Efficient dynamic malware analysis based on network behavior using deep learning T Shibahara, T Yagi, M Akiyama, D Chiba, T Yada 2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016 | 111 | 2016 |
Design and implementation of high interaction client honeypot for drive-by-download attacks M Akiyama, M Iwamura, Y Kawakoya, K Aoki, M Itoh IEICE transactions on communications 93 (5), 1131-1139, 2010 | 99 | 2010 |
A proposal of metrics for botnet detection based on its cooperative behavior M Akiyama, T Kawamoto, M Shimamura, T Yokoyama, Y Kadobayashi, ... 2007 International Symposium on Applications and the Internet Workshops, 82-82, 2007 | 88 | 2007 |
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots M Akiyama, T Yagi, T Yada, T Mori, Y Kadobayashi Computers & Security 69, 155-173, 2017 | 64 | 2017 |
Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps T Watanabe, M Akiyama, T Sakai, T Mori Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 241-255, 2015 | 61 | 2015 |
Searching structural neighborhood of malicious urls to improve blacklisting M Akiyama, T Yagi, M Itoh 2011 IEEE/IPSJ International Symposium on Applications and the Internet, 1-10, 2011 | 61 | 2011 |
Domainprofiler: Discovering domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 58 | 2016 |
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ... 2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017 | 56 | 2017 |
Graph signal processing for directed graphs based on the hermitian laplacian S Furutani, T Shibahara, M Akiyama, K Hato, M Aida Machine Learning and Knowledge Discovery in Databases: European Conference …, 2020 | 52 | 2020 |
Malicious URL sequence detection using event de-noising convolutional neural network T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ... 2017 IEEE International Conference on Communications (ICC), 1-7, 2017 | 52 | 2017 |
マルウェア対策のための研究用データセット~ MWS Datasets 2015~ 神薗雅紀, 秋山満昭, 笠間貴弘, 村上純一, 畑田充弘, 寺田真敏 研究報告セキュリティ心理学とトラスト (SPT) 2015 (6), 1-8, 2015 | 44 | 2015 |
Automating URL blacklist generation with similarity search approach B Sun, M Akiyama, T Yagi, M Hatada, T Mori IEICE TRANSACTIONS on Information and Systems 99 (4), 873-882, 2016 | 43 | 2016 |
Empowering anti-malware research in Japan by sharing the MWS datasets M Hatada, M Akiyama, T Matsuki, T Kasama Journal of Information Processing 23 (5), 579-588, 2015 | 38 | 2015 |
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle M Akiyama, T Yagi, T Hariu, Y Kadobayashi International Journal of Information Security 17, 135-151, 2018 | 36 | 2018 |
マルウェア対策のための研究用データセット~ MWS Datasets 2014~ 秋山満昭, 神薗雅紀, 松木隆宏, 畑田充弘 研究報告コンピュータセキュリティ (CSEC) 2014 (19), 1-7, 2014 | 34 | 2014 |
DomainChroma: Building actionable threat intelligence from malicious domain names D Chiba, M Akiyama, T Yagi, K Hato, T Mori, S Goto Computers & Security 77, 138-161, 2018 | 33 | 2018 |
Analysis of malware download sites by focusing on time series variation of malware Y Tanaka, M Akiyama, A Goto Journal of computational science 22, 301-313, 2017 | 32 | 2017 |
Unauthorized access detecting system and unauthorized access detecting method M Akiyama, T Yagi US Patent 10,142,343, 2018 | 27* | 2018 |
Scalable and performance-efficient client honeypot on high interaction system M Akiyama, Y Kawakoya, T Hariu 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012 | 25 | 2012 |
マルウェア対策のための研究用データセット~ MWS 2011 Datasets~ 畑田充弘, 中津留勇, 秋山満昭 コンピュータセキュリティシンポジウム 2011 論文集 2011 (3), 1-5, 2011 | 25 | 2011 |