Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps

Takuya Watanabe , Mitsuaki Akiyama , Tetsuya Sakai , Tatsuya Mori
symposium on usable privacy and security 241 -255

29
2015
Study on High Interaction Client Honeypot for Infiltrative Intrusion Detection

Mitsuaki Akiyama
奈良先端科学技術大学院大学

1
2013
Detecting Homograph IDNs Using OCR

Shigeki Goto , Mitsuaki Akiyama , Daiki Chiba , Yuta Sawabe
Proceedings of the Asia-Pacific Advanced Network 46 56 -64

7
2018
Detecting Dynamic IP Addresses Using the Sequential Characteristics of PTR Records

Shigeki Goto , Mitsuaki Akiyama , Daiki Chiba , Tomofumi Nakamori
Proceedings of the Asia-Pacific Advanced Network 46 40 -49

2018
A comprehensive measurement of cloud service abuse

Mitsuaki Akiyama , Daiki Chiba , Masato Uchida , Naoki Fukushi
Journal of Information Processing 29 93 -102

2021
Sybil Detection as Graph Filtering

Masaki Aida , Kunio Hato , Toshiki Shibahara , Mitsuaki Akiyama
global communications conference 1 -6

2020
Time-series Measurement of Parked Domain Names

Mitsuaki Akiyama , Daiki Chiba , Masato Uchida , Takayuki Tomatsuri
global communications conference 9322425

2020
A First Look at COVID-19 Domain Names: Origin and Implications

Tatsuya Mori , Takuya Watanabe , Mitsuaki Akiyama , Daiki Chiba
passive and active network measurement 39 -53

2021
Identifying the Phishing Websites Using the Patterns of TLS Certificates.

Tatsuya Mori , Takuya Watanabe , Mitsuaki Akiyama , Tetsuya Okuda
Journal of Cyber Security and Mobility 10 451–486 -451–486

2021
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox

Koji Nakao , Katsunari Yoshioka , Tsutomu Matsumoto , Mitsuaki Akiyama
IEICE Technical Report; IEICE Tech. Rep. 120 ( 384) 90 -95

2021
Understanding the Fake Removal Information Advertisement Sites

Katsunari Yoshioka , Takashi Koide , Tsutomu Matsumoto , Mitsuaki Akiyama
Journal of Information Processing 29 392 -405

2021
Detecting Malware-infected Hosts Using Templates of Multiple HTTP Requests

Taiga Hokaguchi , Yuichi Ohsita , Toshiki Shibahara , Daiki Chiba
consumer communications and networking conference 1 -2

2020
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior

Mitsuaki Akiyama , Takanori Kawamoto , Masayoshi Shimamura , Teruaki Yokoyama
symposium on applications and the internet 82 -82

51
2007
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting

Mitsuaki Akiyama , Takeshi Yagi , Mitsutaka Itoh
2011 IEEE/IPSJ International Symposium on Applications and the Internet 1 -10

24
2011
Scalable and Performance-Efficient Client Honeypot on High Interaction System

Mitsuaki Akiyama , Yuhei Kawakoya , Takeo Hariu
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet 40 -50

13
2012
Exploration into Gray Area: Efficient Labeling for Malicious Domain Name Detection

Naoki Fukushi , Daiki Chiba , Mitsuaki Akiyama , Masato Uchida
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) 1 770 -775

4
2019
Precise and Robust Detection of Advertising Fraud

Fumihiro Kanei , Daiki Chiba , Kunio Hato , Mitsuaki Akiyama
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) 776 -785

2019
Malicious URL sequence detection using event de-noising convolutional neural network

Toshiki Shibahara , Kohei Yamanishi , Yuta Takata , Daiki Chiba
international conference on communications 1 -7

41
2017
AutoBLG: Automatic URL blacklist generator using search space expansion and filters

Bo Sun , Mitsuaki Akiyama , Takeshi Yagi , Mitsuhiro Hatada
international symposium on computers and communications 625 -631

6
2015
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots

Mitsuaki Akiyama , Takeshi Yagi , Takeshi Yada , Tatsuya Mori
Computers & Security 69 155 -173

14
2017