Daisuke Miyamoto
Daisuke Miyamoto
Verified email at nc.u-tokyo.ac.jp
Title
Cited by
Cited by
Year
An evaluation of machine learning-based methods for detection of phishing sites
D Miyamoto, H Hazeyama, Y Kadobayashi
International Conference on Neural Information Processing, 539-546, 2008
1022008
SPS: a simple filtering algorithm to thwart phishing attacks
D Miyamoto, H Hazeyama, Y Kadobayashi
Asian Internet Engineering Conference, 195-209, 2005
372005
An autonomous architecture for inter-domain traceback across the borders of network operation
H Hazeyama, Y Kadobayashi, D Miyamoto, M Oe
11th IEEE Symposium on Computers and Communications (ISCC'06), 378-385, 2006
262006
A proposal of the AdaBoost-based detection of phishing sites
D Miyamoto, H Hazeyama, Y Kadobayashi
Proceedings of the joint workshop on information security, 2007
182007
Characterizing obfuscated JavaScript using abstract syntax trees: Experimenting with malicious scripts
G Blanc, D Miyamoto, M Akiyama, Y Kadobayashi
2012 26th International Conference on Advanced Information Networking and …, 2012
142012
Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures.
H Hazeyama, M Suzuki, S Miwa, D Miyamoto, Y Kadobayashi
CSET, 2008
142008
Eyebit: Eye-tracking approach for enforcing phishing prevention habits
D Miyamoto, T Iimura, G Blanc, H Tazaki, Y Kadobayashi
2014 Third International Workshop on Building Analysis Datasets and …, 2014
132014
RTOB: A TDMA-based MAC protocol to achieve high reliability of one-hop broadcast in VANET
F Han, D Miyamoto, Y Wakahara
2015 IEEE International Conference on Pervasive Computing and Communication …, 2015
122015
Taxonomical approach to the deployment of traceback mechanisms
T Takahashi, H Hazeyama, D Miyamoto, Y Kadobayashi
2011 Baltic Congress on Future Internet and Communications, 13-20, 2011
112011
An independent evaluation of web timing attack and its countermeasure
Y Nagami, D Miyamoto, H Hazeyama, Y Kadobayashi
2008 Third International Conference on Availability, Reliability and …, 2008
112008
Eye can tell: On the correlation between eye movement and phishing identification
D Miyamoto, G Blanc, Y Kadobayashi
International Conference on Neural Information Processing, 223-232, 2015
102015
Text-mining approach for estimating vulnerability score
Y Yamamoto, D Miyamoto, M Nakayama
2015 4th International Workshop on Building Analysis Datasets and Gathering …, 2015
102015
Expediting experiments across testbeds with AnyBed: a testbed-independent topology configuration system and its tool set
M Suzuki, H Hazeyama, D Miyamoto, S Miwa, Y Kadobayashi
IEICE TRANSACTIONS on Information and Systems 92 (10), 1877-1887, 2009
92009
Access control with uncertain surveillance
P Balbiani
The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05 …, 2005
92005
Toward automated vulnerability monitoring using open information and standardized tools
T Takahashi, D Miyamoto, K Nakao
2016 IEEE International Conference on Pervasive Computing and Communication …, 2016
82016
Source address validation support for network forensics
K Sisaat, D Miyamoto
Proceedings of the 1st Joint Workshop on Information Security, 2006
82006
AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS
P Mensah, G Blanc, K Okada, D Miyamoto, Y Kadobayashi
2015 4th International Workshop on Building Analysis Datasets and Gathering …, 2015
72015
Reputation scoring system using an economic trust model: a distributed approach to evaluate trusted third parties on the internet
M Vyshegorodtsev, D Miyamoto, Y Wakahara
2013 27th International Conference on Advanced Information Networking and …, 2013
72013
Classification of URL bitstreams using bag of bytes
K Shima, D Miyamoto, H Abe, T Ishihara, K Okada, Y Sekiya, H Asai, ...
2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018
62018
Toward automated reduction of human errors based on cognitive analysis
D Miyamoto, T Takahashi
2013 Seventh International Conference on Innovative Mobile and Internet …, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20