


Остановите войну!
for scientists:
Tatsuya Mori
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c79]Ryo Iijima, Tatsuya Takehisa, Tatsuya Mori:
Cyber-physical firewall: monitoring and controlling the threats caused by malicious analog signals. CF 2022: 296-304 - [c78]Yuji Yano, Hisashi Iwamoto, Takuma Yoshimura, Yoshihiro Nishida, Tatsuya Mori, Kiyotaka Komoku, Hidekuni Takao, Kazutami Arimoto:
28-m W Fully Embedded AI Techniques with On-site Learning for Low-Power Handy Tactile Sensing System. VLSI-DAT 2022: 1-4 - 2021
- [j48]Yuji Sakurai
, Takuya Watanabe
, Tetsuya Okuda, Mitsuaki Akiyama
, Tatsuya Mori
:
Identifying the Phishing Websites Using the Patterns of TLS Certificates. J. Cyber Secur. Mobil. 10(2): 451-486 (2021) - [j47]Ryo Iijima
, Shota Minami
, Yunao Zhou, Tatsuya Takehisa
, Takeshi Takahashi
, Yasuhiro Oikawa
, Tatsuya Mori
:
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility. IEEE Trans. Emerg. Top. Comput. 9(4): 2004-2018 (2021) - [c77]Tenga Matsuura, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori:
Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods. EuroUSEC 2021: 36-47 - [c76]Masanori Yajima, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori:
Measuring Adoption of DNS Security Mechanisms with Cross-Sectional Approach. GLOBECOM 2021: 1-6 - [c75]Ryo Kawaoka
, Daiki Chiba
, Takuya Watanabe, Mitsuaki Akiyama
, Tatsuya Mori
:
A First Look at COVID-19 Domain Names: Origin and Implications. PAM 2021: 39-53 - [c74]Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, Tatsuya Mori:
Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails. SOUPS @ USENIX Security Symposium 2021: 319-338 - [i10]Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
A First Look at COVID-19 Domain Names: Origin and Implications. CoRR abs/2102.05290 (2021) - [i9]Taiga Ono, Takeshi Sugawara, Jun Sakuma, Tatsuya Mori:
Application of Adversarial Examples to Physical ECG Signals. CoRR abs/2108.08972 (2021) - 2020
- [j46]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori
:
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel. IEICE Trans. Inf. Syst. 103-D(2): 239-255 (2020) - [j45]Mitsuhiro Hatada, Tatsuya Mori
:
CLAP: Classification of Android PUAs by Similarity of DNS Queries. IEICE Trans. Inf. Syst. 103-D(2): 265-275 (2020) - [j44]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori
:
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library. IEICE Trans. Inf. Syst. 103-D(2): 276-291 (2020) - [j43]Keika Mori, Takuya Watanabe, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori:
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? IEICE Trans. Inf. Syst. 103-D(7): 1541-1555 (2020) - [j42]Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori
:
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services. J. Inf. Process. 28: 1030-1046 (2020) - [c73]Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori
:
Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints. EuroS&P Workshops 2020: 522-531 - [c72]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites. NDSS 2020 - [p1]Bo Sun, Takeshi Takahashi, Lei Zhu, Tatsuya Mori
:
Discovering Malicious URLs Using Machine Learning Techniques. Data Science in Cybersecurity and Cyberthreat Intelligence 2020: 33-60
2010 – 2019
- 2019
- [j41]Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori
, Akira Kanaoka:
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps. J. Inf. Process. 27: 593-602 (2019) - [c71]Yuma Kurogome, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Syogo Hayashi, Tatsuya Mori
, Koushik Sen:
EIGER: automated IOC generation for accurate and interpretable endpoint malware detection. ACSAC 2019: 687-701 - [c70]Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori
:
Poster: A First Look at the Privacy Risks of Voice Assistant Apps. CCS 2019: 2633-2635 - [c69]Tatsuhiko Yasumatsu, Takuya Watanabe, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori
:
Understanding the Responsiveness of Mobile App Developers to Software Library Updates. CODASPY 2019: 13-24 - [c68]Keika Mori, Takuya Watanabe, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori
:
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? EuroS&P Workshops 2019: 159-171 - [c67]Hiroaki Suzuki, Daiki Chiba
, Yoshiro Yoneya, Tatsuya Mori
, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. Internet Measurement Conference 2019: 449-462 - [c66]Takuya Hiraoka, Takahisa Imagawa, Tatsuya Mori, Takashi Onishi, Yoshimasa Tsuruoka:
Learning Robust Options by Conditional Value at Risk Optimization. NeurIPS 2019: 2615-2625 - [c65]Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori
:
Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens. IEEE Symposium on Security and Privacy 2019: 620-637 - [i8]Takuya Hiraoka, Takahisa Imagawa, Tatsuya Mori, Takashi Onishi, Yoshimasa Tsuruoka:
Learning Robust Options by Conditional Value at Risk Optimization. CoRR abs/1905.09191 (2019) - [i7]Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. CoRR abs/1909.07539 (2019) - 2018
- [j40]Daiki Chiba
, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Tatsuya Mori
, Shigeki Goto:
DomainChroma: Building actionable threat intelligence from malicious domain names. Comput. Secur. 77: 138-161 (2018) - [j39]Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori
, Shigeki Goto:
Detecting Malware-Infected Devices Using the HTTP Header Patterns. IEICE Trans. Inf. Syst. 101-D(5): 1370-1379 (2018) - [j38]Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, Tatsuya Mori
:
Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps. IEICE Trans. Inf. Syst. 101-D(11): 2584-2599 (2018) - [j37]Bo Sun, Akinori Fujino, Tatsuya Mori
, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Automatically Generating Malware Analysis Reports Using Sandbox Logs. IEICE Trans. Inf. Syst. 101-D(11): 2622-2632 (2018) - [j36]Daiki Chiba
, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori
, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. Int. J. Inf. Sec. 17(6): 661-680 (2018) - [j35]Bo Sun, Xiapu Luo
, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
:
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store. J. Inf. Process. 26: 212-223 (2018) - [c64]Elkana Pariwono, Daiki Chiba
, Mitsuaki Akiyama, Tatsuya Mori
:
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps. AsiaCCS 2018: 147-158 - [c63]Ryo Iijima, Shota Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori:
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams. CCS 2018: 2222-2224 - [c62]Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori
, Akira Kanaoka:
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps. COMPSAC (2) 2018: 713-718 - [c61]Mika Juuti, Bo Sun, Tatsuya Mori
, N. Asokan:
Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews. ESORICS (1) 2018: 132-151 - [c60]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori
:
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts. EuroS&P 2018: 323-337 - [c59]Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi:
A Feasibility Study of Radio-frequency Retroreflector Attack. WOOT @ USENIX Security Symposium 2018 - [i6]Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan:
Stay On-Topic: Generating Context-specific Fake Restaurant Reviews. CoRR abs/1805.02400 (2018) - [i5]Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts. CoRR abs/1805.05085 (2018) - 2017
- [j34]Mitsuaki Akiyama
, Takeshi Yagi, Takeshi Yada, Tatsuya Mori
, Youki Kadobayashi:
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. Comput. Secur. 69: 155-173 (2017) - [j33]Yumehisa Haga, Yuta Takata, Mitsuaki Akiyama, Tatsuya Mori
:
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study. IEICE Trans. Inf. Syst. 100-D(8): 1663-1670 (2017) - [j32]Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori
:
Tracking the Human Mobility Using Mobile Device Sensors. IEICE Trans. Inf. Syst. 100-D(8): 1680-1690 (2017) - [j31]Mitsuhiro Hatada, Tatsuya Mori
:
Finding New Varieties of Malware with the Classification of Network Behavior. IEICE Trans. Inf. Syst. 100-D(8): 1691-1702 (2017) - [j30]Yuta Ishii, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori
:
APPraiser: A Large Scale Analysis of Android Clone Apps. IEICE Trans. Inf. Syst. 100-D(8): 1703-1713 (2017) - [j29]Tatsuaki Kimura, Keisuke Ishibashi, Tatsuya Mori
, Hiroshi Sawada, Tsuyoshi Toyono, Ken Nishimatsu, Akio Watanabe, Akihiro Shimoda, Kohei Shiomoto:
Network Event Extraction from Log Data with Nonnegative Tensor Factorization. IEICE Trans. Commun. 100-B(10): 1865-1878 (2017) - [c58]Bo Sun, Xiapu Luo
, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
:
Characterizing Promotional Attacks in Mobile App Store. ATIS 2017: 113-127 - [c57]Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori
:
POSTER: TOUCHFLOOD: A Novel Class of Attacks against Capacitive Touchscreens. CCS 2017: 2551-2553 - [c56]Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori
, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi:
POSTER: Is Active Electromagnetic Side-channel Attack Practical? CCS 2017: 2587-2589 - [c55]Mitsuhiro Hatada, Tatsuya Mori
:
Detecting and Classifying Android PUAs by Similarity of DNS queries. COMPSAC (2) 2017: 590-595 - [c54]Daiki Chiba
, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori
, Shigeki Goto:
DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names. COMPSAC (1) 2017: 643-648 - [c53]Shinji Hotta, Tatsuya Mori, Daisuke Uchida, Kazuho Maeda, Yoshinori Yaginuma, Akihiro Inomata:
Eating moment recognition using heart rate responses. UbiComp/ISWC Adjunct 2017: 69-72 - [c52]Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori
, Shigeki Goto:
BotDetector: A robust and scalable approach toward detecting malware-infected devices. ICC 2017: 1-7 - [c51]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori
:
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. MSR 2017: 14-24 - [c50]Yuta Ishii, Takuya Watanabe, Fumihiro Kanei, Yuta Takata, Eitaro Shioji, Mitsuaki Akiyama, Takeshi Yagi, Bo Sun, Tatsuya Mori
:
Understanding the security management of global third-party Android marketplaces. WAMA@ESEC/SIGSOFT FSE 2017: 12-18 - [i4]Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori:
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules. CoRR abs/1702.03112 (2017) - [i3]Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori:
Trojan of Things: Embedding Malicious NFC Tags into Common Objects. CoRR abs/1702.07124 (2017) - 2016
- [j28]Tatsuya Mori
, Takeru Inoue
, Akihiro Shimoda, Kazumichi Sato, Shigeaki Harada, Keisuke Ishibashi, Shigeki Goto:
Statistical estimation of the names of HTTPS servers with domain name graphs. Comput. Commun. 94: 104-113 (2016) - [j27]Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori
:
Automating URL Blacklist Generation with Similarity Search Approach. IEICE Trans. Inf. Syst. 99-D(4): 873-882 (2016) - [c49]Tatsuya Mori, Daisuke Uchida, Masato Sakata, Takuro Oya, Yasuyuki Nakata, Kazuho Maeda, Yoshinori Yaginuma, Akihiro Inomata:
Continuous Real-time Heart Rate Monitoring from Face Images. BIOSIGNALS 2016: 52-56 - [c48]Daisuke Uchida, Tatsuya Mori, Masato Sakata, Takuro Oya, Yasuyuki Nakata, Kazuho Maeda, Yoshinori Yaginuma, Akihiro Inomata:
Continuous Real-Time Measurement Method for Heart Rate Monitoring Using Face Images. BIOSTEC (Selected Papers) 2016: 224-235 - [c47]Bo Sun, Akinori Fujino, Tatsuya Mori
:
POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs. CCS 2016: 1814-1816 - [c46]Yuta Ishii, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori
:
Clone or Relative?: Understanding the Origins of Similar Android Apps. IWSPA@CODASPY 2016: 25-32 - [c45]Daiki Chiba
, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori
, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. DSN 2016: 491-502 - [c44]Guifen Tian, Tatsuya Mori, Yuji Okuda:
Spoofing detection for embedded face recognition system using a low cost stereo camera. ICPR 2016: 1017-1022 - 2015
- [c43]Akinori Fujino, Junichi Murakami, Tatsuya Mori
:
Discovering similar malware samples using API call topics. CCNC 2015: 140-147 - [c42]Yumehisa Haga, Akira Saso, Tatsuya Mori
, Shigeki Goto:
Increasing the Darkness of Darknet Traffic. GLOBECOM 2015: 1-7 - [c41]Akihiro Shimoda, Keisuke Ishibashi, Kazumichi Sato, Masayuki Tsujino, Takeru Inoue, Masaki Shimura, Takanori Takebe, Kazuki Takahashi, Tatsuya Mori
, Shigeki Goto:
Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics. GLOBECOM 2015: 1-6 - [c40]Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori
:
AutoBLG: Automatic URL blacklist generator using search space expansion and filters. ISCC 2015: 625-631 - [c39]Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:
Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps. SOUPS 2015: 241-255 - [c38]Tatsuya Mori
, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Keisuke Ishibashi, Shigeki Goto:
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs. TMA 2015: 126-139 - [c37]Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility. WOOT 2015 - 2014
- [c36]Mitsuhiro Hatada, Masato Terada, Tatsuya Mori
:
POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan. CCS 2014: 1433-1435 - [c35]Tatsuaki Kimura, Keisuke Ishibashi, Tatsuya Mori
, Hiroshi Sawada, Tsuyoshi Toyono, Ken Nishimatsu, Akio Watanabe, Akihiro Shimoda, Kohei Shiomoto
:
Spatio-temporal factorization of log data for understanding network events. INFOCOM 2014: 610-618 - 2013
- [j26]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara:
Autonomic load balancing of flow monitors. Comput. Networks 57(3): 741-761 (2013) - [j25]Ryoichi Kawahara, Tetsuya Takine, Tatsuya Mori
, Noriaki Kamiyama, Keisuke Ishibashi:
Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management. Comput. Networks 57(6): 1560-1576 (2013) - [j24]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Haruhisa Hasegawa:
Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-Distribution VoD. IEICE Trans. Commun. 96-B(1): 143-154 (2013) - [j23]Yasuhiro Ikeda, Ryoichi Kawahara, Noriaki Kamiyama, Tatsuaki Kimura, Tatsuya Mori
:
Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data. IEICE Trans. Commun. 96-B(2): 533-542 (2013) - [j22]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara, Haruhisa Hasegawa:
Optimally Designing ISP-Operated CDN. IEICE Trans. Commun. 96-B(3): 790-801 (2013) - [j21]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Haruhisa Hasegawa:
Multicast Pre-Distribution VoD System. IEICE Trans. Commun. 96-B(6): 1459-1471 (2013) - [j20]Kazuya Takahashi, Tatsuya Mori, Yusuke Hirota, Hideki Tode, Koso Murakami:
A Resilient Forest-Based Application Level Multicast for Real-Time Streaming. IEICE Trans. Commun. 96-B(7): 1874-1885 (2013) - [j19]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara, Shigeaki Harada:
Optimally Identifying Worm-Infected Hosts. IEICE Trans. Commun. 96-B(8): 2084-2094 (2013) - [j18]Daiki Chiba
, Kazuhiro Tobe, Tatsuya Mori
, Shigeki Goto:
Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. J. Inf. Process. 21(3): 539-550 (2013) - [j17]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara, Shigeaki Harada, Haruhisa Hasegawa:
Analyzing influence of network topology on designing ISP-operated CDN. Telecommun. Syst. 52(2): 969-977 (2013) - [c34]Naoya Maki, Takayuki Nishio, Ryoichi Shinkuma
, Tatsuro Takahashi, Tatsuya Mori
, Noriaki Kamiyama, Ryoichi Kawahara:
Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks. ICOIN 2013: 450-455 - [c33]Naoya Maki, Ryoichi Shinkuma, Tatsuya Mori, Noriaki Kamiyama, Ryoichi Kawahara:
A periodic combined-content distribution mechanism in peer-assisted content delivery networks. Kaleidoscope 2013: 1-8 - 2012
- [j16]Tatsuya Mori, Yoshikazu Maekawa, Yoko Akiyama, Fumihito Mishima, Koichi Sutani, Sunao Iwaki
, Shigehiro Nishijima:
Fundamental Study for Controlling Environment using Biological signal. Control. Intell. Syst. 40(3) (2012) - [j15]Keisuke Ishibashi, Ryoichi Kawahara, Tatsuya Mori
, Tsuyoshi Kondoh, Shoichiro Asano:
Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability. IEICE Trans. Commun. 95-B(2): 466-476 (2012) - [j14]Akihiro Shimoda, Tatsuya Mori
, Shigeki Goto:
Extended Darknet: Multi-Dimensional Internet Threat Monitoring System. IEICE Trans. Commun. 95-B(6): 1915-1923 (2012) - [j13]Ryoichi Kawahara, Tatsuya Mori
, Takeshi Yada, Noriaki Kamiyama:
Analyzing and Reducing the Impact of Traffic on Large-Scale NAT. IEICE Trans. Commun. 95-B(9): 2815-2827 (2012) - [j12]Naoya Maki, Takayuki Nishio, Ryoichi Shinkuma
, Tatsuya Mori
, Noriaki Kamiyama, Ryoichi Kawahara, Tatsuro Takahashi:
Traffic Engineering of Peer-Assisted Content Delivery Network with Content-Oriented Incentive Mechanism. IEICE Trans. Inf. Syst. 95-D(12): 2860-2869 (2012) - [j11]Tatsuya Mori, Makoto Nakashima, Tetsuro Ito:
SpACCE: a sophisticated ad hoc cloud computing environment built by server migration to facilitate distributed collaboration. Int. J. Space Based Situated Comput. 2(4): 230-239 (2012) - [c32]Tatsuya Mori, Makoto Nakashima, Tetsuro Ito:
A Sophisticated Ad Hoc Cloud Computing Environment Built by the Migration of a Server to Facilitate Distributed Collaboration. AINA Workshops 2012: 1196-1202 - [c31]Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara:
Autonomic load balancing for flow monitoring. ICC 2012: 2684-2688 - [c30]Daiki Chiba
, Kazuhiro Tobe, Tatsuya Mori
, Shigeki Goto:
Detecting Malicious Websites by Learning IP Address Features. SAINT 2012: 29-39 - 2011
- [j10]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Shigeaki Harada, Haruhisa Hasegawa:
Optimally designing caches to reduce P2P traffic. Comput. Commun. 34(7): 883-897 (2011) - [j9]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Shigeaki Harada, Haruhisa Hasegawa:
Parallel video streaming optimizing network throughput. Comput. Commun. 34(10): 1182-1194 (2011) - [j8]Ryoichi Kawahara, Keisuke Ishibashi, Tatsuya Mori
, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa, Shoichiro Asano:
Detection accuracy of network anomalies using sampled flow statistics. Int. J. Netw. Manag. 21(6): 513-535 (2011) - [c29]Ryoichi Kawahara, Noriaki Kamiyama, Tatsuya Mori
, Haruhisa Hasegawa:
Performance evaluation of peer-assisted content distribution. CCNC 2011: 725-729 - [c28]Tatsuya Mori
, Kazumichi Sato, Yousuke Takahashi, Keisuke Ishibashi:
How is e-mail sender authentication used and misused? CEAS 2011: 31-37 - [c27]Ryoichi Kawahara, Shigeaki Harada, Noriaki Kamiyama, Tatsuya Mori
, Haruhisa Hasegawa, Akihiro Nakao:
Traffic Engineering Using Overlay Network. ICC 2011: 1-6 - [c26]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Haruhisa Hasegawa:
Limiting pre-distribution and clustering users on multicast pre-distribution VoD. Integrated Network Management 2011: 706-709 - 2010
- [c25]Holly Esquivel, Aditya Akella, Tatsuya Mori
:
On the effectiveness of IP reputation for spam filtering. COMSNETS 2010: 1-10 - [c24]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Shigeaki Harada, Haruhisa Hasegawa:
Optimally Designing Capacity and Location of Caches to Reduce P2P Traffic. ICC 2010: 1-6 - [c23]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Shigeaki Harada, Haruhisa Hasegawa:
Impact of topology on parallel video streaming. NOMS 2010: 607-614 - [c22]Akihiro Shimoda, Tatsuya Mori
, Shigeki Goto:
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. SAINT 2010: 22-30 - [c21]Tatsuya Mori
, Ryoichi Kawahara, Haruhisa Hasegawa, Shinsuke Shimogawa:
Characterizing Traffic Flows Originating from Large-Scale Video Sharing Services. TMA 2010: 17-31
2000 – 2009
- 2009
- [j7]Tatsuya Mori, Yasuyuki Ueda, Nobuhiro Nonogaki, Toshihiro Terazawa, Milosz Sroka, Tetsuya Fujita, Takeshi Kodaka, Takayuki Mori, Kumiko Morita, Hideho Arakida, Takashi Miura, Yuji Okuda, Toshiki Kizu, Yoshiro Tsuboi:
A Power, Performance Scalable Eight-Cores Media Processor for Mobile Multimedia Applications. IEEE J. Solid State Circuits 44(11): 2957-2965 (2009) - [c20]Takeshi Kodaka, Shunsuke Sasaki, Takahiro Tokuyoshi, Ryuichiro Ohyama, Nobuhiro Nonogaki, Koji Kitayama, Tatsuya Mori, Yasuyuki Ueda, Hideho Arakida, Yuji Okuda, Toshiki Kizu, Yoshiro Tsuboi, Nobu Matsumoto:
Design and implementation of scalable, transparent threads for multi-core media processor. DATE 2009: 1035-1039 - [c19]