BibTeX records: Takeshi Takahashi 0001

download as .bib file

@article{DBLP:journals/access/HeHITKT23,
  author       = {Tianxiang He and
                  Chansu Han and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Shuji Kijima and
                  Jun'ichi Takeuchi},
  title        = {Scalable and Fast Algorithm for Constructing Phylogenetic Trees With
                  Application to IoT Malware Clustering},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {8240--8253},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3238711},
  doi          = {10.1109/ACCESS.2023.3238711},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HeHITKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TanakaHT23,
  author       = {Akira Tanaka and
                  Chansu Han and
                  Takeshi Takahashi},
  title        = {Detecting Coordinated Internet-Wide Scanning by {TCP/IP} Header Fingerprint},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {23227--23244},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3249474},
  doi          = {10.1109/ACCESS.2023.3249474},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TanakaHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RoziBOYTKI23,
  author       = {Muhammad Fakhrur Rozi and
                  Tao Ban and
                  Seiichi Ozawa and
                  Akira Yamada and
                  Takeshi Takahashi and
                  Sangwook Kim and
                  Daisuke Inoue},
  title        = {Detecting Malicious JavaScript Using Structure-Based Analysis of Graph
                  Representation},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {102727--102745},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3317266},
  doi          = {10.1109/ACCESS.2023.3317266},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RoziBOYTKI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MiyamotoIHBTT23,
  author       = {Kohei Miyamoto and
                  Masazumi Iida and
                  Chansu Han and
                  Tao Ban and
                  Takeshi Takahashi and
                  Jun'ichi Takeuchi},
  title        = {Consolidating Packet-Level Features for Effective Network Intrusion
                  Detection: {A} Novel Session-Level Approach},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {132792--132810},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3335600},
  doi          = {10.1109/ACCESS.2023.3335600},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MiyamotoIHBTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PattaranantakulVT23,
  author       = {Montida Pattaranantakul and
                  Chalee Vorakulpipat and
                  Takeshi Takahashi},
  title        = {Service Function Chaining security survey: Addressing security challenges
                  and threats},
  journal      = {Comput. Networks},
  volume       = {221},
  pages        = {109484},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2022.109484},
  doi          = {10.1016/J.COMNET.2022.109484},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/PattaranantakulVT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuBCTI23,
  author       = {Chia{-}Yi Wu and
                  Tao Ban and
                  Shin{-}Ming Cheng and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {IoT malware classification based on reinterpreted function-call graphs},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103060},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103060},
  doi          = {10.1016/J.COSE.2022.103060},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WuBCTI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/NakaoYSTHTFTMSITITY23,
  author       = {Koji Nakao and
                  Katsunari Yoshioka and
                  Takayuki Sasaki and
                  Rui Tanabe and
                  Xuping Huang and
                  Takeshi Takahashi and
                  Akira Fujita and
                  Jun'ichi Takeuchi and
                  Noboru Murata and
                  Junji Shikata and
                  Kazuki Iwamoto and
                  Kazuki Takada and
                  Yuki Ishida and
                  Masaru Takeuchi and
                  Naoto Yanai},
  title        = {Mitigate: Toward Comprehensive Research and Development for Analyzing
                  and Combating IoT Malware},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {106},
  number       = {9},
  pages        = {1302--1315},
  year         = {2023},
  url          = {https://doi.org/10.1587/transinf.2022ici0001},
  doi          = {10.1587/TRANSINF.2022ICI0001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/NakaoYSTHTFTMSITITY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/ChangCHMTL23,
  author       = {Yu{-}Wei Chang and
                  Hong{-}Yen Chen and
                  Chansu Han and
                  Tomohiro Morikawa and
                  Takeshi Takahashi and
                  Tsung{-}Nan Lin},
  title        = {{FINISH:} Efficient and Scalable NMF-Based Federated Learning for
                  Detecting Malware Activities},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {934--949},
  year         = {2023},
  url          = {https://doi.org/10.1109/TETC.2023.3292924},
  doi          = {10.1109/TETC.2023.3292924},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/ChangCHMTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/artman/JungF0S23,
  author       = {Soohyun Jung and
                  Keisuke Furumoto and
                  Takeshi Takahashi and
                  Yoshiaki Shiraishi},
  editor       = {Gregory Blanc and
                  Takeshi Takahashi and
                  Zonghua Zhang},
  title        = {Model Selection for Continuous Operation of Automated Vulnerability
                  Assessment System},
  booktitle    = {Proceedings of the 2023 Workshop on Recent Advances in Resilient and
                  Trustworthy {ML} Systems in Autonomous Networks, {ARTMAN} 2023, Copenhagen,
                  Denmark, 30 November 2023},
  pages        = {11--15},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605772.3624006},
  doi          = {10.1145/3605772.3624006},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/artman/JungF0S23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/artman/Tanuwidjaja0LLB23,
  author       = {Harry Chandra Tanuwidjaja and
                  Takeshi Takahashi and
                  Tsung{-}Nan Lin and
                  Boyi Lee and
                  Tao Ban},
  editor       = {Gregory Blanc and
                  Takeshi Takahashi and
                  Zonghua Zhang},
  title        = {Hybrid Explainable Intrusion Detection System: Global vs. Local Approach},
  booktitle    = {Proceedings of the 2023 Workshop on Recent Advances in Resilient and
                  Trustworthy {ML} Systems in Autonomous Networks, {ARTMAN} 2023, Copenhagen,
                  Denmark, 30 November 2023},
  pages        = {37--42},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605772.3624004},
  doi          = {10.1145/3605772.3624004},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/artman/Tanuwidjaja0LLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KawanakaKMIHBTT23,
  author       = {Shota Kawanaka and
                  Yoshikatsu Kashiwabara and
                  Kohei Miyamoto and
                  Masazumi Iida and
                  Chansu Han and
                  Tao Ban and
                  Takeshi Takahashi and
                  Jun'ichi Takeuchi},
  title        = {Packet-Level Intrusion Detection Using {LSTM} Focusing on Personal
                  Information and Payloads},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {88--94},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00024},
  doi          = {10.1109/ASIAJCIS60284.2023.00024},
  timestamp    = {Mon, 22 Jan 2024 19:57:57 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KawanakaKMIHBTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/NdichuBTI23,
  author       = {Samuel Ndichu and
                  Tao Ban and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  editor       = {Jingrui He and
                  Themis Palpanas and
                  Xiaohua Hu and
                  Alfredo Cuzzocrea and
                  Dejing Dou and
                  Dominik Slezak and
                  Wei Wang and
                  Aleksandra Gruca and
                  Jerry Chun{-}Wei Lin and
                  Rakesh Agrawal},
  title        = {Machine Learning-Based Security Alert Screening with Focal Loss},
  booktitle    = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento,
                  Italy, December 15-18, 2023},
  pages        = {3043--3052},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigData59044.2023.10386263},
  doi          = {10.1109/BIGDATA59044.2023.10386263},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/NdichuBTI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Blanc0Z23,
  author       = {Gregory Blanc and
                  Takeshi Takahashi and
                  Zonghua Zhang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {{ARTMAN} '23: First Workshop on Recent Advances in Resilient and Trustworthy
                  {ML} Systems in Autonomous Networks},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3662--3663},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3624027},
  doi          = {10.1145/3576915.3624027},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Blanc0Z23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/HeHT0T23,
  author       = {Tianxiang He and
                  Chansu Han and
                  Akira Tanaka and
                  Takeshi Takahashi and
                  Jun'ichi Takeuchi},
  editor       = {Andrea Bartolini and
                  Kristian F. D. Rietveld and
                  Catherine D. Schuman and
                  Jose Moreira},
  title        = {Work in Progress: New Seed Set Selection Method of the Scalable Method
                  for Constructing Phylogenetic Trees},
  booktitle    = {Proceedings of the 20th {ACM} International Conference on Computing
                  Frontiers, {CF} 2023, Bologna, Italy, May 9-11, 2023},
  pages        = {364--365},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3587135.3592820},
  doi          = {10.1145/3587135.3592820},
  timestamp    = {Sat, 30 Sep 2023 09:36:30 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/HeHT0T23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/OshioTHHTTT23,
  author       = {Kei Oshio and
                  Satoshi Takada and
                  Tianxiang He and
                  Chansu Han and
                  Akira Tanaka and
                  Takeshi Takahashi and
                  Jun'ichi Takeuchi},
  editor       = {Hossain Shahriar and
                  Yuuichi Teranishi and
                  Alfredo Cuzzocrea and
                  Moushumi Sharmin and
                  Dave Towey and
                  A. K. M. Jahangir Alam Majumder and
                  Hiroki Kashiwazaki and
                  Ji{-}Jiang Yang and
                  Michiharu Takemoto and
                  Nazmus Sakib and
                  Ryohei Banno and
                  Sheikh Iqbal Ahamed},
  title        = {Towards Functional Analysis of IoT Malware Using Function Call Sequence
                  Graphs and Clustering},
  booktitle    = {47th {IEEE} Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2023, Torino, Italy, June 26-30, 2023},
  pages        = {1552--1557},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMPSAC57700.2023.00239},
  doi          = {10.1109/COMPSAC57700.2023.00239},
  timestamp    = {Mon, 07 Aug 2023 15:56:21 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/OshioTHHTTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HanTT0ML23,
  author       = {Chansu Han and
                  Akira Tanaka and
                  Jun'ichi Takeuchi and
                  Takeshi Takahashi and
                  Tomohiro Morikawa and
                  Tsung{-}Nan Lin},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns
                  Based on Darknet Analysis},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {617--625},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011769300003405},
  doi          = {10.5220/0011769300003405},
  timestamp    = {Thu, 11 May 2023 10:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HanTT0ML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/ZhouBMTI23,
  author       = {Jiaxing Zhou and
                  Tao Ban and
                  Tomohiro Morikawa and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Color-coded Attribute Graph: Visual Exploration of Distinctive Traits
                  of IoT-Malware Families},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth,
                  Tunisia, July 9-12, 2023},
  pages        = {1410--1416},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISCC58397.2023.10217974},
  doi          = {10.1109/ISCC58397.2023.10217974},
  timestamp    = {Wed, 06 Sep 2023 08:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/ZhouBMTI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/artman/2023,
  editor       = {Gregory Blanc and
                  Takeshi Takahashi and
                  Zonghua Zhang},
  title        = {Proceedings of the 2023 Workshop on Recent Advances in Resilient and
                  Trustworthy {ML} Systems in Autonomous Networks, {ARTMAN} 2023, Copenhagen,
                  Denmark, 30 November 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605772},
  doi          = {10.1145/3605772},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/artman/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HanTTI22,
  author       = {Chansu Han and
                  Jun'ichi Takeuchi and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Dark-TRACER: Early Detection Framework for Malware Activity Based
                  on Anomalous Spatiotemporal Patterns},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {13038--13058},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3145966},
  doi          = {10.1109/ACCESS.2022.3145966},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HanTTI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/IshibashiMHBTT22,
  author       = {Ryosuke Ishibashi and
                  Kohei Miyamoto and
                  Chansu Han and
                  Tao Ban and
                  Takeshi Takahashi and
                  Jun'ichi Takeuchi},
  title        = {Generating Labeled Training Datasets Towards Unified Network Intrusion
                  Detection Systems},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {53972--53986},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3176098},
  doi          = {10.1109/ACCESS.2022.3176098},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/IshibashiMHBTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CharmetMT22,
  author       = {Fabien Charmet and
                  Tomohiro Morikawa and
                  Takeshi Takahashi},
  title        = {Toward a Better Understanding of Mobile Users' Behavior: {A} Web Session
                  Repair Scheme},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {99931--99943},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3206402},
  doi          = {10.1109/ACCESS.2022.3206402},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/CharmetMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/BlancLLTZ22,
  author       = {Gregory Blanc and
                  Yang Liu and
                  Rongxing Lu and
                  Takeshi Takahashi and
                  Zonghua Zhang},
  title        = {Interactions between artificial intelligence and cybersecurity to
                  protect future networks},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {77},
  number       = {11-12},
  pages        = {727--729},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12243-022-00935-6},
  doi          = {10.1007/S12243-022-00935-6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adt/BlancLLTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/OsadaNSTFTMM22,
  author       = {Yuki Osada and
                  Ryusei Nagasawa and
                  Yoshiaki Shiraishi and
                  Makoto Takita and
                  Keisuke Furumoto and
                  Takeshi Takahashi and
                  Masami Mohri and
                  Masakatu Morii},
  title        = {Multi-labeling with topic models for searching security information},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {77},
  number       = {11-12},
  pages        = {777--788},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12243-022-00928-5},
  doi          = {10.1007/S12243-022-00928-5},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adt/OsadaNSTFTMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/CharmetTAGHJBTZ22,
  author       = {Fabien Charmet and
                  Harry Chandra Tanuwidjaja and
                  Solayman Ayoubi and
                  Pierre{-}Fran{\c{c}}ois Gimenez and
                  Yufei Han and
                  Houda Jmila and
                  Gregory Blanc and
                  Takeshi Takahashi and
                  Zonghua Zhang},
  title        = {Explainable artificial intelligence for cybersecurity: a literature
                  survey},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {77},
  number       = {11-12},
  pages        = {789--812},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12243-022-00926-7},
  doi          = {10.1007/S12243-022-00926-7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/CharmetTAGHJBTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/SunTBI22,
  author       = {Bo Sun and
                  Takeshi Takahashi and
                  Tao Ban and
                  Daisuke Inoue},
  title        = {Detecting Android Malware and Classifying Its Families in Large-scale
                  Datasets},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {13},
  number       = {2},
  pages        = {12:1--12:21},
  year         = {2022},
  url          = {https://doi.org/10.1145/3464323},
  doi          = {10.1145/3464323},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/SunTBI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/CharmetTMT22,
  author       = {Fabien Charmet and
                  Harry Chandra Tanuwidjaja and
                  Tomohiro Morikawa and
                  Takeshi Takahashi},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Towards Polyvalent Adversarial Attacks on {URL} Classification Engines},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1246--1248},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3527282},
  doi          = {10.1145/3488932.3527282},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/CharmetTMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NdichuBTI22,
  author       = {Samuel Ndichu and
                  Tao Ban and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Security-Alert Screening with Oversampling Based on Conditional Generative
                  Adversarial Networks},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00011},
  doi          = {10.1109/ASIAJCIS57030.2022.00011},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NdichuBTI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/HanTT22,
  author       = {Chansu Han and
                  Akira Tanaka and
                  Takeshi Takahashi},
  editor       = {Shusaku Tsumoto and
                  Yukio Ohsawa and
                  Lei Chen and
                  Dirk Van den Poel and
                  Xiaohua Hu and
                  Yoichi Motomura and
                  Takuya Takagi and
                  Lingfei Wu and
                  Ying Xie and
                  Akihiro Abe and
                  Vijay Raghavan},
  title        = {Darknet Analysis-Based Early Detection Framework for Malware Activity:
                  Issue and Potential Extension},
  booktitle    = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka,
                  Japan, December 17-20, 2022},
  pages        = {2980--2988},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigData55660.2022.10021021},
  doi          = {10.1109/BIGDATA55660.2022.10021021},
  timestamp    = {Fri, 18 Aug 2023 17:39:03 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/HanTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/NdichuBTI22,
  author       = {Samuel Ndichu and
                  Tao Ban and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  editor       = {Shusaku Tsumoto and
                  Yukio Ohsawa and
                  Lei Chen and
                  Dirk Van den Poel and
                  Xiaohua Hu and
                  Yoichi Motomura and
                  Takuya Takagi and
                  Lingfei Wu and
                  Ying Xie and
                  Akihiro Abe and
                  Vijay Raghavan},
  title        = {Critical-Threat-Alert Detection using Online Machine Learning},
  booktitle    = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka,
                  Japan, December 17-20, 2022},
  pages        = {3007--3014},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigData55660.2022.10021115},
  doi          = {10.1109/BIGDATA55660.2022.10021115},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/NdichuBTI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/FanSHBMT22,
  author       = {Chun{-}I Fan and
                  Cheng{-}Han Shie and
                  Che{-}Ming Hsu and
                  Tao Ban and
                  Tomohiro Morikawa and
                  Takeshi Takahashi},
  title        = {IoT Botnet Detection Based on the Behaviors of {DNS} Queries},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022,
                  Edinburgh, UK, June 22-24, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSC54232.2022.9888913},
  doi          = {10.1109/DSC54232.2022.9888913},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/FanSHBMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LinWCMTL22,
  author       = {Shih{-}Chun Lin and
                  Pang{-}Cheng Wl and
                  Hong{-}Yen Chen and
                  Tomohiro Morikawa and
                  Takeshi Takahashi and
                  Tsung{-}Nan Lin},
  title        = {SenseInput: An Image-Based Sensitive Input Detection Scheme for Phishing
                  Website Detection},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul,
                  Korea, May 16-20, 2022},
  pages        = {4180--4186},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICC45855.2022.9838653},
  doi          = {10.1109/ICC45855.2022.9838653},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LinWCMTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/UmizakiMFTLI22,
  author       = {Mitsuhiro Umizaki and
                  Tomohiro Morikawa and
                  Akira Fujita and
                  Takeshi Takahashi and
                  Tsung{-}Nan Lin and
                  Daisuke Inoue},
  title        = {Understanding the Characteristics of Public Blocklist Providers},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2022, Rhodes,
                  Greece, June 30 - July 3, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISCC55528.2022.9913009},
  doi          = {10.1109/ISCC55528.2022.9913009},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/UmizakiMFTLI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispr/MiyamotoGIHB0T22,
  author       = {Kohei Miyamoto and
                  Hiroki Goto and
                  Ryosuke Ishibashi and
                  Chansu Han and
                  Tao Ban and
                  Takeshi Takahashi and
                  Jun'ichi Takeuchi},
  editor       = {Akram Bennour and
                  Tolga Ensari and
                  Yousri Kessentini and
                  Sean Eom},
  title        = {Malicious Packet Classification Based on Neural Network Using Kitsune
                  Features},
  booktitle    = {Intelligent Systems and Pattern Recognition - Second International
                  Conference, {ISPR} 2022, Hammamet, Tunisia, March 24-26, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1589},
  pages        = {306--314},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-08277-1\_25},
  doi          = {10.1007/978-3-031-08277-1\_25},
  timestamp    = {Fri, 17 Nov 2023 14:19:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ispr/MiyamotoGIHB0T22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SunBHTYTSQI21,
  author       = {Bo Sun and
                  Tao Ban and
                  Chansu Han and
                  Takeshi Takahashi and
                  Katsunari Yoshioka and
                  Jun'ichi Takeuchi and
                  Abdolhossein Sarrafzadeh and
                  Meikang Qiu and
                  Daisuke Inoue},
  title        = {Leveraging Machine Learning Techniques to Identify Deceptive Decoy
                  Documents Associated With Targeted Email Attacks},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {87962--87971},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3082000},
  doi          = {10.1109/ACCESS.2021.3082000},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SunBHTYTSQI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenCTSL21,
  author       = {Yun{-}Chung Chen and
                  Hong{-}Yen Chen and
                  Takeshi Takahashi and
                  Bo Sun and
                  Tsung{-}Nan Lin},
  title        = {Impact of Code Deobfuscation and Feature Interaction in Android Malware
                  Detection},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {123208--123219},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3110408},
  doi          = {10.1109/ACCESS.2021.3110408},
  timestamp    = {Wed, 06 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChenCTSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/NagasawaFTSTMTM21,
  author       = {Ryusei Nagasawa and
                  Keisuke Furumoto and
                  Makoto Takita and
                  Yoshiaki Shiraishi and
                  Takeshi Takahashi and
                  Masami Mohri and
                  Yasuhiro Takano and
                  Masakatu Morii},
  title        = {Partition-then-Overlap Method for Labeling Cyber Threat Intelligence
                  Reports by Topics over Time},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {104-D},
  number       = {5},
  pages        = {556--561},
  year         = {2021},
  url          = {http://search.ieice.org/bin/summary.php?id=e104-d\_5\_556},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/NagasawaFTSTMTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/IijimaMZTTOM21,
  author       = {Ryo Iijima and
                  Shota Minami and
                  Yunao Zhou and
                  Tatsuya Takehisa and
                  Takeshi Takahashi and
                  Yasuhiro Oikawa and
                  Tatsuya Mori},
  title        = {Audio Hotspot Attack: An Attack on Voice Assistance Systems Using
                  Directional Sound Beams and its Feasibility},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {2004--2018},
  year         = {2021},
  url          = {https://doi.org/10.1109/TETC.2019.2953041},
  doi          = {10.1109/TETC.2019.2953041},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/IijimaMZTTOM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/IshibashiGHBTT21,
  author       = {Ryosuke Ishibashi and
                  Hiroki Goto and
                  Chansu Han and
                  Tao Ban and
                  Takeshi Takahashi and
                  Jun'ichi Takeuchi},
  title        = {Which Packet Did They Catch? Associating {NIDS} Alerts with Their
                  Communication Sessions},
  booktitle    = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021.00012},
  doi          = {10.1109/ASIAJCIS53848.2021.00012},
  timestamp    = {Thu, 14 Oct 2021 16:38:35 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/IshibashiGHBTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/NdichuB0I21,
  author       = {Samuel Ndichu and
                  Tao Ban and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  editor       = {Yixin Chen and
                  Heiko Ludwig and
                  Yicheng Tu and
                  Usama M. Fayyad and
                  Xingquan Zhu and
                  Xiaohua Hu and
                  Suren Byna and
                  Xiong Liu and
                  Jianping Zhang and
                  Shirui Pan and
                  Vagelis Papalexakis and
                  Jianwu Wang and
                  Alfredo Cuzzocrea and
                  Carlos Ordonez},
  title        = {A Machine Learning Approach to Detection of Critical Alerts from Imbalanced
                  Multi-Appliance Threat Alert Logs},
  booktitle    = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando,
                  FL, USA, December 15-18, 2021},
  pages        = {2119--2127},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigData52589.2021.9671956},
  doi          = {10.1109/BIGDATA52589.2021.9671956},
  timestamp    = {Fri, 13 Jan 2023 17:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/NdichuB0I21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MasumiHB021,
  author       = {Kohei Masumi and
                  Chansu Han and
                  Tao Ban and
                  Takeshi Takahashi},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay
                  and Snort},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {329--331},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3450326},
  doi          = {10.1145/3422337.3450326},
  timestamp    = {Wed, 21 Apr 2021 10:54:09 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/MasumiHB021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmec/HeHTKT21,
  author       = {Tianxiang He and
                  Chansu Han and
                  Takeshi Takahashi and
                  Shuji Kijima and
                  Jun'ichi Takeuchi},
  title        = {Scalable and Fast Hierarchical Clustering of IoT Malware Using Active
                  Data Selection},
  booktitle    = {Sixth International Conference on Fog and Mobile Edge Computing, {FMEC}
                  2021, Gandia, Spain, December 6-9, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/FMEC54266.2021.9732550},
  doi          = {10.1109/FMEC54266.2021.9732550},
  timestamp    = {Mon, 21 Mar 2022 18:09:54 +0100},
  biburl       = {https://dblp.org/rec/conf/fmec/HeHTKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmec/TanakaHTF21,
  author       = {Akira Tanaka and
                  Chansu Han and
                  Takeshi Takahashi and
                  Katsuki Fujisawa},
  title        = {Internet-Wide Scanner Fingerprint Identifier Based on {TCP/IP} Header},
  booktitle    = {Sixth International Conference on Fog and Mobile Edge Computing, {FMEC}
                  2021, Gandia, Spain, December 6-9, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/FMEC54266.2021.9732414},
  doi          = {10.1109/FMEC54266.2021.9732414},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fmec/TanakaHTF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/RoziBOKTI21,
  author       = {Muhammad Fakhrur Rozi and
                  Tao Ban and
                  Seiichi Ozawa and
                  Sangwook Kim and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  editor       = {Teddy Mantoro and
                  Minho Lee and
                  Media Anugerah Ayu and
                  Kok Wai Wong and
                  Achmad Nizar Hidayanto},
  title        = {JStrack: Enriching Malicious JavaScript Detection Based on {AST} Graph
                  Analysis and Attention Mechanism},
  booktitle    = {Neural Information Processing - 28th International Conference, {ICONIP}
                  2021, Sanur, Bali, Indonesia, December 8-12, 2021, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13109},
  pages        = {669--680},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92270-2\_57},
  doi          = {10.1007/978-3-030-92270-2\_57},
  timestamp    = {Tue, 14 Dec 2021 17:56:34 +0100},
  biburl       = {https://dblp.org/rec/conf/iconip/RoziBOKTI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/FurumotoUFNTI21,
  author       = {Keisuke Furumoto and
                  Mitsuhiro Umizaki and
                  Akira Fujita and
                  Takahiko Nagata and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Extracting Threat Intelligence Related IoT Botnet From Latest Dark
                  Web Data Collection},
  booktitle    = {2021 {IEEE} International Conferences on Internet of Things (iThings)
                  and {IEEE} Green Computing {\&} Communications (GreenCom) and
                  {IEEE} Cyber, Physical {\&} Social Computing (CPSCom) and {IEEE}
                  Smart Data (SmartData) and {IEEE} Congress on Cybermatics (Cybermatics),
                  Melbourne, Australia, December 6-8, 2021},
  pages        = {138--145},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics53846.2021.00034},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS53846.2021.00034},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ithings/FurumotoUFNTI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/TakahashiUHBFNY21,
  author       = {Takeshi Takahashi and
                  Yuki Umemura and
                  Chansu Han and
                  Tao Ban and
                  Keisuke Furumoto and
                  Ohnori Nakamura and
                  Katsunari Yoshioka and
                  Jun'ichi Takeuchi and
                  Noboru Murata and
                  Yoshiaki Shiraishi},
  title        = {Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate
                  Analysis Engines?},
  booktitle    = {19th {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops and other Affiliated Events, PerCom Workshops 2021, Kassel,
                  Germany, March 22-26, 2021},
  pages        = {376--379},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PerComWorkshops51409.2021.9431125},
  doi          = {10.1109/PERCOMWORKSHOPS51409.2021.9431125},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/TakahashiUHBFNY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/WuBCST21,
  author       = {Chia{-}Yi Wu and
                  Tao Ban and
                  Shin{-}Ming Cheng and
                  Bo Sun and
                  Takeshi Takahashi},
  title        = {IoT Malware Detection Using Function-Call-Graph Embedding},
  booktitle    = {18th International Conference on Privacy, Security and Trust, {PST}
                  2021, Auckland, New Zealand, December 13-15, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PST52912.2021.9647806},
  doi          = {10.1109/PST52912.2021.9647806},
  timestamp    = {Tue, 28 Dec 2021 14:39:32 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/WuBCST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/HaraTIO21,
  author       = {Kazuki Hara and
                  Takeshi Takahashi and
                  Motoya Ishimaki and
                  Kazumasa Omote},
  title        = {Machine-learning Approach using Solidity Bytecode for Smart-contract
                  Honeypot Detection in the Ethereum},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10,
                  2021},
  pages        = {652--659},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS-C55045.2021.00099},
  doi          = {10.1109/QRS-C55045.2021.00099},
  timestamp    = {Tue, 12 Apr 2022 17:57:49 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/HaraTIO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KawasoeHI0T21,
  author       = {Reo Kawasoe and
                  Chansu Han and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Jun'ichi Takeuchi},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {Investigating behavioral differences between IoT malware via function
                  call sequence graphs},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {1674--1682},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3442041},
  doi          = {10.1145/3412841.3442041},
  timestamp    = {Mon, 03 May 2021 14:34:56 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/KawasoeHI0T21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanTTI21,
  author       = {Chansu Han and
                  Jun'ichi Takeuchi and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Automated Detection of Malware Activities Using Nonnegative Matrix
                  Factorization},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {548--556},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00085},
  doi          = {10.1109/TRUSTCOM53373.2021.00085},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanTTI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AotaB0M21,
  author       = {Masaki Aota and
                  Tao Ban and
                  Takeshi Takahashi and
                  Noboru Murata},
  title        = {Multi-label Positive and Unlabeled Learning and its Application to
                  Common Vulnerabilities and Exposure Categorization},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {988--996},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00137},
  doi          = {10.1109/TRUSTCOM53373.2021.00137},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AotaB0M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FujitaBTI21,
  author       = {Akira Fujita and
                  Tao Ban and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {On-premises Analysis of Advanced Threat Prevention Appliances},
  booktitle    = {{CSET} '21: Cyber Security Experimentation and Test Workshop, Virtual,
                  9 August 2021},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474718.3474720},
  doi          = {10.1145/3474718.3474720},
  timestamp    = {Tue, 18 Oct 2022 12:47:08 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/FujitaBTI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BanSTI21,
  author       = {Tao Ban and
                  Samuel Ndichu and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Combat Security Alert Fatigue with AI-Assisted Techniques},
  booktitle    = {{CSET} '21: Cyber Security Experimentation and Test Workshop, Virtual,
                  9 August 2021},
  pages        = {9--16},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474718.3474723},
  doi          = {10.1145/3474718.3474723},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BanSTI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AminantoBITI20,
  author       = {Muhamad Erza Aminanto and
                  Tao Ban and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Threat Alert Prioritization Using Isolation Forest and Stacked Auto
                  Encoder With Day-Forward-Chaining Analysis},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {217977--217986},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3041837},
  doi          = {10.1109/ACCESS.2020.3041837},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AminantoBITI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/HanSTITN20,
  author       = {Chansu Han and
                  Jumpei Shimamura and
                  Takeshi Takahashi and
                  Daisuke Inoue and
                  Jun'ichi Takeuchi and
                  Koji Nakao},
  title        = {Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating
                  Anomalous Synchronization Using Graphical Lasso},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {10},
  pages        = {2113--2124},
  year         = {2020},
  url          = {https://doi.org/10.1587/transinf.2020EDP7076},
  doi          = {10.1587/TRANSINF.2020EDP7076},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/HanSTITN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/TakahashiCSKT20,
  author       = {Takeshi Takahashi and
                  Rodrigo Roman Castro and
                  Bilhanan Silverajan and
                  Ryan K. L. Ko and
                  Said Tabet},
  title        = {Message from the guest editors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {19},
  number       = {1},
  pages        = {1--2},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10207-019-00472-9},
  doi          = {10.1007/S10207-019-00472-9},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/TakahashiCSKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcomps/WanBCLSITI20,
  author       = {Tzu{-}Ling Wan and
                  Tao Ban and
                  Shin{-}Ming Cheng and
                  Yen{-}Ting Lee and
                  Bo Sun and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Efficient Detection and Classification of Internet-of-Things Malware
                  Based on Byte Sequences from Executable Files},
  journal      = {{IEEE} Open J. Comput. Soc.},
  volume       = {1},
  pages        = {262--275},
  year         = {2020},
  url          = {https://doi.org/10.1109/OJCS.2020.3033974},
  doi          = {10.1109/OJCS.2020.3033974},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcomps/WanBCLSITI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HsuWFSB0WK20,
  author       = {Ruei{-}Hau Hsu and
                  Yi{-}Cheng Wang and
                  Chun{-}I Fan and
                  Bo Sun and
                  Tao Ban and
                  Takeshi Takahashi and
                  Ting{-}Wei Wu and
                  Shang{-}Wei Kao},
  title        = {A Privacy-Preserving Federated Learning System for Android Malware
                  Detection Based on Edge Computing},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {128--136},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00031},
  doi          = {10.1109/ASIAJCIS50894.2020.00031},
  timestamp    = {Tue, 22 Sep 2020 10:17:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HsuWFSB0WK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WanBLCI0I20,
  author       = {Tzu{-}Ling Wan and
                  Tao Ban and
                  Yen{-}Ting Lee and
                  Shin{-}Ming Cheng and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {IoT-Malware Detection Based on Byte Sequences of Executable Files},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {143--150},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00033},
  doi          = {10.1109/ASIAJCIS50894.2020.00033},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WanBLCI0I20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/AotaKKMS020,
  author       = {Masaki Aota and
                  Hideaki Kanehara and
                  Masaki Kubo and
                  Noboru Murata and
                  Bo Sun and
                  Takeshi Takahashi},
  title        = {Automation of Vulnerability Classification from its Description using
                  Machine Learning},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes,
                  France, July 7-10, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISCC50000.2020.9219568},
  doi          = {10.1109/ISCC50000.2020.9219568},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/AotaKKMS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/FurumotoKSTIN20,
  author       = {Keisuke Furumoto and
                  Antti Kolehmainen and
                  Bilhanan Silverajan and
                  Takeshi Takahashi and
                  Daisuke Inoue and
                  Koji Nakao},
  title        = {Toward Automated Smart Ships: Designing Effective Cyber Risk Management},
  booktitle    = {2020 International Conferences on Internet of Things (iThings) and
                  {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,
                  Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData)
                  and {IEEE} Congress on Cybermatics (Cybermatics), iThings/GreenCom/CPSCom/SmartData/Cybermatics
                  2020, Rhodes Island, Greece, November 2-6, 2020},
  pages        = {100--105},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00034},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS50389.2020.00034},
  timestamp    = {Thu, 28 Jan 2021 15:35:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ithings/FurumotoKSTIN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TakahashiKVYI20,
  author       = {Takeshi Takahashi and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Katsunari Yoshioka and
                  Daisuke Inoue},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Tracing and Analyzing Web Access Paths Based on User-Side Data Collection:
                  How Do Users Reach Malicious URLs?},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {93--106},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/takahashi},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TakahashiKVYI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LeeBWCI0I20,
  author       = {Yen{-}Ting Lee and
                  Tao Ban and
                  Tzu{-}Ling Wan and
                  Shin{-}Ming Cheng and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Cross Platform IoT- Malware Family Classification based on Printable
                  Strings},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {775--784},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00106},
  doi          = {10.1109/TRUSTCOM50675.2020.00106},
  timestamp    = {Fri, 30 Apr 2021 12:35:40 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LeeBWCI0I20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isrl/Sun0ZM20,
  author       = {Bo Sun and
                  Takeshi Takahashi and
                  Lei Zhu and
                  Tatsuya Mori},
  editor       = {Leslie F. Sikos and
                  Kim{-}Kwang Raymond Choo},
  title        = {Discovering Malicious URLs Using Machine Learning Techniques},
  booktitle    = {Data Science in Cybersecurity and Cyberthreat Intelligence},
  series       = {Intelligent Systems Reference Library},
  volume       = {177},
  pages        = {33--60},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38788-4\_3},
  doi          = {10.1007/978-3-030-38788-4\_3},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isrl/Sun0ZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8727,
  author       = {Takeshi Takahashi and
                  Roman Danyliw and
                  Mio Suzuki},
  title        = {{JSON} Binding of the Incident Object Description Exchange Format},
  journal      = {{RFC}},
  volume       = {8727},
  pages        = {1--88},
  year         = {2020},
  url          = {https://doi.org/10.17487/RFC8727},
  doi          = {10.17487/RFC8727},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8727.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakagawaNKFTSTM19,
  author       = {Shunta Nakagawa and
                  Tatsuya Nagai and
                  Hideaki Kanehara and
                  Keisuke Furumoto and
                  Makoto Takita and
                  Yoshiaki Shiraishi and
                  Takeshi Takahashi and
                  Masami Mohri and
                  Yasuhiro Takano and
                  Masakatu Morii},
  title        = {Character-Level Convolutional Neural Network for Predicting Severity
                  of Software Vulnerability from Vulnerability Description},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {102-D},
  number       = {9},
  pages        = {1679--1682},
  year         = {2019},
  url          = {https://doi.org/10.1587/transinf.2018OFL0006},
  doi          = {10.1587/TRANSINF.2018OFL0006},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakagawaNKFTSTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/UshigomeSBTIMS19,
  author       = {Ryutaro Ushigome and
                  Mio Suzuki and
                  Tao Ban and
                  Takeshi Takahashi and
                  Daisuke Inoue and
                  Takeshi Matsuda and
                  Michio Sonoda},
  title        = {Establishing Trusted and Timely Information Source using Social Media
                  Services},
  booktitle    = {16th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2019, Las Vegas, NV, USA, January 11-14, 2019},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCNC.2019.8651814},
  doi          = {10.1109/CCNC.2019.8651814},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/UshigomeSBTIMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/AminantoZBI0I19,
  author       = {Muhamad Erza Aminanto and
                  Lei Zhu and
                  Tao Ban and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  editor       = {Tom Gedeon and
                  Kok Wai Wong and
                  Minho Lee},
  title        = {Combating Threat-Alert Fatigue with Online Anomaly Detection Using
                  Isolation Forest},
  booktitle    = {Neural Information Processing - 26th International Conference, {ICONIP}
                  2019, Sydney, NSW, Australia, December 12-15, 2019, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11953},
  pages        = {756--765},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36708-4\_62},
  doi          = {10.1007/978-3-030-36708-4\_62},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iconip/AminantoZBI0I19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/HeHI0KTN19,
  author       = {Tianxiang He and
                  Chansu Han and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Shuji Kijima and
                  Jun'ichi Takeuchi and
                  Koji Nakao},
  editor       = {Tom Gedeon and
                  Kok Wai Wong and
                  Minho Lee},
  title        = {A Fast Algorithm for Constructing Phylogenetic Trees with Application
                  to IoT Malware Clustering},
  booktitle    = {Neural Information Processing - 26th International Conference, {ICONIP}
                  2019, Sydney, NSW, Australia, December 12-15, 2019, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11953},
  pages        = {766--778},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36708-4\_63},
  doi          = {10.1007/978-3-030-36708-4\_63},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/HeHI0KTN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AminantoZBITI19,
  author       = {Muhamad Erza Aminanto and
                  Lei Zhu and
                  Tao Ban and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal
                  Isolation Forest},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949029},
  doi          = {10.1109/PST47121.2019.8949029},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AminantoZBITI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SunBCS0I19,
  author       = {Bo Sun and
                  Tao Ban and
                  Shun{-}Chieh Chang and
                  Yeali S. Sun and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {A scalable and accurate feature representation method for identifying
                  malicious mobile applications},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {1182--1189},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297396},
  doi          = {10.1145/3297280.3297396},
  timestamp    = {Sun, 02 Jun 2019 21:18:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SunBCS0I19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KaneharaMS0IM19,
  author       = {Hideaki Kanehara and
                  Yuma Murakami and
                  Jumpei Shimamura and
                  Takeshi Takahashi and
                  Daisuke Inoue and
                  Noboru Murata},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {Real-time botnet detection using nonnegative tucker decomposition},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {1337--1344},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297415},
  doi          = {10.1145/3297280.3297415},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KaneharaMS0IM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanS0IKTN19,
  author       = {Chansu Han and
                  Jumpei Shimamura and
                  Takeshi Takahashi and
                  Daisuke Inoue and
                  Masanori Kawakita and
                  Jun'ichi Takeuchi and
                  Koji Nakao},
  title        = {Real-Time Detection of Malware Activities by Analyzing Darknet Traffic
                  Using Graphical Lasso},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {144--151},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00028},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00028},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanS0IKTN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SunFMBTI18,
  author       = {Bo Sun and
                  Akinori Fujino and
                  Tatsuya Mori and
                  Tao Ban and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Automatically Generating Malware Analysis Reports Using Sandbox Logs},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {11},
  pages        = {2622--2632},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2017ICP0011},
  doi          = {10.1587/TRANSINF.2017ICP0011},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SunFMBTI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/TakahashiPKN18,
  author       = {Takeshi Takahashi and
                  Bhola Panta and
                  Youki Kadobayashi and
                  Koji Nakao},
  title        = {Web of cybersecurity: Linking, locating, and discovering structured
                  cybersecurity information},
  journal      = {Int. J. Commun. Syst.},
  volume       = {31},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/dac.3470},
  doi          = {10.1002/DAC.3470},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/TakahashiPKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IijimaMYT0OM18,
  author       = {Ryo Iijima and
                  Shota Minami and
                  Yunao Zhou and
                  Tatsuya Takehisa and
                  Takeshi Takahashi and
                  Yasuhiro Oikawa and
                  Tatsuya Mori},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Audio Hotspot Attack: An Attack on Voice Assistance Systems Using
                  Directional Sound Beams},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2222--2224},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3278497},
  doi          = {10.1145/3243734.3278497},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/IijimaMYT0OM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/ZhuB0I18,
  author       = {Lei Zhu and
                  Tao Ban and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  editor       = {Long Cheng and
                  Andrew Chi{-}Sing Leung and
                  Seiichi Ozawa},
  title        = {Employ Decision Values for Soft-Classifier Evaluation with Crispy
                  References},
  booktitle    = {Neural Information Processing - 25th International Conference, {ICONIP}
                  2018, Siem Reap, Cambodia, December 13-16, 2018, Proceedings, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11304},
  pages        = {392--402},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04212-7\_34},
  doi          = {10.1007/978-3-030-04212-7\_34},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iconip/ZhuB0I18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/PangZBIZS0I18,
  author       = {Shaoning Pang and
                  Lei Zhu and
                  Tao Ban and
                  Kazushi Ikeda and
                  Wangfei Zhang and
                  Abdolhossein Sarrafzadeh and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Online Max-flow Learning via Augmenting and De-augmenting Path},
  booktitle    = {2018 International Joint Conference on Neural Networks, {IJCNN} 2018,
                  Rio de Janeiro, Brazil, July 8-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IJCNN.2018.8489405},
  doi          = {10.1109/IJCNN.2018.8489405},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/PangZBIZS0I18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/Vorakulpipat0RT18,
  author       = {Chalee Vorakulpipat and
                  Takeshi Takahashi and
                  Ekkachan Rattanalerdnusorn and
                  Phithak Thaenkaew and
                  Daisuke Inoue},
  title        = {Usable and Secure Cloud-based Biometric Authentication Solution for
                  IoT Devices},
  booktitle    = {2018 {IEEE} Symposium on Computers and Communications, {ISCC} 2018,
                  Natal, Brazil, June 25-28, 2018},
  pages        = {274--277},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISCC.2018.8538712},
  doi          = {10.1109/ISCC.2018.8538712},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/Vorakulpipat0RT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/ChangSCCS018,
  author       = {Shun{-}Chieh Chang and
                  Yeali S. Sun and
                  Wu{-}Long Chuang and
                  Meng Chang Chen and
                  Bo Sun and
                  Takeshi Takahashi},
  title        = {ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics
                  of Android Malware Family},
  booktitle    = {23rd {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2018, Taipei, Taiwan, December 4-7, 2018},
  pages        = {257--262},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/PRDC.2018.00047},
  doi          = {10.1109/PRDC.2018.00047},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/prdc/ChangSCCS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/EmuraKOT17,
  author       = {Keita Emura and
                  Akira Kanaoka and
                  Satoshi Ohta and
                  Takeshi Takahashi},
  title        = {Establishing secure and anonymous communication channel: KEM/DEM-based
                  construction and its implementation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {34},
  pages        = {84--91},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2016.12.001},
  doi          = {10.1016/J.JISA.2016.12.001},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/EmuraKOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/EmuraKOOT16,
  author       = {Keita Emura and
                  Akira Kanaoka and
                  Satoshi Ohta and
                  Kazumasa Omote and
                  Takeshi Takahashi},
  title        = {Secure and Anonymous Communication Technique: Formal Model and Its
                  Prototype Implementation},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {88--101},
  year         = {2016},
  url          = {https://doi.org/10.1109/TETC.2015.2400131},
  doi          = {10.1109/TETC.2015.2400131},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/EmuraKOOT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/BanTGIN16,
  author       = {Tao Ban and
                  Takeshi Takahashi and
                  Shanqing Guo and
                  Daisuke Inoue and
                  Koji Nakao},
  title        = {Integration of Multi-modal Features for Android Malware Detection
                  Using Linear {SVM}},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {141--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.29},
  doi          = {10.1109/ASIAJCIS.2016.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/BanTGIN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/TakahashiBTLIN16,
  author       = {Takeshi Takahashi and
                  Tao Ban and
                  Chin{-}Wei Tien and
                  Chih{-}Hung Lin and
                  Daisuke Inoue and
                  Koji Nakao},
  editor       = {Akira Hirose and
                  Seiichi Ozawa and
                  Kenji Doya and
                  Kazushi Ikeda and
                  Minho Lee and
                  Derong Liu},
  title        = {The Usability of Metadata for Android Application Analysis},
  booktitle    = {Neural Information Processing - 23rd International Conference, {ICONIP}
                  2016, Kyoto, Japan, October 16-21, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9947},
  pages        = {546--554},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46687-3\_60},
  doi          = {10.1007/978-3-319-46687-3\_60},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/TakahashiBTLIN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/TakahashiM16,
  author       = {Takeshi Takahashi and
                  Daisuke Miyamoto},
  editor       = {Sema Oktug and
                  Mehmet Ulema and
                  Cicek Cavdar and
                  Lisandro Zambenedetti Granville and
                  Carlos Raniery Paula dos Santos},
  title        = {Structured cybersecurity information exchange for streamlining incident
                  response operations},
  booktitle    = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2016, Istanbul, Turkey, April 25-29, 2016},
  pages        = {949--954},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NOMS.2016.7502931},
  doi          = {10.1109/NOMS.2016.7502931},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/TakahashiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/MiyamotoNTS16,
  author       = {Daisuke Miyamoto and
                  Ryo Nakamura and
                  Takeshi Takahashi and
                  Yuji Sekiya},
  title        = {Offloading smartphone firewalling using OpenFlow-capable wireless
                  access points},
  booktitle    = {2016 {IEEE} International Conference on Pervasive Computing and Communication
                  Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18,
                  2016},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/PERCOMW.2016.7457060},
  doi          = {10.1109/PERCOMW.2016.7457060},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/MiyamotoNTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/TakahashiMN16,
  author       = {Takeshi Takahashi and
                  Daisuke Miyamoto and
                  Koji Nakao},
  title        = {Toward automated vulnerability monitoring using open information and
                  standardized tools},
  booktitle    = {2016 {IEEE} International Conference on Pervasive Computing and Communication
                  Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18,
                  2016},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/PERCOMW.2016.7457049},
  doi          = {10.1109/PERCOMW.2016.7457049},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/TakahashiMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/TakahashiI16,
  author       = {Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Generating software identifier dictionaries from Vulnerability Database},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {417--420},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906965},
  doi          = {10.1109/PST.2016.7906965},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/TakahashiI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/TakahashiK15,
  author       = {Takeshi Takahashi and
                  Youki Kadobayashi},
  title        = {Reference Ontology for Cybersecurity Operational Information},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2297--2312},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu101},
  doi          = {10.1093/COMJNL/BXU101},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/TakahashiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/KannistoTHHHMS15,
  author       = {Joona Kannisto and
                  Takeshi Takahashi and
                  Jarmo Harju and
                  Seppo Heikkinen and
                  Marko Helenius and
                  Shin'ichiro Matsuo and
                  Bilhanan Silverajan},
  title        = {A non-repudiable negotiation protocol for security service level agreements},
  journal      = {Int. J. Commun. Syst.},
  volume       = {28},
  number       = {15},
  pages        = {2067--2081},
  year         = {2015},
  url          = {https://doi.org/10.1002/dac.2856},
  doi          = {10.1002/DAC.2856},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/KannistoTHHHMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/EmuraKOT15,
  author       = {Keita Emura and
                  Akira Kanaoka and
                  Satoshi Ohta and
                  Takeshi Takahashi},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {A KEM/DEM-Based Construction for Secure and Anonymous Communication},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {680--681},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.54},
  doi          = {10.1109/COMPSAC.2015.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/EmuraKOT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/TakahashiBMN15,
  author       = {Takeshi Takahashi and
                  Tao Ban and
                  Takao Mimura and
                  Koji Nakao},
  editor       = {Sabri Arik and
                  Tingwen Huang and
                  Weng Kin Lai and
                  Qingshan Liu},
  title        = {Fine-Grained Risk Level Quantication Schemes Based on {APK} Metadata},
  booktitle    = {Neural Information Processing - 22nd International Conference, {ICONIP}
                  2015, Istanbul, Turkey, November 9-12, 2015, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9491},
  pages        = {663--673},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26555-1\_75},
  doi          = {10.1007/978-3-319-26555-1\_75},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/TakahashiBMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TakahashiNK14,
  author       = {Takeshi Takahashi and
                  Koji Nakao and
                  Akira Kanaoka},
  editor       = {Gail{-}Joon Ahn and
                  Tomas Sander},
  title        = {Data Model for Android Package Information and Its Application to
                  Risk Analysis System},
  booktitle    = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&}
                  Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663876.2663881},
  doi          = {10.1145/2663876.2663881},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TakahashiNK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/TakanoOTAI14,
  author       = {Yuuki Takano and
                  Satoshi Ohta and
                  Takeshi Takahashi and
                  Ruo Ando and
                  Tomoya Inoue},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {MindYourPrivacy: Design and implementation of a visualization system
                  for third-party Web tracking},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {48--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890923},
  doi          = {10.1109/PST.2014.6890923},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/TakanoOTAI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/EmuraKOT14,
  author       = {Keita Emura and
                  Akira Kanaoka and
                  Satoshi Ohta and
                  Takeshi Takahashi},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {Building secure and anonymous communication channel: formal model
                  and its prototype implementation},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1641--1648},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554879},
  doi          = {10.1145/2554850.2554879},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/EmuraKOT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semco/TakahashiK14,
  author       = {Takeshi Takahashi and
                  Youki Kadobayashi},
  title        = {Mechanism for Linking and Discovering Structured Cybersecurity Information
                  over Networks},
  booktitle    = {2014 {IEEE} International Conference on Semantic Computing, Newport
                  Beach, CA, USA, June 16-18, 2014},
  pages        = {279--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICSC.2014.66},
  doi          = {10.1109/ICSC.2014.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/semco/TakahashiK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/TakahashiKHKTM14,
  author       = {Takeshi Takahashi and
                  Joona Kannisto and
                  Jarmo Harju and
                  Akira Kanaoka and
                  Yuuki Takano and
                  Shin'ichiro Matsuo},
  title        = {Expressing Security Requirements: Usability of Taxonomy-Based Requirement
                  Identification Scheme},
  booktitle    = {2014 {IEEE} World Congress on Services, {SERVICES} 2014, Anchorage,
                  AK, USA, June 27 - July 2, 2014},
  pages        = {121--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERVICES.2014.31},
  doi          = {10.1109/SERVICES.2014.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/TakahashiKHKTM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/EmuraKOT14,
  author       = {Keita Emura and
                  Akira Kanaoka and
                  Satoshi Ohta and
                  Takeshi Takahashi},
  title        = {Building Secure and Anonymous Communication Channel: Formal Model
                  and its Prototype Implementation},
  journal      = {CoRR},
  volume       = {abs/1403.7014},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.7014},
  eprinttype    = {arXiv},
  eprint       = {1403.7014},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/EmuraKOT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TakahashiHKSHM14,
  author       = {Takeshi Takahashi and
                  Jarmo Harju and
                  Joona Kannisto and
                  Bilhanan Silverajan and
                  Shin'ichiro Matsuo},
  title        = {Tailored Security: Building Nonrepudiable Security Service-Level Agreements},
  journal      = {CoRR},
  volume       = {abs/1403.7088},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.7088},
  eprinttype    = {arXiv},
  eprint       = {1403.7088},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TakahashiHKSHM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TakahashiKF14,
  author       = {Takeshi Takahashi and
                  Youki Kadobayashi and
                  Hiroyuki Fujiwara},
  title        = {Ontological Approach toward Cybersecurity in Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/1405.6169},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.6169},
  eprinttype    = {arXiv},
  eprint       = {1405.6169},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TakahashiKF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc7203,
  author       = {Takeshi Takahashi and
                  Kent Landfield and
                  Youki Kadobayashi},
  title        = {An Incident Object Description Exchange Format {(IODEF)} Extension
                  for Structured Cybersecurity Information},
  journal      = {{RFC}},
  volume       = {7203},
  pages        = {1--28},
  year         = {2014},
  url          = {https://doi.org/10.17487/RFC7203},
  doi          = {10.17487/RFC7203},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc7203.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vtm/TakahashiKHHSHM13,
  author       = {Takeshi Takahashi and
                  Joona Kannisto and
                  Jarmo Harju and
                  Seppo Heikkinen and
                  Bilhanan Silverajan and
                  Marko Helenius and
                  Shin'ichiro Matsuo},
  title        = {Tailored Security: Building Nonrepudiable Security Service-Level Agreements},
  journal      = {{IEEE} Veh. Technol. Mag.},
  volume       = {8},
  number       = {3},
  pages        = {54--62},
  year         = {2013},
  url          = {https://doi.org/10.1109/MVT.2013.2269188},
  doi          = {10.1109/MVT.2013.2269188},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vtm/TakahashiKHHSHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TakahashiEKMM13,
  author       = {Takeshi Takahashi and
                  Keita Emura and
                  Akira Kanaoka and
                  Shin'ichiro Matsuo and
                  Tadashi Minowa},
  editor       = {Yan Chen and
                  XiaoFeng Wang},
  title        = {Risk visualization and alerting system: architecture and proof-of-concept
                  implementation},
  booktitle    = {Proceedings of the first international workshop on Security in embedded
                  systems and smartphones, {SESP} 2013, Hangzhou, China, May 8, 2013},
  pages        = {3--10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484417.2484421},
  doi          = {10.1145/2484417.2484421},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TakahashiEKMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/MiyamotoT13,
  author       = {Daisuke Miyamoto and
                  Takeshi Takahashi},
  editor       = {Leonard Barolli and
                  Ilsun You and
                  Fatos Xhafa and
                  Fang{-}Yie Leu and
                  Hsing{-}Chung Chen},
  title        = {Toward Automated Reduction of Human Errors Based on Cognitive Analysis},
  booktitle    = {Seventh International Conference on Innovative Mobile and Internet
                  Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July
                  3-5, 2013},
  pages        = {820--825},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IMIS.2013.147},
  doi          = {10.1109/IMIS.2013.147},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/MiyamotoT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/TakahashiKHHHMS13,
  author       = {Takeshi Takahashi and
                  Joona Kannisto and
                  Jarmo Harju and
                  Seppo Heikkinen and
                  Marko Helenius and
                  Shin'ichiro Matsuo and
                  Bilhanan Silverajan},
  title        = {Accountable security mechanism based on security service level agreement},
  booktitle    = {2013 {IEEE} Symposium on Computers and Communications, {ISCC} 2013,
                  Split, Croatia, 7-10 July, 2013},
  pages        = {404--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCC.2013.6754980},
  doi          = {10.1109/ISCC.2013.6754980},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/TakahashiKHHHMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcfic/0001BKFHM12,
  author       = {Takeshi Takahashi and
                  Gregory Blanc and
                  Youki Kadobayashi and
                  Doudou Fall and
                  Hiroaki Hazeyama and
                  Shin'ichiro Matsuo},
  title        = {Enabling secure multitenancy in cloud computing: Challenges and approaches},
  booktitle    = {2nd Baltic Congress on Future Internet Communications, {BCFIC} 2012,
                  Vilnius, Lithuania, April 25-27, 2012},
  pages        = {72--79},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/BCFIC.2012.6217983},
  doi          = {10.1109/BCFIC.2012.6217983},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bcfic/0001BKFHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/MinowaT12,
  author       = {Tadashi Minowa and
                  Takeshi Takahashi},
  editor       = {Tingwen Huang and
                  Zhigang Zeng and
                  Chuandong Li and
                  Chi{-}Sing Leung},
  title        = {Secure Distributed Storage for Bulk Data},
  booktitle    = {Neural Information Processing - 19th International Conference, {ICONIP}
                  2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7667},
  pages        = {566--575},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34500-5\_67},
  doi          = {10.1007/978-3-642-34500-5\_67},
  timestamp    = {Tue, 30 Jun 2020 11:04:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/MinowaT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/MoriyamaTM12,
  author       = {Eimatsu Moriyama and
                  Takeshi Takahashi and
                  Daisuke Miyamoto},
  editor       = {Tingwen Huang and
                  Zhigang Zeng and
                  Chuandong Li and
                  Chi{-}Sing Leung},
  title        = {DNS-Based Defense against {IP} Spoofing Attacks},
  booktitle    = {Neural Information Processing - 19th International Conference, {ICONIP}
                  2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7667},
  pages        = {599--609},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34500-5\_71},
  doi          = {10.1007/978-3-642-34500-5\_71},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iconip/MoriyamaTM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kaleidoscope/TakahashiKN11,
  author       = {Takeshi Takahashi and
                  Youki Kadobayashi and
                  Koji Nakao},
  title        = {Toward global cybersecurity collaboration: Cybersecurity operation
                  activity model},
  booktitle    = {Proceedings of the {ITU} Kaleidoscope 2011: The Fully Networked Human?
                  - Innovations for Future Networks and Services, Cape Town, South Africa,
                  December 12-14, 2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6144207/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kaleidoscope/TakahashiKN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BanZATK11,
  author       = {Tao Ban and
                  Changshui Zhang and
                  Shigeo Abe and
                  Takeshi Takahashi and
                  Youki Kadobayashi},
  editor       = {William C. Chu and
                  W. Eric Wong and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Mining interlacing manifolds in high dimensional spaces},
  booktitle    = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC),
                  TaiChung, Taiwan, March 21 - 24, 2011},
  pages        = {942--949},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982185.1982392},
  doi          = {10.1145/1982185.1982392},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BanZATK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/RutkowskiKFRMTSRSHA10,
  author       = {Anthony M. Rutkowski and
                  Youki Kadobayashi and
                  Inette Furey and
                  Damir Rajnovic and
                  Robert Martin and
                  Takeshi Takahashi and
                  Craig Schultz and
                  Gavin Reid and
                  Gregg Schudel and
                  Mike Hird and
                  Stephen Adegbite},
  title        = {{CYBEX:} the cybersecurity information exchange framework (x.1500)},
  journal      = {Comput. Commun. Rev.},
  volume       = {40},
  number       = {5},
  pages        = {59--64},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880153.1880163},
  doi          = {10.1145/1880153.1880163},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/RutkowskiKFRMTSRSHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/TakahashiFK10,
  author       = {Takeshi Takahashi and
                  Hiroyuki Fujiwara and
                  Youki Kadobayashi},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Building ontology of cybersecurity operational information},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {79},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852756},
  doi          = {10.1145/1852666.1852756},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/TakahashiFK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/TakahashiKF10,
  author       = {Takeshi Takahashi and
                  Youki Kadobayashi and
                  Hiroyuki Fujiwara},
  editor       = {Oleg B. Makarevich and
                  Atilla El{\c{c}}i and
                  Mehmet A. Orgun and
                  Sorin A. Huss and
                  Ludmila K. Babenko and
                  Alexander G. Chefranov and
                  Vijay Varadharajan},
  title        = {Ontological approach toward cybersecurity in cloud computing},
  booktitle    = {Proceedings of the 3rd International Conference on Security of Information
                  and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September
                  7-11, 2010},
  pages        = {100--109},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854099.1854121},
  doi          = {10.1145/1854099.1854121},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/TakahashiKF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakahashiAHT05,
  author       = {Takeshi Takahashi and
                  Koichi Asatani and
                  Jarmo Harju and
                  Hideyoshi Tominaga},
  title        = {Proactive Handover Scheme Based on Forwarding Router Discovery for
                  Mobile {IP} Networks},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {88-B},
  number       = {7},
  pages        = {2718--2725},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietcom/e88-b.7.2718},
  doi          = {10.1093/IETCOM/E88-B.7.2718},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TakahashiAHT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadnets/TakahashiAT05,
  author       = {Takeshi Takahashi and
                  Koichi Asatani and
                  Hideyoshi Tominaga},
  title        = {Multicast source handover scheme based on proxy router discovery},
  booktitle    = {2nd International Conference on Broadband Networks {(BROADNETS} 2005),
                  3-7 October 2005, Boston, Massachusetts, {USA}},
  pages        = {865--874},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICBN.2005.1589690},
  doi          = {10.1109/ICBN.2005.1589690},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/broadnets/TakahashiAT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/TakahashiHAT05,
  author       = {Takeshi Takahashi and
                  Jarmo Harju and
                  Koichi Asatani and
                  Hideyoshi Tominaga},
  title        = {A routing-aware handover scheme for mobile {IP}},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2005, Seoul, Korea, 16-20 May 2005},
  pages        = {1400--1406},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICC.2005.1494575},
  doi          = {10.1109/ICC.2005.1494575},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/TakahashiHAT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/TakahashiAT05,
  author       = {Takeshi Takahashi and
                  Koichi Asatani and
                  Hideyoshi Tominaga},
  editor       = {Pascal Lorenz and
                  Petre Dini},
  title        = {Multicast Receiver Mobility over Mobile {IP} Networks based on Forwarding
                  Router Discovery},
  booktitle    = {Networking - {ICN} 2005, 4th International Conference on Networking,
                  ReunionIsland, France, April 17-21, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3421},
  pages        = {859--867},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31957-3\_97},
  doi          = {10.1007/978-3-540-31957-3\_97},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/icn/TakahashiAT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/TakahashiHAT05,
  author       = {Takeshi Takahashi and
                  Jarmo Harju and
                  Koichi Asatani and
                  Hideyoshi Tominaga},
  title        = {Inter-domain handover scheme based on forwarding router discovery
                  for mobile {IP} networks},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005,
                  March 13-17, 2005, New Orleans, Louisiana, {USA}},
  pages        = {1409--1414},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/WCNC.2005.1424722},
  doi          = {10.1109/WCNC.2005.1424722},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/TakahashiHAT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/DobashiTT05,
  author       = {Kentaro Dobashi and
                  Takeshi Takahashi and
                  Hideyoshi Tominaga},
  title        = {Adaptive {MAC} protocol for high-load inter-vehicle communication},
  booktitle    = {2005 {IEEE} International Conference on Wireless And Mobile Computing,
                  Networking And Communications, WiMob 2005, Montreal, Canada, August
                  22-14, 2005, Volume 3},
  pages        = {138--145},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/WIMOB.2005.1512896},
  doi          = {10.1109/WIMOB.2005.1512896},
  timestamp    = {Thu, 12 Aug 2021 09:49:22 +0200},
  biburl       = {https://dblp.org/rec/conf/wimob/DobashiTT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/TakahashiTVLH04,
  author       = {Takeshi Takahashi and
                  Miikka Tammi and
                  Heikki Vatiainen and
                  Rami Lehtonen and
                  Jarmo Harju},
  title        = {Implementation and performance evaluation of multicast control protocol},
  booktitle    = {Proceedings of the 9th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2006), June 28 - July 1, 2004, Alexandria, Egypt},
  pages        = {1038--1043},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISCC.2004.1358677},
  doi          = {10.1109/ISCC.2004.1358677},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/TakahashiTVLH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/TakahashiKHT02,
  author       = {Takeshi Takahashi and
                  Hiroyuki Kasai and
                  Tsuyoshi Hanamura and
                  Hideyoshi Tominaga},
  title        = {Packet-multiplexing scheme in {MPEG-2} multi-program transport stream
                  transcoder},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2002, May 13-17 2002, Orlando, Florida,
                  {USA}},
  pages        = {4178},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICASSP.2002.5745636},
  doi          = {10.1109/ICASSP.2002.5745636},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/TakahashiKHT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/TakahasiKHT01,
  author       = {Takeshi Takahashi and
                  Hiroyuki Kasai and
                  Tsuyoshi Hanamura and
                  Hideyoshi Tominaga},
  title        = {{MPEG-2} Multi-Program Transport Stream Transcoder},
  booktitle    = {Proceedings of the 2001 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2001, August 22-25, 2001, Tokyo, Japan},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICME.2001.1237747},
  doi          = {10.1109/ICME.2001.1237747},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/TakahasiKHT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics