Mitsuaki Akiyama
Mitsuaki Akiyama
NTT
確認したメール アドレス: ieee.org
タイトル
引用先
引用先
Design and implementation of high interaction client honeypot for drive-by-download attacks
M Akiyama, M Iwamura, Y Kawakoya, K Aoki, M Itoh
IEICE transactions on communications 93 (5), 1131-1139, 2010
802010
A proposal of metrics for botnet detection based on its cooperative behavior
M Akiyama, T Kawamoto, M Shimamura, T Yokoyama, Y Kadobayashi, ...
2007 International Symposium on Applications and the Internet Workshops, 82-82, 2007
762007
Efficient dynamic malware analysis based on network behavior using deep learning
T Shibahara, T Yagi, M Akiyama, D Chiba, T Yada
2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016
492016
Searching structural neighborhood of malicious urls to improve blacklisting
M Akiyama, T Yagi, M Itoh
2011 IEEE/IPSJ International Symposium on Applications and the Internet, 1-10, 2011
442011
マルウェア対策のための研究用データセット~ MWS Datasets 2015~
神薗雅紀, 秋山満昭, 笠間貴弘, 村上純一, 畑田充弘, 寺田真敏
研究報告セキュリティ心理学とトラスト (SPT) 2015 (6), 1-8, 2015
37*2015
マルウェア対策のための研究用データセット~ MWS Datasets 2015~
神薗雅紀, 秋山満昭, 笠間貴弘, 村上純一, 畑田充弘, 寺田真敏
研究報告セキュリティ心理学とトラスト (SPT) 2015 (6), 1-8, 2015
37*2015
Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps
T Watanabe, M Akiyama, T Sakai, T Mori
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 241-255, 2015
332015
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
292017
マルウェア対策のための研究用データセット~ MWS Datasets 2014~
秋山満昭, 神薗雅紀, 松木隆宏, 畑田充弘
研究報告コンピュータセキュリティ (CSEC) 2014 (19), 1-7, 2014
282014
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots
M Akiyama, T Yagi, T Yada, T Mori, Y Kadobayashi
computers & security 69, 155-173, 2017
262017
Empowering anti-malware research in Japan by sharing the MWS datasets
M Hatada, M Akiyama, T Matsuki, T Kasama
Journal of Information Processing 23 (5), 579-588, 2015
242015
マルウェア対策のための研究用データセット~ MWS 2011 Datasets~
畑田充弘, 中津留勇, 秋山満昭
コンピュータセキュリティシンポジウム 2011 論文集 2011 (3), 1-5, 2011
232011
DomainProfiler: Discovering domain names abused in future
D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
222016
Datasets for anti-malware research mws 2010 datasets
M Hatada, Y Nakatsuru, M Akiyama, S Miwa
Proc. IPSJ Computer Security Symposium (CSS 2011), 1-5, 2011
222011
Malicious URL sequence detection using event de-noising convolutional neural network
T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ...
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
212017
Scalable and performance-efficient client honeypot on high interaction system
M Akiyama, Y Kawakoya, T Hariu
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012
202012
Datasets for anti-malware research-MWS datasets 2013
M Kamizono, M Hatada, M Terada, M Akiyama, T Kasama, J Murakami
Proc. Computer Security Symposium 2013 (CSS2013), 1-8, 2013
192013
Analysis of malware download sites by focusing on time series variation of malware
Y Tanaka, M Akiyama, A Goto
Journal of computational science 22, 301-313, 2017
162017
Client honeypot multiplication with high performance and precise detection
M Akiyama, T Yagi, Y Kadobayashi, T Hariu, S Yamaguchi
IEICE TRANSACTIONS on Information and Systems 98 (4), 775-787, 2015
162015
Active credential leakage for observing web-based attack cycle
M Akiyama, T Yagi, K Aoki, T Hariu, Y Kadobayashi
International Workshop on Recent Advances in Intrusion Detection, 223-243, 2013
162013
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20