Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Takeshi Takahashi 0001
@article{DBLP:journals/access/HeHITKT23, author = {Tianxiang He and Chansu Han and Ryoichi Isawa and Takeshi Takahashi and Shuji Kijima and Jun'ichi Takeuchi}, title = {Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering}, journal = {{IEEE} Access}, volume = {11}, pages = {8240--8253}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3238711}, doi = {10.1109/ACCESS.2023.3238711}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HeHITKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TanakaHT23, author = {Akira Tanaka and Chansu Han and Takeshi Takahashi}, title = {Detecting Coordinated Internet-Wide Scanning by {TCP/IP} Header Fingerprint}, journal = {{IEEE} Access}, volume = {11}, pages = {23227--23244}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3249474}, doi = {10.1109/ACCESS.2023.3249474}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TanakaHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RoziBOYTKI23, author = {Muhammad Fakhrur Rozi and Tao Ban and Seiichi Ozawa and Akira Yamada and Takeshi Takahashi and Sangwook Kim and Daisuke Inoue}, title = {Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation}, journal = {{IEEE} Access}, volume = {11}, pages = {102727--102745}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3317266}, doi = {10.1109/ACCESS.2023.3317266}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RoziBOYTKI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MiyamotoIHBTT23, author = {Kohei Miyamoto and Masazumi Iida and Chansu Han and Tao Ban and Takeshi Takahashi and Jun'ichi Takeuchi}, title = {Consolidating Packet-Level Features for Effective Network Intrusion Detection: {A} Novel Session-Level Approach}, journal = {{IEEE} Access}, volume = {11}, pages = {132792--132810}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3335600}, doi = {10.1109/ACCESS.2023.3335600}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MiyamotoIHBTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PattaranantakulVT23, author = {Montida Pattaranantakul and Chalee Vorakulpipat and Takeshi Takahashi}, title = {Service Function Chaining security survey: Addressing security challenges and threats}, journal = {Comput. Networks}, volume = {221}, pages = {109484}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2022.109484}, doi = {10.1016/J.COMNET.2022.109484}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PattaranantakulVT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuBCTI23, author = {Chia{-}Yi Wu and Tao Ban and Shin{-}Ming Cheng and Takeshi Takahashi and Daisuke Inoue}, title = {IoT malware classification based on reinterpreted function-call graphs}, journal = {Comput. Secur.}, volume = {125}, pages = {103060}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103060}, doi = {10.1016/J.COSE.2022.103060}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WuBCTI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/NakaoYSTHTFTMSITITY23, author = {Koji Nakao and Katsunari Yoshioka and Takayuki Sasaki and Rui Tanabe and Xuping Huang and Takeshi Takahashi and Akira Fujita and Jun'ichi Takeuchi and Noboru Murata and Junji Shikata and Kazuki Iwamoto and Kazuki Takada and Yuki Ishida and Masaru Takeuchi and Naoto Yanai}, title = {Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {106}, number = {9}, pages = {1302--1315}, year = {2023}, url = {https://doi.org/10.1587/transinf.2022ici0001}, doi = {10.1587/TRANSINF.2022ICI0001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/NakaoYSTHTFTMSITITY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/ChangCHMTL23, author = {Yu{-}Wei Chang and Hong{-}Yen Chen and Chansu Han and Tomohiro Morikawa and Takeshi Takahashi and Tsung{-}Nan Lin}, title = {{FINISH:} Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {11}, number = {4}, pages = {934--949}, year = {2023}, url = {https://doi.org/10.1109/TETC.2023.3292924}, doi = {10.1109/TETC.2023.3292924}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/ChangCHMTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/artman/JungF0S23, author = {Soohyun Jung and Keisuke Furumoto and Takeshi Takahashi and Yoshiaki Shiraishi}, editor = {Gregory Blanc and Takeshi Takahashi and Zonghua Zhang}, title = {Model Selection for Continuous Operation of Automated Vulnerability Assessment System}, booktitle = {Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy {ML} Systems in Autonomous Networks, {ARTMAN} 2023, Copenhagen, Denmark, 30 November 2023}, pages = {11--15}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605772.3624006}, doi = {10.1145/3605772.3624006}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/artman/JungF0S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/artman/Tanuwidjaja0LLB23, author = {Harry Chandra Tanuwidjaja and Takeshi Takahashi and Tsung{-}Nan Lin and Boyi Lee and Tao Ban}, editor = {Gregory Blanc and Takeshi Takahashi and Zonghua Zhang}, title = {Hybrid Explainable Intrusion Detection System: Global vs. Local Approach}, booktitle = {Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy {ML} Systems in Autonomous Networks, {ARTMAN} 2023, Copenhagen, Denmark, 30 November 2023}, pages = {37--42}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605772.3624004}, doi = {10.1145/3605772.3624004}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/artman/Tanuwidjaja0LLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KawanakaKMIHBTT23, author = {Shota Kawanaka and Yoshikatsu Kashiwabara and Kohei Miyamoto and Masazumi Iida and Chansu Han and Tao Ban and Takeshi Takahashi and Jun'ichi Takeuchi}, title = {Packet-Level Intrusion Detection Using {LSTM} Focusing on Personal Information and Payloads}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {88--94}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00024}, doi = {10.1109/ASIAJCIS60284.2023.00024}, timestamp = {Mon, 22 Jan 2024 19:57:57 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KawanakaKMIHBTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/NdichuBTI23, author = {Samuel Ndichu and Tao Ban and Takeshi Takahashi and Daisuke Inoue}, editor = {Jingrui He and Themis Palpanas and Xiaohua Hu and Alfredo Cuzzocrea and Dejing Dou and Dominik Slezak and Wei Wang and Aleksandra Gruca and Jerry Chun{-}Wei Lin and Rakesh Agrawal}, title = {Machine Learning-Based Security Alert Screening with Focal Loss}, booktitle = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023}, pages = {3043--3052}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigData59044.2023.10386263}, doi = {10.1109/BIGDATA59044.2023.10386263}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/NdichuBTI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Blanc0Z23, author = {Gregory Blanc and Takeshi Takahashi and Zonghua Zhang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {{ARTMAN} '23: First Workshop on Recent Advances in Resilient and Trustworthy {ML} Systems in Autonomous Networks}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3662--3663}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3624027}, doi = {10.1145/3576915.3624027}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Blanc0Z23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/HeHT0T23, author = {Tianxiang He and Chansu Han and Akira Tanaka and Takeshi Takahashi and Jun'ichi Takeuchi}, editor = {Andrea Bartolini and Kristian F. D. Rietveld and Catherine D. Schuman and Jose Moreira}, title = {Work in Progress: New Seed Set Selection Method of the Scalable Method for Constructing Phylogenetic Trees}, booktitle = {Proceedings of the 20th {ACM} International Conference on Computing Frontiers, {CF} 2023, Bologna, Italy, May 9-11, 2023}, pages = {364--365}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3587135.3592820}, doi = {10.1145/3587135.3592820}, timestamp = {Sat, 30 Sep 2023 09:36:30 +0200}, biburl = {https://dblp.org/rec/conf/cf/HeHT0T23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/OshioTHHTTT23, author = {Kei Oshio and Satoshi Takada and Tianxiang He and Chansu Han and Akira Tanaka and Takeshi Takahashi and Jun'ichi Takeuchi}, editor = {Hossain Shahriar and Yuuichi Teranishi and Alfredo Cuzzocrea and Moushumi Sharmin and Dave Towey and A. K. M. Jahangir Alam Majumder and Hiroki Kashiwazaki and Ji{-}Jiang Yang and Michiharu Takemoto and Nazmus Sakib and Ryohei Banno and Sheikh Iqbal Ahamed}, title = {Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering}, booktitle = {47th {IEEE} Annual Computers, Software, and Applications Conference, {COMPSAC} 2023, Torino, Italy, June 26-30, 2023}, pages = {1552--1557}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/COMPSAC57700.2023.00239}, doi = {10.1109/COMPSAC57700.2023.00239}, timestamp = {Mon, 07 Aug 2023 15:56:21 +0200}, biburl = {https://dblp.org/rec/conf/compsac/OshioTHHTTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HanTT0ML23, author = {Chansu Han and Akira Tanaka and Jun'ichi Takeuchi and Takeshi Takahashi and Tomohiro Morikawa and Tsung{-}Nan Lin}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {617--625}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011769300003405}, doi = {10.5220/0011769300003405}, timestamp = {Thu, 11 May 2023 10:52:54 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HanTT0ML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/ZhouBMTI23, author = {Jiaxing Zhou and Tao Ban and Tomohiro Morikawa and Takeshi Takahashi and Daisuke Inoue}, title = {Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth, Tunisia, July 9-12, 2023}, pages = {1410--1416}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISCC58397.2023.10217974}, doi = {10.1109/ISCC58397.2023.10217974}, timestamp = {Wed, 06 Sep 2023 08:09:43 +0200}, biburl = {https://dblp.org/rec/conf/iscc/ZhouBMTI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/artman/2023, editor = {Gregory Blanc and Takeshi Takahashi and Zonghua Zhang}, title = {Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy {ML} Systems in Autonomous Networks, {ARTMAN} 2023, Copenhagen, Denmark, 30 November 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605772}, doi = {10.1145/3605772}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/artman/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HanTTI22, author = {Chansu Han and Jun'ichi Takeuchi and Takeshi Takahashi and Daisuke Inoue}, title = {Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns}, journal = {{IEEE} Access}, volume = {10}, pages = {13038--13058}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3145966}, doi = {10.1109/ACCESS.2022.3145966}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HanTTI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/IshibashiMHBTT22, author = {Ryosuke Ishibashi and Kohei Miyamoto and Chansu Han and Tao Ban and Takeshi Takahashi and Jun'ichi Takeuchi}, title = {Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems}, journal = {{IEEE} Access}, volume = {10}, pages = {53972--53986}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3176098}, doi = {10.1109/ACCESS.2022.3176098}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/IshibashiMHBTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CharmetMT22, author = {Fabien Charmet and Tomohiro Morikawa and Takeshi Takahashi}, title = {Toward a Better Understanding of Mobile Users' Behavior: {A} Web Session Repair Scheme}, journal = {{IEEE} Access}, volume = {10}, pages = {99931--99943}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3206402}, doi = {10.1109/ACCESS.2022.3206402}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CharmetMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/BlancLLTZ22, author = {Gregory Blanc and Yang Liu and Rongxing Lu and Takeshi Takahashi and Zonghua Zhang}, title = {Interactions between artificial intelligence and cybersecurity to protect future networks}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {77}, number = {11-12}, pages = {727--729}, year = {2022}, url = {https://doi.org/10.1007/s12243-022-00935-6}, doi = {10.1007/S12243-022-00935-6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adt/BlancLLTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/OsadaNSTFTMM22, author = {Yuki Osada and Ryusei Nagasawa and Yoshiaki Shiraishi and Makoto Takita and Keisuke Furumoto and Takeshi Takahashi and Masami Mohri and Masakatu Morii}, title = {Multi-labeling with topic models for searching security information}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {77}, number = {11-12}, pages = {777--788}, year = {2022}, url = {https://doi.org/10.1007/s12243-022-00928-5}, doi = {10.1007/S12243-022-00928-5}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adt/OsadaNSTFTMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/CharmetTAGHJBTZ22, author = {Fabien Charmet and Harry Chandra Tanuwidjaja and Solayman Ayoubi and Pierre{-}Fran{\c{c}}ois Gimenez and Yufei Han and Houda Jmila and Gregory Blanc and Takeshi Takahashi and Zonghua Zhang}, title = {Explainable artificial intelligence for cybersecurity: a literature survey}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {77}, number = {11-12}, pages = {789--812}, year = {2022}, url = {https://doi.org/10.1007/s12243-022-00926-7}, doi = {10.1007/S12243-022-00926-7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/CharmetTAGHJBTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/SunTBI22, author = {Bo Sun and Takeshi Takahashi and Tao Ban and Daisuke Inoue}, title = {Detecting Android Malware and Classifying Its Families in Large-scale Datasets}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {13}, number = {2}, pages = {12:1--12:21}, year = {2022}, url = {https://doi.org/10.1145/3464323}, doi = {10.1145/3464323}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/SunTBI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/CharmetTMT22, author = {Fabien Charmet and Harry Chandra Tanuwidjaja and Tomohiro Morikawa and Takeshi Takahashi}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Towards Polyvalent Adversarial Attacks on {URL} Classification Engines}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1246--1248}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3527282}, doi = {10.1145/3488932.3527282}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/CharmetTMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NdichuBTI22, author = {Samuel Ndichu and Tao Ban and Takeshi Takahashi and Daisuke Inoue}, title = {Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00011}, doi = {10.1109/ASIAJCIS57030.2022.00011}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/NdichuBTI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/HanTT22, author = {Chansu Han and Akira Tanaka and Takeshi Takahashi}, editor = {Shusaku Tsumoto and Yukio Ohsawa and Lei Chen and Dirk Van den Poel and Xiaohua Hu and Yoichi Motomura and Takuya Takagi and Lingfei Wu and Ying Xie and Akihiro Abe and Vijay Raghavan}, title = {Darknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension}, booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, pages = {2980--2988}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigData55660.2022.10021021}, doi = {10.1109/BIGDATA55660.2022.10021021}, timestamp = {Fri, 18 Aug 2023 17:39:03 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/HanTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/NdichuBTI22, author = {Samuel Ndichu and Tao Ban and Takeshi Takahashi and Daisuke Inoue}, editor = {Shusaku Tsumoto and Yukio Ohsawa and Lei Chen and Dirk Van den Poel and Xiaohua Hu and Yoichi Motomura and Takuya Takagi and Lingfei Wu and Ying Xie and Akihiro Abe and Vijay Raghavan}, title = {Critical-Threat-Alert Detection using Online Machine Learning}, booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, pages = {3007--3014}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigData55660.2022.10021115}, doi = {10.1109/BIGDATA55660.2022.10021115}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/NdichuBTI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FanSHBMT22, author = {Chun{-}I Fan and Cheng{-}Han Shie and Che{-}Ming Hsu and Tao Ban and Tomohiro Morikawa and Takeshi Takahashi}, title = {IoT Botnet Detection Based on the Behaviors of {DNS} Queries}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888913}, doi = {10.1109/DSC54232.2022.9888913}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/FanSHBMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LinWCMTL22, author = {Shih{-}Chun Lin and Pang{-}Cheng Wl and Hong{-}Yen Chen and Tomohiro Morikawa and Takeshi Takahashi and Tsung{-}Nan Lin}, title = {SenseInput: An Image-Based Sensitive Input Detection Scheme for Phishing Website Detection}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul, Korea, May 16-20, 2022}, pages = {4180--4186}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICC45855.2022.9838653}, doi = {10.1109/ICC45855.2022.9838653}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/LinWCMTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/UmizakiMFTLI22, author = {Mitsuhiro Umizaki and Tomohiro Morikawa and Akira Fujita and Takeshi Takahashi and Tsung{-}Nan Lin and Daisuke Inoue}, title = {Understanding the Characteristics of Public Blocklist Providers}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2022, Rhodes, Greece, June 30 - July 3, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISCC55528.2022.9913009}, doi = {10.1109/ISCC55528.2022.9913009}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/UmizakiMFTLI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispr/MiyamotoGIHB0T22, author = {Kohei Miyamoto and Hiroki Goto and Ryosuke Ishibashi and Chansu Han and Tao Ban and Takeshi Takahashi and Jun'ichi Takeuchi}, editor = {Akram Bennour and Tolga Ensari and Yousri Kessentini and Sean Eom}, title = {Malicious Packet Classification Based on Neural Network Using Kitsune Features}, booktitle = {Intelligent Systems and Pattern Recognition - Second International Conference, {ISPR} 2022, Hammamet, Tunisia, March 24-26, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1589}, pages = {306--314}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-08277-1\_25}, doi = {10.1007/978-3-031-08277-1\_25}, timestamp = {Fri, 17 Nov 2023 14:19:14 +0100}, biburl = {https://dblp.org/rec/conf/ispr/MiyamotoGIHB0T22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SunBHTYTSQI21, author = {Bo Sun and Tao Ban and Chansu Han and Takeshi Takahashi and Katsunari Yoshioka and Jun'ichi Takeuchi and Abdolhossein Sarrafzadeh and Meikang Qiu and Daisuke Inoue}, title = {Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks}, journal = {{IEEE} Access}, volume = {9}, pages = {87962--87971}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3082000}, doi = {10.1109/ACCESS.2021.3082000}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SunBHTYTSQI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenCTSL21, author = {Yun{-}Chung Chen and Hong{-}Yen Chen and Takeshi Takahashi and Bo Sun and Tsung{-}Nan Lin}, title = {Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection}, journal = {{IEEE} Access}, volume = {9}, pages = {123208--123219}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3110408}, doi = {10.1109/ACCESS.2021.3110408}, timestamp = {Wed, 06 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChenCTSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/NagasawaFTSTMTM21, author = {Ryusei Nagasawa and Keisuke Furumoto and Makoto Takita and Yoshiaki Shiraishi and Takeshi Takahashi and Masami Mohri and Yasuhiro Takano and Masakatu Morii}, title = {Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {104-D}, number = {5}, pages = {556--561}, year = {2021}, url = {http://search.ieice.org/bin/summary.php?id=e104-d\_5\_556}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/NagasawaFTSTMTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/IijimaMZTTOM21, author = {Ryo Iijima and Shota Minami and Yunao Zhou and Tatsuya Takehisa and Takeshi Takahashi and Yasuhiro Oikawa and Tatsuya Mori}, title = {Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {9}, number = {4}, pages = {2004--2018}, year = {2021}, url = {https://doi.org/10.1109/TETC.2019.2953041}, doi = {10.1109/TETC.2019.2953041}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/IijimaMZTTOM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/IshibashiGHBTT21, author = {Ryosuke Ishibashi and Hiroki Goto and Chansu Han and Tao Ban and Takeshi Takahashi and Jun'ichi Takeuchi}, title = {Which Packet Did They Catch? Associating {NIDS} Alerts with Their Communication Sessions}, booktitle = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, pages = {9--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021.00012}, doi = {10.1109/ASIAJCIS53848.2021.00012}, timestamp = {Thu, 14 Oct 2021 16:38:35 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/IshibashiGHBTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/NdichuB0I21, author = {Samuel Ndichu and Tao Ban and Takeshi Takahashi and Daisuke Inoue}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {2119--2127}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9671956}, doi = {10.1109/BIGDATA52589.2021.9671956}, timestamp = {Fri, 13 Jan 2023 17:06:49 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/NdichuB0I21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MasumiHB021, author = {Kohei Masumi and Chansu Han and Tao Ban and Takeshi Takahashi}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {329--331}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3450326}, doi = {10.1145/3422337.3450326}, timestamp = {Wed, 21 Apr 2021 10:54:09 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/MasumiHB021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmec/HeHTKT21, author = {Tianxiang He and Chansu Han and Takeshi Takahashi and Shuji Kijima and Jun'ichi Takeuchi}, title = {Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection}, booktitle = {Sixth International Conference on Fog and Mobile Edge Computing, {FMEC} 2021, Gandia, Spain, December 6-9, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/FMEC54266.2021.9732550}, doi = {10.1109/FMEC54266.2021.9732550}, timestamp = {Mon, 21 Mar 2022 18:09:54 +0100}, biburl = {https://dblp.org/rec/conf/fmec/HeHTKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmec/TanakaHTF21, author = {Akira Tanaka and Chansu Han and Takeshi Takahashi and Katsuki Fujisawa}, title = {Internet-Wide Scanner Fingerprint Identifier Based on {TCP/IP} Header}, booktitle = {Sixth International Conference on Fog and Mobile Edge Computing, {FMEC} 2021, Gandia, Spain, December 6-9, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/FMEC54266.2021.9732414}, doi = {10.1109/FMEC54266.2021.9732414}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fmec/TanakaHTF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/RoziBOKTI21, author = {Muhammad Fakhrur Rozi and Tao Ban and Seiichi Ozawa and Sangwook Kim and Takeshi Takahashi and Daisuke Inoue}, editor = {Teddy Mantoro and Minho Lee and Media Anugerah Ayu and Kok Wai Wong and Achmad Nizar Hidayanto}, title = {JStrack: Enriching Malicious JavaScript Detection Based on {AST} Graph Analysis and Attention Mechanism}, booktitle = {Neural Information Processing - 28th International Conference, {ICONIP} 2021, Sanur, Bali, Indonesia, December 8-12, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13109}, pages = {669--680}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92270-2\_57}, doi = {10.1007/978-3-030-92270-2\_57}, timestamp = {Tue, 14 Dec 2021 17:56:34 +0100}, biburl = {https://dblp.org/rec/conf/iconip/RoziBOKTI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/FurumotoUFNTI21, author = {Keisuke Furumoto and Mitsuhiro Umizaki and Akira Fujita and Takahiko Nagata and Takeshi Takahashi and Daisuke Inoue}, title = {Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection}, booktitle = {2021 {IEEE} International Conferences on Internet of Things (iThings) and {IEEE} Green Computing {\&} Communications (GreenCom) and {IEEE} Cyber, Physical {\&} Social Computing (CPSCom) and {IEEE} Smart Data (SmartData) and {IEEE} Congress on Cybermatics (Cybermatics), Melbourne, Australia, December 6-8, 2021}, pages = {138--145}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics53846.2021.00034}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS53846.2021.00034}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ithings/FurumotoUFNTI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/TakahashiUHBFNY21, author = {Takeshi Takahashi and Yuki Umemura and Chansu Han and Tao Ban and Keisuke Furumoto and Ohnori Nakamura and Katsunari Yoshioka and Jun'ichi Takeuchi and Noboru Murata and Yoshiaki Shiraishi}, title = {Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?}, booktitle = {19th {IEEE} International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021, Kassel, Germany, March 22-26, 2021}, pages = {376--379}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PerComWorkshops51409.2021.9431125}, doi = {10.1109/PERCOMWORKSHOPS51409.2021.9431125}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/percom/TakahashiUHBFNY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/WuBCST21, author = {Chia{-}Yi Wu and Tao Ban and Shin{-}Ming Cheng and Bo Sun and Takeshi Takahashi}, title = {IoT Malware Detection Using Function-Call-Graph Embedding}, booktitle = {18th International Conference on Privacy, Security and Trust, {PST} 2021, Auckland, New Zealand, December 13-15, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PST52912.2021.9647806}, doi = {10.1109/PST52912.2021.9647806}, timestamp = {Tue, 28 Dec 2021 14:39:32 +0100}, biburl = {https://dblp.org/rec/conf/pst/WuBCST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/HaraTIO21, author = {Kazuki Hara and Takeshi Takahashi and Motoya Ishimaki and Kazumasa Omote}, title = {Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the Ethereum}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10, 2021}, pages = {652--659}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS-C55045.2021.00099}, doi = {10.1109/QRS-C55045.2021.00099}, timestamp = {Tue, 12 Apr 2022 17:57:49 +0200}, biburl = {https://dblp.org/rec/conf/qrs/HaraTIO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KawasoeHI0T21, author = {Reo Kawasoe and Chansu Han and Ryoichi Isawa and Takeshi Takahashi and Jun'ichi Takeuchi}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {Investigating behavioral differences between IoT malware via function call sequence graphs}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {1674--1682}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3442041}, doi = {10.1145/3412841.3442041}, timestamp = {Mon, 03 May 2021 14:34:56 +0200}, biburl = {https://dblp.org/rec/conf/sac/KawasoeHI0T21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanTTI21, author = {Chansu Han and Jun'ichi Takeuchi and Takeshi Takahashi and Daisuke Inoue}, title = {Automated Detection of Malware Activities Using Nonnegative Matrix Factorization}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {548--556}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00085}, doi = {10.1109/TRUSTCOM53373.2021.00085}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanTTI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AotaB0M21, author = {Masaki Aota and Tao Ban and Takeshi Takahashi and Noboru Murata}, title = {Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {988--996}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00137}, doi = {10.1109/TRUSTCOM53373.2021.00137}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AotaB0M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FujitaBTI21, author = {Akira Fujita and Tao Ban and Takeshi Takahashi and Daisuke Inoue}, title = {On-premises Analysis of Advanced Threat Prevention Appliances}, booktitle = {{CSET} '21: Cyber Security Experimentation and Test Workshop, Virtual, 9 August 2021}, pages = {1--8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474718.3474720}, doi = {10.1145/3474718.3474720}, timestamp = {Tue, 18 Oct 2022 12:47:08 +0200}, biburl = {https://dblp.org/rec/conf/uss/FujitaBTI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BanSTI21, author = {Tao Ban and Samuel Ndichu and Takeshi Takahashi and Daisuke Inoue}, title = {Combat Security Alert Fatigue with AI-Assisted Techniques}, booktitle = {{CSET} '21: Cyber Security Experimentation and Test Workshop, Virtual, 9 August 2021}, pages = {9--16}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474718.3474723}, doi = {10.1145/3474718.3474723}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BanSTI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AminantoBITI20, author = {Muhamad Erza Aminanto and Tao Ban and Ryoichi Isawa and Takeshi Takahashi and Daisuke Inoue}, title = {Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis}, journal = {{IEEE} Access}, volume = {8}, pages = {217977--217986}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3041837}, doi = {10.1109/ACCESS.2020.3041837}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AminantoBITI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/HanSTITN20, author = {Chansu Han and Jumpei Shimamura and Takeshi Takahashi and Daisuke Inoue and Jun'ichi Takeuchi and Koji Nakao}, title = {Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {10}, pages = {2113--2124}, year = {2020}, url = {https://doi.org/10.1587/transinf.2020EDP7076}, doi = {10.1587/TRANSINF.2020EDP7076}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/HanSTITN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/TakahashiCSKT20, author = {Takeshi Takahashi and Rodrigo Roman Castro and Bilhanan Silverajan and Ryan K. L. Ko and Said Tabet}, title = {Message from the guest editors}, journal = {Int. J. Inf. Sec.}, volume = {19}, number = {1}, pages = {1--2}, year = {2020}, url = {https://doi.org/10.1007/s10207-019-00472-9}, doi = {10.1007/S10207-019-00472-9}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/TakahashiCSKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcomps/WanBCLSITI20, author = {Tzu{-}Ling Wan and Tao Ban and Shin{-}Ming Cheng and Yen{-}Ting Lee and Bo Sun and Ryoichi Isawa and Takeshi Takahashi and Daisuke Inoue}, title = {Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files}, journal = {{IEEE} Open J. Comput. Soc.}, volume = {1}, pages = {262--275}, year = {2020}, url = {https://doi.org/10.1109/OJCS.2020.3033974}, doi = {10.1109/OJCS.2020.3033974}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ojcomps/WanBCLSITI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HsuWFSB0WK20, author = {Ruei{-}Hau Hsu and Yi{-}Cheng Wang and Chun{-}I Fan and Bo Sun and Tao Ban and Takeshi Takahashi and Ting{-}Wei Wu and Shang{-}Wei Kao}, title = {A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {128--136}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00031}, doi = {10.1109/ASIAJCIS50894.2020.00031}, timestamp = {Tue, 22 Sep 2020 10:17:08 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/HsuWFSB0WK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WanBLCI0I20, author = {Tzu{-}Ling Wan and Tao Ban and Yen{-}Ting Lee and Shin{-}Ming Cheng and Ryoichi Isawa and Takeshi Takahashi and Daisuke Inoue}, title = {IoT-Malware Detection Based on Byte Sequences of Executable Files}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {143--150}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00033}, doi = {10.1109/ASIAJCIS50894.2020.00033}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/WanBLCI0I20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/AotaKKMS020, author = {Masaki Aota and Hideaki Kanehara and Masaki Kubo and Noboru Murata and Bo Sun and Takeshi Takahashi}, title = {Automation of Vulnerability Classification from its Description using Machine Learning}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes, France, July 7-10, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISCC50000.2020.9219568}, doi = {10.1109/ISCC50000.2020.9219568}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscc/AotaKKMS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/FurumotoKSTIN20, author = {Keisuke Furumoto and Antti Kolehmainen and Bilhanan Silverajan and Takeshi Takahashi and Daisuke Inoue and Koji Nakao}, title = {Toward Automated Smart Ships: Designing Effective Cyber Risk Management}, booktitle = {2020 International Conferences on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData) and {IEEE} Congress on Cybermatics (Cybermatics), iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020, Rhodes Island, Greece, November 2-6, 2020}, pages = {100--105}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00034}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS50389.2020.00034}, timestamp = {Thu, 28 Jan 2021 15:35:58 +0100}, biburl = {https://dblp.org/rec/conf/ithings/FurumotoKSTIN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TakahashiKVYI20, author = {Takeshi Takahashi and Christopher Kruegel and Giovanni Vigna and Katsunari Yoshioka and Daisuke Inoue}, editor = {Manuel Egele and Leyla Bilge}, title = {Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {93--106}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/takahashi}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TakahashiKVYI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LeeBWCI0I20, author = {Yen{-}Ting Lee and Tao Ban and Tzu{-}Ling Wan and Shin{-}Ming Cheng and Ryoichi Isawa and Takeshi Takahashi and Daisuke Inoue}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Cross Platform IoT- Malware Family Classification based on Printable Strings}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {775--784}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00106}, doi = {10.1109/TRUSTCOM50675.2020.00106}, timestamp = {Fri, 30 Apr 2021 12:35:40 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LeeBWCI0I20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isrl/Sun0ZM20, author = {Bo Sun and Takeshi Takahashi and Lei Zhu and Tatsuya Mori}, editor = {Leslie F. Sikos and Kim{-}Kwang Raymond Choo}, title = {Discovering Malicious URLs Using Machine Learning Techniques}, booktitle = {Data Science in Cybersecurity and Cyberthreat Intelligence}, series = {Intelligent Systems Reference Library}, volume = {177}, pages = {33--60}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38788-4\_3}, doi = {10.1007/978-3-030-38788-4\_3}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isrl/Sun0ZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8727, author = {Takeshi Takahashi and Roman Danyliw and Mio Suzuki}, title = {{JSON} Binding of the Incident Object Description Exchange Format}, journal = {{RFC}}, volume = {8727}, pages = {1--88}, year = {2020}, url = {https://doi.org/10.17487/RFC8727}, doi = {10.17487/RFC8727}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/rfc/rfc8727.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakagawaNKFTSTM19, author = {Shunta Nakagawa and Tatsuya Nagai and Hideaki Kanehara and Keisuke Furumoto and Makoto Takita and Yoshiaki Shiraishi and Takeshi Takahashi and Masami Mohri and Yasuhiro Takano and Masakatu Morii}, title = {Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {9}, pages = {1679--1682}, year = {2019}, url = {https://doi.org/10.1587/transinf.2018OFL0006}, doi = {10.1587/TRANSINF.2018OFL0006}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/NakagawaNKFTSTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/UshigomeSBTIMS19, author = {Ryutaro Ushigome and Mio Suzuki and Tao Ban and Takeshi Takahashi and Daisuke Inoue and Takeshi Matsuda and Michio Sonoda}, title = {Establishing Trusted and Timely Information Source using Social Media Services}, booktitle = {16th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2019, Las Vegas, NV, USA, January 11-14, 2019}, pages = {1--2}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCNC.2019.8651814}, doi = {10.1109/CCNC.2019.8651814}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/UshigomeSBTIMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/AminantoZBI0I19, author = {Muhamad Erza Aminanto and Lei Zhu and Tao Ban and Ryoichi Isawa and Takeshi Takahashi and Daisuke Inoue}, editor = {Tom Gedeon and Kok Wai Wong and Minho Lee}, title = {Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest}, booktitle = {Neural Information Processing - 26th International Conference, {ICONIP} 2019, Sydney, NSW, Australia, December 12-15, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11953}, pages = {756--765}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36708-4\_62}, doi = {10.1007/978-3-030-36708-4\_62}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iconip/AminantoZBI0I19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/HeHI0KTN19, author = {Tianxiang He and Chansu Han and Ryoichi Isawa and Takeshi Takahashi and Shuji Kijima and Jun'ichi Takeuchi and Koji Nakao}, editor = {Tom Gedeon and Kok Wai Wong and Minho Lee}, title = {A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering}, booktitle = {Neural Information Processing - 26th International Conference, {ICONIP} 2019, Sydney, NSW, Australia, December 12-15, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11953}, pages = {766--778}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36708-4\_63}, doi = {10.1007/978-3-030-36708-4\_63}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconip/HeHI0KTN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AminantoZBITI19, author = {Muhamad Erza Aminanto and Lei Zhu and Tao Ban and Ryoichi Isawa and Takeshi Takahashi and Daisuke Inoue}, title = {Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--3}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949029}, doi = {10.1109/PST47121.2019.8949029}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AminantoZBITI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SunBCS0I19, author = {Bo Sun and Tao Ban and Shun{-}Chieh Chang and Yeali S. Sun and Takeshi Takahashi and Daisuke Inoue}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {A scalable and accurate feature representation method for identifying malicious mobile applications}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {1182--1189}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297396}, doi = {10.1145/3297280.3297396}, timestamp = {Sun, 02 Jun 2019 21:18:38 +0200}, biburl = {https://dblp.org/rec/conf/sac/SunBCS0I19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KaneharaMS0IM19, author = {Hideaki Kanehara and Yuma Murakami and Jumpei Shimamura and Takeshi Takahashi and Daisuke Inoue and Noboru Murata}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {Real-time botnet detection using nonnegative tucker decomposition}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {1337--1344}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297415}, doi = {10.1145/3297280.3297415}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/KaneharaMS0IM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanS0IKTN19, author = {Chansu Han and Jumpei Shimamura and Takeshi Takahashi and Daisuke Inoue and Masanori Kawakita and Jun'ichi Takeuchi and Koji Nakao}, title = {Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {144--151}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00028}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00028}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanS0IKTN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SunFMBTI18, author = {Bo Sun and Akinori Fujino and Tatsuya Mori and Tao Ban and Takeshi Takahashi and Daisuke Inoue}, title = {Automatically Generating Malware Analysis Reports Using Sandbox Logs}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {11}, pages = {2622--2632}, year = {2018}, url = {https://doi.org/10.1587/transinf.2017ICP0011}, doi = {10.1587/TRANSINF.2017ICP0011}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SunFMBTI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/TakahashiPKN18, author = {Takeshi Takahashi and Bhola Panta and Youki Kadobayashi and Koji Nakao}, title = {Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information}, journal = {Int. J. Commun. Syst.}, volume = {31}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/dac.3470}, doi = {10.1002/DAC.3470}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/TakahashiPKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IijimaMYT0OM18, author = {Ryo Iijima and Shota Minami and Yunao Zhou and Tatsuya Takehisa and Takeshi Takahashi and Yasuhiro Oikawa and Tatsuya Mori}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2222--2224}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3278497}, doi = {10.1145/3243734.3278497}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IijimaMYT0OM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/ZhuB0I18, author = {Lei Zhu and Tao Ban and Takeshi Takahashi and Daisuke Inoue}, editor = {Long Cheng and Andrew Chi{-}Sing Leung and Seiichi Ozawa}, title = {Employ Decision Values for Soft-Classifier Evaluation with Crispy References}, booktitle = {Neural Information Processing - 25th International Conference, {ICONIP} 2018, Siem Reap, Cambodia, December 13-16, 2018, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11304}, pages = {392--402}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04212-7\_34}, doi = {10.1007/978-3-030-04212-7\_34}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iconip/ZhuB0I18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/PangZBIZS0I18, author = {Shaoning Pang and Lei Zhu and Tao Ban and Kazushi Ikeda and Wangfei Zhang and Abdolhossein Sarrafzadeh and Takeshi Takahashi and Daisuke Inoue}, title = {Online Max-flow Learning via Augmenting and De-augmenting Path}, booktitle = {2018 International Joint Conference on Neural Networks, {IJCNN} 2018, Rio de Janeiro, Brazil, July 8-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IJCNN.2018.8489405}, doi = {10.1109/IJCNN.2018.8489405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/PangZBIZS0I18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/Vorakulpipat0RT18, author = {Chalee Vorakulpipat and Takeshi Takahashi and Ekkachan Rattanalerdnusorn and Phithak Thaenkaew and Daisuke Inoue}, title = {Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices}, booktitle = {2018 {IEEE} Symposium on Computers and Communications, {ISCC} 2018, Natal, Brazil, June 25-28, 2018}, pages = {274--277}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISCC.2018.8538712}, doi = {10.1109/ISCC.2018.8538712}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/Vorakulpipat0RT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/ChangSCCS018, author = {Shun{-}Chieh Chang and Yeali S. Sun and Wu{-}Long Chuang and Meng Chang Chen and Bo Sun and Takeshi Takahashi}, title = {ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family}, booktitle = {23rd {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2018, Taipei, Taiwan, December 4-7, 2018}, pages = {257--262}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/PRDC.2018.00047}, doi = {10.1109/PRDC.2018.00047}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/prdc/ChangSCCS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/EmuraKOT17, author = {Keita Emura and Akira Kanaoka and Satoshi Ohta and Takeshi Takahashi}, title = {Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation}, journal = {J. Inf. Secur. Appl.}, volume = {34}, pages = {84--91}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2016.12.001}, doi = {10.1016/J.JISA.2016.12.001}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/EmuraKOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/EmuraKOOT16, author = {Keita Emura and Akira Kanaoka and Satoshi Ohta and Kazumasa Omote and Takeshi Takahashi}, title = {Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {4}, number = {1}, pages = {88--101}, year = {2016}, url = {https://doi.org/10.1109/TETC.2015.2400131}, doi = {10.1109/TETC.2015.2400131}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/EmuraKOOT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/BanTGIN16, author = {Tao Ban and Takeshi Takahashi and Shanqing Guo and Daisuke Inoue and Koji Nakao}, title = {Integration of Multi-modal Features for Android Malware Detection Using Linear {SVM}}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {141--146}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.29}, doi = {10.1109/ASIAJCIS.2016.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/BanTGIN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/TakahashiBTLIN16, author = {Takeshi Takahashi and Tao Ban and Chin{-}Wei Tien and Chih{-}Hung Lin and Daisuke Inoue and Koji Nakao}, editor = {Akira Hirose and Seiichi Ozawa and Kenji Doya and Kazushi Ikeda and Minho Lee and Derong Liu}, title = {The Usability of Metadata for Android Application Analysis}, booktitle = {Neural Information Processing - 23rd International Conference, {ICONIP} 2016, Kyoto, Japan, October 16-21, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9947}, pages = {546--554}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46687-3\_60}, doi = {10.1007/978-3-319-46687-3\_60}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/iconip/TakahashiBTLIN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/TakahashiM16, author = {Takeshi Takahashi and Daisuke Miyamoto}, editor = {Sema Oktug and Mehmet Ulema and Cicek Cavdar and Lisandro Zambenedetti Granville and Carlos Raniery Paula dos Santos}, title = {Structured cybersecurity information exchange for streamlining incident response operations}, booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, pages = {949--954}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NOMS.2016.7502931}, doi = {10.1109/NOMS.2016.7502931}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/TakahashiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/MiyamotoNTS16, author = {Daisuke Miyamoto and Ryo Nakamura and Takeshi Takahashi and Yuji Sekiya}, title = {Offloading smartphone firewalling using OpenFlow-capable wireless access points}, booktitle = {2016 {IEEE} International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18, 2016}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/PERCOMW.2016.7457060}, doi = {10.1109/PERCOMW.2016.7457060}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/MiyamotoNTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/TakahashiMN16, author = {Takeshi Takahashi and Daisuke Miyamoto and Koji Nakao}, title = {Toward automated vulnerability monitoring using open information and standardized tools}, booktitle = {2016 {IEEE} International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18, 2016}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/PERCOMW.2016.7457049}, doi = {10.1109/PERCOMW.2016.7457049}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/TakahashiMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/TakahashiI16, author = {Takeshi Takahashi and Daisuke Inoue}, title = {Generating software identifier dictionaries from Vulnerability Database}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {417--420}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906965}, doi = {10.1109/PST.2016.7906965}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/TakahashiI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TakahashiK15, author = {Takeshi Takahashi and Youki Kadobayashi}, title = {Reference Ontology for Cybersecurity Operational Information}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2297--2312}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu101}, doi = {10.1093/COMJNL/BXU101}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/TakahashiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/KannistoTHHHMS15, author = {Joona Kannisto and Takeshi Takahashi and Jarmo Harju and Seppo Heikkinen and Marko Helenius and Shin'ichiro Matsuo and Bilhanan Silverajan}, title = {A non-repudiable negotiation protocol for security service level agreements}, journal = {Int. J. Commun. Syst.}, volume = {28}, number = {15}, pages = {2067--2081}, year = {2015}, url = {https://doi.org/10.1002/dac.2856}, doi = {10.1002/DAC.2856}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/KannistoTHHHMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/EmuraKOT15, author = {Keita Emura and Akira Kanaoka and Satoshi Ohta and Takeshi Takahashi}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {A KEM/DEM-Based Construction for Secure and Anonymous Communication}, booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2015, Taichung, Taiwan, July 1-5, 2015}, pages = {680--681}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.54}, doi = {10.1109/COMPSAC.2015.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/EmuraKOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/TakahashiBMN15, author = {Takeshi Takahashi and Tao Ban and Takao Mimura and Koji Nakao}, editor = {Sabri Arik and Tingwen Huang and Weng Kin Lai and Qingshan Liu}, title = {Fine-Grained Risk Level Quantication Schemes Based on {APK} Metadata}, booktitle = {Neural Information Processing - 22nd International Conference, {ICONIP} 2015, Istanbul, Turkey, November 9-12, 2015, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9491}, pages = {663--673}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26555-1\_75}, doi = {10.1007/978-3-319-26555-1\_75}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/iconip/TakahashiBMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TakahashiNK14, author = {Takeshi Takahashi and Koji Nakao and Akira Kanaoka}, editor = {Gail{-}Joon Ahn and Tomas Sander}, title = {Data Model for Android Package Information and Its Application to Risk Analysis System}, booktitle = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&} Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {71--80}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663876.2663881}, doi = {10.1145/2663876.2663881}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TakahashiNK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/TakanoOTAI14, author = {Yuuki Takano and Satoshi Ohta and Takeshi Takahashi and Ruo Ando and Tomoya Inoue}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {48--56}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890923}, doi = {10.1109/PST.2014.6890923}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/TakanoOTAI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/EmuraKOT14, author = {Keita Emura and Akira Kanaoka and Satoshi Ohta and Takeshi Takahashi}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {Building secure and anonymous communication channel: formal model and its prototype implementation}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1641--1648}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554879}, doi = {10.1145/2554850.2554879}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/EmuraKOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semco/TakahashiK14, author = {Takeshi Takahashi and Youki Kadobayashi}, title = {Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks}, booktitle = {2014 {IEEE} International Conference on Semantic Computing, Newport Beach, CA, USA, June 16-18, 2014}, pages = {279--284}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICSC.2014.66}, doi = {10.1109/ICSC.2014.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/semco/TakahashiK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/TakahashiKHKTM14, author = {Takeshi Takahashi and Joona Kannisto and Jarmo Harju and Akira Kanaoka and Yuuki Takano and Shin'ichiro Matsuo}, title = {Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme}, booktitle = {2014 {IEEE} World Congress on Services, {SERVICES} 2014, Anchorage, AK, USA, June 27 - July 2, 2014}, pages = {121--128}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SERVICES.2014.31}, doi = {10.1109/SERVICES.2014.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/TakahashiKHKTM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/EmuraKOT14, author = {Keita Emura and Akira Kanaoka and Satoshi Ohta and Takeshi Takahashi}, title = {Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation}, journal = {CoRR}, volume = {abs/1403.7014}, year = {2014}, url = {http://arxiv.org/abs/1403.7014}, eprinttype = {arXiv}, eprint = {1403.7014}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/EmuraKOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TakahashiHKSHM14, author = {Takeshi Takahashi and Jarmo Harju and Joona Kannisto and Bilhanan Silverajan and Shin'ichiro Matsuo}, title = {Tailored Security: Building Nonrepudiable Security Service-Level Agreements}, journal = {CoRR}, volume = {abs/1403.7088}, year = {2014}, url = {http://arxiv.org/abs/1403.7088}, eprinttype = {arXiv}, eprint = {1403.7088}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TakahashiHKSHM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TakahashiKF14, author = {Takeshi Takahashi and Youki Kadobayashi and Hiroyuki Fujiwara}, title = {Ontological Approach toward Cybersecurity in Cloud Computing}, journal = {CoRR}, volume = {abs/1405.6169}, year = {2014}, url = {http://arxiv.org/abs/1405.6169}, eprinttype = {arXiv}, eprint = {1405.6169}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TakahashiKF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc7203, author = {Takeshi Takahashi and Kent Landfield and Youki Kadobayashi}, title = {An Incident Object Description Exchange Format {(IODEF)} Extension for Structured Cybersecurity Information}, journal = {{RFC}}, volume = {7203}, pages = {1--28}, year = {2014}, url = {https://doi.org/10.17487/RFC7203}, doi = {10.17487/RFC7203}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc7203.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vtm/TakahashiKHHSHM13, author = {Takeshi Takahashi and Joona Kannisto and Jarmo Harju and Seppo Heikkinen and Bilhanan Silverajan and Marko Helenius and Shin'ichiro Matsuo}, title = {Tailored Security: Building Nonrepudiable Security Service-Level Agreements}, journal = {{IEEE} Veh. Technol. Mag.}, volume = {8}, number = {3}, pages = {54--62}, year = {2013}, url = {https://doi.org/10.1109/MVT.2013.2269188}, doi = {10.1109/MVT.2013.2269188}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vtm/TakahashiKHHSHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TakahashiEKMM13, author = {Takeshi Takahashi and Keita Emura and Akira Kanaoka and Shin'ichiro Matsuo and Tadashi Minowa}, editor = {Yan Chen and XiaoFeng Wang}, title = {Risk visualization and alerting system: architecture and proof-of-concept implementation}, booktitle = {Proceedings of the first international workshop on Security in embedded systems and smartphones, {SESP} 2013, Hangzhou, China, May 8, 2013}, pages = {3--10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484417.2484421}, doi = {10.1145/2484417.2484421}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TakahashiEKMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/MiyamotoT13, author = {Daisuke Miyamoto and Takeshi Takahashi}, editor = {Leonard Barolli and Ilsun You and Fatos Xhafa and Fang{-}Yie Leu and Hsing{-}Chung Chen}, title = {Toward Automated Reduction of Human Errors Based on Cognitive Analysis}, booktitle = {Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July 3-5, 2013}, pages = {820--825}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IMIS.2013.147}, doi = {10.1109/IMIS.2013.147}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/MiyamotoT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/TakahashiKHHHMS13, author = {Takeshi Takahashi and Joona Kannisto and Jarmo Harju and Seppo Heikkinen and Marko Helenius and Shin'ichiro Matsuo and Bilhanan Silverajan}, title = {Accountable security mechanism based on security service level agreement}, booktitle = {2013 {IEEE} Symposium on Computers and Communications, {ISCC} 2013, Split, Croatia, 7-10 July, 2013}, pages = {404--410}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISCC.2013.6754980}, doi = {10.1109/ISCC.2013.6754980}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscc/TakahashiKHHHMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcfic/0001BKFHM12, author = {Takeshi Takahashi and Gregory Blanc and Youki Kadobayashi and Doudou Fall and Hiroaki Hazeyama and Shin'ichiro Matsuo}, title = {Enabling secure multitenancy in cloud computing: Challenges and approaches}, booktitle = {2nd Baltic Congress on Future Internet Communications, {BCFIC} 2012, Vilnius, Lithuania, April 25-27, 2012}, pages = {72--79}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/BCFIC.2012.6217983}, doi = {10.1109/BCFIC.2012.6217983}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bcfic/0001BKFHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/MinowaT12, author = {Tadashi Minowa and Takeshi Takahashi}, editor = {Tingwen Huang and Zhigang Zeng and Chuandong Li and Chi{-}Sing Leung}, title = {Secure Distributed Storage for Bulk Data}, booktitle = {Neural Information Processing - 19th International Conference, {ICONIP} 2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {7667}, pages = {566--575}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34500-5\_67}, doi = {10.1007/978-3-642-34500-5\_67}, timestamp = {Tue, 30 Jun 2020 11:04:50 +0200}, biburl = {https://dblp.org/rec/conf/iconip/MinowaT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/MoriyamaTM12, author = {Eimatsu Moriyama and Takeshi Takahashi and Daisuke Miyamoto}, editor = {Tingwen Huang and Zhigang Zeng and Chuandong Li and Chi{-}Sing Leung}, title = {DNS-Based Defense against {IP} Spoofing Attacks}, booktitle = {Neural Information Processing - 19th International Conference, {ICONIP} 2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {7667}, pages = {599--609}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34500-5\_71}, doi = {10.1007/978-3-642-34500-5\_71}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iconip/MoriyamaTM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kaleidoscope/TakahashiKN11, author = {Takeshi Takahashi and Youki Kadobayashi and Koji Nakao}, title = {Toward global cybersecurity collaboration: Cybersecurity operation activity model}, booktitle = {Proceedings of the {ITU} Kaleidoscope 2011: The Fully Networked Human? - Innovations for Future Networks and Services, Cape Town, South Africa, December 12-14, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6144207/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kaleidoscope/TakahashiKN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BanZATK11, author = {Tao Ban and Changshui Zhang and Shigeo Abe and Takeshi Takahashi and Youki Kadobayashi}, editor = {William C. Chu and W. Eric Wong and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Mining interlacing manifolds in high dimensional spaces}, booktitle = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}, pages = {942--949}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1982185.1982392}, doi = {10.1145/1982185.1982392}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BanZATK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/RutkowskiKFRMTSRSHA10, author = {Anthony M. Rutkowski and Youki Kadobayashi and Inette Furey and Damir Rajnovic and Robert Martin and Takeshi Takahashi and Craig Schultz and Gavin Reid and Gregg Schudel and Mike Hird and Stephen Adegbite}, title = {{CYBEX:} the cybersecurity information exchange framework (x.1500)}, journal = {Comput. Commun. Rev.}, volume = {40}, number = {5}, pages = {59--64}, year = {2010}, url = {https://doi.org/10.1145/1880153.1880163}, doi = {10.1145/1880153.1880163}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/RutkowskiKFRMTSRSHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/TakahashiFK10, author = {Takeshi Takahashi and Hiroyuki Fujiwara and Youki Kadobayashi}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Building ontology of cybersecurity operational information}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {79}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852756}, doi = {10.1145/1852666.1852756}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/TakahashiFK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/TakahashiKF10, author = {Takeshi Takahashi and Youki Kadobayashi and Hiroyuki Fujiwara}, editor = {Oleg B. Makarevich and Atilla El{\c{c}}i and Mehmet A. Orgun and Sorin A. Huss and Ludmila K. Babenko and Alexander G. Chefranov and Vijay Varadharajan}, title = {Ontological approach toward cybersecurity in cloud computing}, booktitle = {Proceedings of the 3rd International Conference on Security of Information and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010}, pages = {100--109}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854099.1854121}, doi = {10.1145/1854099.1854121}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/TakahashiKF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TakahashiAHT05, author = {Takeshi Takahashi and Koichi Asatani and Jarmo Harju and Hideyoshi Tominaga}, title = {Proactive Handover Scheme Based on Forwarding Router Discovery for Mobile {IP} Networks}, journal = {{IEICE} Trans. Commun.}, volume = {88-B}, number = {7}, pages = {2718--2725}, year = {2005}, url = {https://doi.org/10.1093/ietcom/e88-b.7.2718}, doi = {10.1093/IETCOM/E88-B.7.2718}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TakahashiAHT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadnets/TakahashiAT05, author = {Takeshi Takahashi and Koichi Asatani and Hideyoshi Tominaga}, title = {Multicast source handover scheme based on proxy router discovery}, booktitle = {2nd International Conference on Broadband Networks {(BROADNETS} 2005), 3-7 October 2005, Boston, Massachusetts, {USA}}, pages = {865--874}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICBN.2005.1589690}, doi = {10.1109/ICBN.2005.1589690}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/broadnets/TakahashiAT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/TakahashiHAT05, author = {Takeshi Takahashi and Jarmo Harju and Koichi Asatani and Hideyoshi Tominaga}, title = {A routing-aware handover scheme for mobile {IP}}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2005, Seoul, Korea, 16-20 May 2005}, pages = {1400--1406}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICC.2005.1494575}, doi = {10.1109/ICC.2005.1494575}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/TakahashiHAT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/TakahashiAT05, author = {Takeshi Takahashi and Koichi Asatani and Hideyoshi Tominaga}, editor = {Pascal Lorenz and Petre Dini}, title = {Multicast Receiver Mobility over Mobile {IP} Networks based on Forwarding Router Discovery}, booktitle = {Networking - {ICN} 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3421}, pages = {859--867}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31957-3\_97}, doi = {10.1007/978-3-540-31957-3\_97}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/icn/TakahashiAT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/TakahashiHAT05, author = {Takeshi Takahashi and Jarmo Harju and Koichi Asatani and Hideyoshi Tominaga}, title = {Inter-domain handover scheme based on forwarding router discovery for mobile {IP} networks}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005, March 13-17, 2005, New Orleans, Louisiana, {USA}}, pages = {1409--1414}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/WCNC.2005.1424722}, doi = {10.1109/WCNC.2005.1424722}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/TakahashiHAT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/DobashiTT05, author = {Kentaro Dobashi and Takeshi Takahashi and Hideyoshi Tominaga}, title = {Adaptive {MAC} protocol for high-load inter-vehicle communication}, booktitle = {2005 {IEEE} International Conference on Wireless And Mobile Computing, Networking And Communications, WiMob 2005, Montreal, Canada, August 22-14, 2005, Volume 3}, pages = {138--145}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/WIMOB.2005.1512896}, doi = {10.1109/WIMOB.2005.1512896}, timestamp = {Thu, 12 Aug 2021 09:49:22 +0200}, biburl = {https://dblp.org/rec/conf/wimob/DobashiTT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/TakahashiTVLH04, author = {Takeshi Takahashi and Miikka Tammi and Heikki Vatiainen and Rami Lehtonen and Jarmo Harju}, title = {Implementation and performance evaluation of multicast control protocol}, booktitle = {Proceedings of the 9th {IEEE} Symposium on Computers and Communications {(ISCC} 2006), June 28 - July 1, 2004, Alexandria, Egypt}, pages = {1038--1043}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ISCC.2004.1358677}, doi = {10.1109/ISCC.2004.1358677}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/TakahashiTVLH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/TakahashiKHT02, author = {Takeshi Takahashi and Hiroyuki Kasai and Tsuyoshi Hanamura and Hideyoshi Tominaga}, title = {Packet-multiplexing scheme in {MPEG-2} multi-program transport stream transcoder}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2002, May 13-17 2002, Orlando, Florida, {USA}}, pages = {4178}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ICASSP.2002.5745636}, doi = {10.1109/ICASSP.2002.5745636}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/TakahashiKHT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/TakahasiKHT01, author = {Takeshi Takahashi and Hiroyuki Kasai and Tsuyoshi Hanamura and Hideyoshi Tominaga}, title = {{MPEG-2} Multi-Program Transport Stream Transcoder}, booktitle = {Proceedings of the 2001 {IEEE} International Conference on Multimedia and Expo, {ICME} 2001, August 22-25, 2001, Tokyo, Japan}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICME.2001.1237747}, doi = {10.1109/ICME.2001.1237747}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/TakahasiKHT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.