Folgen
Akira Yamada
Akira Yamada
KDDI Research, Inc.
Bestätigte E-Mail-Adresse bei acm.org - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Method, apparatus and program for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, A Naidu, A Yamada, A Kubota, Y Sawaya, ...
US Patent 8,925,079, 2014
2202014
Self-confidence trumps knowledge: A cross-cultural study of security behavior
Y Sawaya, M Sharif, N Christin, A Kubota, A Nakarai, A Yamada
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
1102017
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ...
US Patent 9,386,030, 2016
1102016
Method and apparatus for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, YH Cheng, A Yamada, Y Miyake
US Patent 8,281,397, 2012
1052012
Visual similarity-based phishing detection without victim site information
M Hara, A Yamada, Y Miyake
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 30-36, 2009
1002009
LAP: Lightweight anonymity and privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
2012 IEEE Symposium on Security and Privacy, 506-520, 2012
982012
Predicting impending exposure to malicious content from user behavior
M Sharif, J Urakawa, N Christin, A Kubota, A Yamada
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
572018
Intrusion detection for encrypted web accesses
A Yamada, Y Miyake, K Takemori, A Studer, A Perrig
21st International Conference on Advanced Information Networking and …, 2007
572007
Passive OS fingerprinting by DNS traffic analysis
T Matsunaka, A Yamada, A Kubota
2013 IEEE 27th International Conference on Advanced Information Networking …, 2013
442013
Exploiting privacy policy conflicts in online social networks
A Yamada, THJ Kim, A Perrig
CMU-CyLab-12–005, 2012
362012
Exploiting privacy policy conflicts in online social networks
A Yamada, THJ Kim, A Perrig
CMU-CyLab-12–005, 2012
362012
System and method for real-time reporting of anomalous internet protocol attacks
Y Gottlieb, A Naidu, A Ghosh, A Yamada, Y Sawaya, A Kubota
US Patent 9,130,982, 2015
332015
Relationgram: Tie-strength visualization for user-controlled online identity authentication
THJ Kim, A Yamada, V Gligor, J Hong, A Perrig
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
202013
Web tracking site detection based on temporal link analysis
A Yamada, H Masanori, Y Miyake
2010 IEEE 24th International Conference on Advanced Information Networking …, 2010
142010
Anomaly detection for DNS servers using frequent host selection
A Yamada, Y Miyake, M Terabe, K Hashimoto, N Kato
2009 International Conference on Advanced Information Networking and …, 2009
142009
Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data
A Yamada, Y Miyake, K Takemori, T Tanaka
International Conference on Information Technology: Coding and Computing …, 2005
142005
Hunting brand domain forgery: a scalable classification for homograph attack
TP Thao, Y Sawaya, HQ Nguyen-Son, A Yamada, K Omote, A Kubota
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
92019
Hunting brand domain forgery: a scalable classification for homograph attack
TP Thao, Y Sawaya, HQ Nguyen-Son, A Yamada, K Omote, A Kubota
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
92019
Web tracking site detection based on temporal link analysis and automatic blacklist generation
A Yamada, M Hara, Y Miyake
Journal of information processing 19, 62-73, 2011
82011
A comprehensive security analysis checksheet for OpenFlow networks
Y Hori, S Mizoguchi, R Miyazaki, A Yamada, Y Feng, A Kubota, K Sakurai
Advances on Broad-Band Wireless Computing, Communication and Applications …, 2017
72017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20