DomainScouter: Understanding the Risks of Deceptive IDNs D Chiba, AA Hasegawa, T Koide, Y Sawabe, S Goto, M Akiyama 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 24 | 2019 |
Comparative analysis of three language spheres: Are linguistic and cultural differences reflected in password selection habits? K Mori, T Watanabe, Y Zhou, AA Hasegawa, M Akiyama, T Mori IEICE TRANSACTIONS on Information and Systems 103 (7), 1541-1555, 2020 | 20 | 2020 |
Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails AA Hasegawa, N Yamashita, M Akiyama, T Mori The Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 319-338, 2021 | 18 | 2021 |
Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods T Matsuura, AA Hasegawa, M Akiyama, T Mori The 2021 European Symposium on Usable Security (EuroUSEC2021), 2021 | 9 | 2021 |
Random matrices by MA models and compound free poisson laws A Hasegawa, N Sakuma, H Yoshida Probab. Math. Statist 33 (2), 243-254, 2013 | 9 | 2013 |
Understanding Non-Experts’ Security-and Privacy-Related Questions on a Q&A Site AA Hasegawa, N Yamashita, T Mori, D Inoue, M Akiyama The Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 39-56, 2022 | 8 | 2022 |
I know what you did last login: inconsistent messages tell existence of a target's account to insiders AA Hasegawa, T Watanabe, E Shioji, M Akiyama Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 8 | 2019 |
Domainscouter: Analyzing the risks of deceptive internationalized domain names D Chiba, AA Hasegawa, T Koide, Y Sawabe, S Goto, M Akiyama IEICE TRANSACTIONS on Information and Systems 103 (7), 1493-1511, 2020 | 5 | 2020 |
Fluctuations of Marchenko–Pastur limit of random matrices with dependent entries A Hasegawa, N Sakuma, H Yoshida Statistics & Probability Letters 127, 85-96, 2017 | 4 | 2017 |
A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects F Kanei, AA Hasegawa, E Shioji, M Akiyama Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 3 | 2021 |
日本国内における児童向けセキュリティ教材の実態調査 坪根恵, 長谷川彩子, 秋山満昭, 森達哉 研究報告セキュリティ心理学とトラスト (SPT) 2021 (43), 1-8, 2021 | 3 | 2021 |
How WEIRD is Usable Privacy and Security Research? AA Hasegawa, D Inoue, M Akiyama The 33rd USENIX Security Symposium (SEC'24), 2024 | 2 | 2024 |
How WEIRD is Usable Privacy and Security Research?(Extended Version) AA Hasegawa, D Inoue, M Akiyama arXiv preprint arXiv:2305.05004, 2023 | 2 | 2023 |
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services AA Hasegawa, T Watanabe, E Shioji, M Akiyama, T Mori Journal of information processing 28, 1030-1046, 2020 | 2 | 2020 |
How WEIRD is Usable Privacy and Security Research? (Extended version of the USENIX SECURITY 2024 paper) AA Hasegawa, D Inoue, M Akiyama arXiv preprint arXiv:2305.05004, 2023 | 1* | 2023 |
Experiences, behavioral tendencies, and concerns of non-native English speakers in identifying phishing emails AA Hasegawa, N Yamashita, M Akiyama, T Mori Journal of information processing 30, 841-858, 2022 | 1 | 2022 |
セキュアなソフトウェア開発の阻害要因分析 金井文宏, 長谷川彩子, 塩治榮太朗, 秋山満昭 コンピュータセキュリティシンポジウム 2020 論文集, 681-688, 2020 | 1 | 2020 |
ユーザを欺く国際化ドメイン名の解析法 千葉大紀, 長谷川彩子, 小出駿, 澤部祐太, 後藤滋樹, 秋山満昭 研究報告セキュリティ心理学とトラスト (SPT) 2019 (11), 1-6, 2019 | 1 | 2019 |
オンラインオークションにおけるプライバシーリスクとユーザ認識の調査 長谷川彩子, 秋山満昭, 八木毅, 森達哉 コンピュータセキュリティシンポジウム 2017 論文集 2017 (2), 2017 | 1 | 2017 |
Japanese Users’(Mis) understandings of Technical Terms Used in Privacy Policies and the Privacy Protection Law S Kanamori, M Ikeda, K Kameishi, AA Hasegawa International Conference on Human-Computer Interaction, 245-264, 2024 | | 2024 |