default search action
Takeo Hariu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter. IEICE Trans. Inf. Syst. 107(7): 807-824 (2024) - 2018
- [j11]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Kazuhiko Ohkubo, Shigeki Goto:
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences. IEICE Trans. Inf. Syst. 101-D(11): 2600-2611 (2018) - [j10]Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi:
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle. Int. J. Inf. Sec. 17(2): 135-151 (2018) - 2016
- [j9]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks. IEICE Trans. Inf. Syst. 99-D(4): 860-872 (2016) - [j8]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure. IEICE Trans. Commun. 99-B(5): 1012-1023 (2016) - 2015
- [j7]Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi:
Client Honeypot Multiplication with High Performance and Precise Detection. IEICE Trans. Inf. Syst. 98-D(4): 775-787 (2015) - 2014
- [j6]Takeshi Yagi, Junichi Murayama, Takeo Hariu, Sho Tsugawa, Hiroyuki Ohsaki, Masayuki Murata:
Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites. IEICE Trans. Commun. 97-B(1): 76-86 (2014) - 2013
- [j5]Takeshi Yagi, Junichi Murayama, Takeo Hariu, Hiroyuki Ohsaki:
Evaluations and Analysis of Malware Prevention Methods on Websites. IEICE Trans. Commun. 96-B(12): 3091-3100 (2013) - [j4]Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu:
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs. IT Prof. 15(4): 50-56 (2013) - 2011
- [j3]Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh:
Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme. IEICE Trans. Commun. 94-B(5): 1339-1347 (2011) - 2010
- [j2]Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh:
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution. IEICE Trans. Commun. 93-B(5): 1122-1130 (2010) - 2008
- [j1]Tomoo Fukazawa, Takemi Nisase, Masahisa Kawashima, Takeo Hariu, Yoshihito Oshima:
Safe and Secure Services Based on NGN. IEICE Trans. Inf. Syst. 91-D(5): 1226-1233 (2008)
Conference and Workshop Papers
- 2023
- [c12]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. ARES 2023: 6:1-6:12 - 2017
- [c11]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations. WISE (2) 2017: 278-294 - 2015
- [c10]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks. COMPSAC 2015: 444-449 - [c9]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts. TrustCom/BigDataSE/ISPA (1) 2015: 758-765 - 2013
- [c8]Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu:
API Chaser: Anti-analysis Resistant Malware Analyzer. RAID 2013: 123-143 - [c7]Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi:
Active Credential Leakage for Observing Web-Based Attack Cycle. RAID 2013: 223-243 - 2012
- [c6]Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu:
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks. ACSAC 2012: 309-318 - [c5]Mitsuaki Akiyama, Yuhei Kawakoya, Takeo Hariu:
Scalable and Performance-Efficient Client Honeypot on High Interaction System. SAINT 2012: 40-50 - 2010
- [c4]Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh:
Enhanced attack collection scheme on high-interaction web honeypots. ISCC 2010: 81-86 - [c3]Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh:
Life-cycle monitoring scheme of malware download sites for websites. SOCA 2010: 1-6 - [c2]Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh:
Investigation and analysis of malware on websites. WSE 2010: 73-81 - 1997
- [c1]Hiroyuki Fujii, Shigeaki Tanimoto, Takeo Hariu, Hirohisa Miyashiro, Linda Galasso:
An Experimental Study of Logical Office service over International ATM Networks. LCN 1997: 530-537
Informal and Other Publications
- 2023
- [i1]Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. CoRR abs/2303.15847 (2023)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-12 21:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint