Folgen
Akira Yamada
Akira Yamada
Kobe University
Bestätigte E-Mail-Adresse bei acm.org - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Method, apparatus and program for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, A Naidu, A Yamada, A Kubota, Y Sawaya, ...
US Patent 8,925,079, 2014
2212014
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ...
US Patent 9,386,030, 2016
1372016
Self-confidence trumps knowledge: A cross-cultural study of security behavior
Y Sawaya, M Sharif, N Christin, A Kubota, A Nakarai, A Yamada
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
1272017
Method and apparatus for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, YH Cheng, A Yamada, Y Miyake
US Patent 8,281,397, 2012
1262012
Visual similarity-based phishing detection without victim site information
M Hara, A Yamada, Y Miyake
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 30-36, 2009
1082009
LAP: Lightweight anonymity and privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
2012 IEEE Symposium on Security and Privacy, 506-520, 2012
1072012
Predicting impending exposure to malicious content from user behavior
M Sharif, J Urakawa, N Christin, A Kubota, A Yamada
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
742018
Intrusion detection for encrypted web accesses
A Yamada, Y Miyake, K Takemori, A Studer, A Perrig
21st International Conference on Advanced Information Networking and …, 2007
652007
Passive OS fingerprinting by DNS traffic analysis
T Matsunaka, A Yamada, A Kubota
2013 IEEE 27th International Conference on Advanced Information Networking …, 2013
472013
System and method for real-time reporting of anomalous internet protocol attacks
Y Gottlieb, A Naidu, A Ghosh, A Yamada, Y Sawaya, A Kubota
US Patent 9,130,982, 2015
422015
Exploiting privacy policy conflicts in online social networks
A Yamada, THJ Kim, A Perrig
CMU-CyLab-12–005, 2012
362012
Relationgram: Tie-strength visualization for user-controlled online identity authentication
THJ Kim, A Yamada, V Gligor, J Hong, A Perrig
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
212013
Web tracking site detection based on temporal link analysis
A Yamada, H Masanori, Y Miyake
2010 IEEE 24th International Conference on Advanced Information Networking …, 2010
192010
Anomaly detection for DNS servers using frequent host selection
A Yamada, Y Miyake, M Terabe, K Hashimoto, N Kato
2009 International Conference on Advanced Information Networking and …, 2009
162009
Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data
A Yamada, Y Miyake, K Takemori, T Tanaka
International Conference on Information Technology: Coding and Computing …, 2005
152005
Phishing site detection using similarity of website structure
S Tanaka, T Matsunaka, A Yamada, A Kubota
2021 IEEE conference on dependable and secure computing (DSC), 1-8, 2021
142021
Hunting brand domain forgery: a scalable classification for homograph attack
TP Thao, Y Sawaya, HQ Nguyen-Son, A Yamada, K Omote, A Kubota
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
112019
On the use of BGP AS numbers to detect spoofing
R Vaidyanathan, A Ghosh, YH Cheng, A Yamada, Y Miyake
2010 IEEE Globecom Workshops, 1606-1610, 2010
92010
Designing a location trace anonymization contest
T Murakami, H Arai, K Hamada, T Hatano, M Iguchi, H Kikuchi, ...
arXiv preprint arXiv:2107.10407, 2021
82021
Classification of landing and distribution domains using whois’ text mining
TP Thao, A Yamada, K Murakami, J Urakawa, Y Sawaya, A Kubota
2017 IEEE Trustcom/BigDataSE/ICESS, 1-8, 2017
82017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20