states …
Dynamic Inference from IoT Traffic Flows under Concept Drifts in Residential ISP Networks
…, N Okui, M Nakahara, A Kubota… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Millions of vulnerable consumer IoT devices in home networks are the enabler for cyber crimes
putting user privacy and Internet security at risk. Internet service providers (ISPs) are best …
putting user privacy and Internet security at risk. Internet service providers (ISPs) are best …