An evaluation of machine learning-based methods for detection of phishing sites D Miyamoto, H Hazeyama, Y Kadobayashi Advances in Neuro-Information Processing: 15th International Conference …, 2009 | 168 | 2009 |
Text-mining approach for estimating vulnerability score Y Yamamoto, D Miyamoto, M Nakayama 2015 4th International Workshop on Building Analysis Datasets and Gathering …, 2015 | 46 | 2015 |
SPS: a simple filtering algorithm to thwart phishing attacks D Miyamoto, H Hazeyama, Y Kadobayashi Technologies for Advanced Heterogeneous Networks: First Asian Internet …, 2005 | 38 | 2005 |
EyeBit: eye-tracking approach for enforcing phishing prevention habits D Miyamoto, T Iimura, G Blanc, H Tazaki, Y Kadobayashi 2014 Third International Workshop on Building Analysis Datasets and …, 2014 | 33 | 2014 |
An autonomous architecture for inter-domain traceback across the borders of network operation H Hazeyama, Y Kadobayashi, D Miyamoto, M Oe 11th IEEE Symposium on Computers and Communications (ISCC'06), 378-385, 2006 | 33 | 2006 |
An empirical approach to phishing countermeasures through smart glasses and validation agents JD Ndibwile, ET Luhanga, D Fall, D Miyamoto, G Blanc, Y Kadobayashi IEEE Access 7, 130758-130771, 2019 | 27 | 2019 |
mdx: A cloud platform for supporting data science and cross-disciplinary research collaborations T Suzumura, A Sugiki, H Takizawa, A Imakura, H Nakamura, K Taura, ... 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2022 | 25 | 2022 |
Eye can tell: On the correlation between eye movement and phishing identification D Miyamoto, G Blanc, Y Kadobayashi Neural Information Processing: 22nd International Conference, ICONIP 2015 …, 2015 | 24 | 2015 |
Classification of URL bitstreams using bag of bytes K Shima, D Miyamoto, H Abe, T Ishihara, K Okada, Y Sekiya, H Asai, ... 2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018 | 22 | 2018 |
A proposal of the AdaBoost-based detection of phishing sites D Miyamoto, H Hazeyama, Y Kadobayashi Proceedings of the joint workshop on information security, 2007 | 22 | 2007 |
Characterizing obfuscated JavaScript using abstract syntax trees: Experimenting with malicious scripts G Blanc, D Miyamoto, M Akiyama, Y Kadobayashi 2012 26th International Conference on Advanced Information Networking and …, 2012 | 18 | 2012 |
Visualization and statistical modeling of financial big data: Double-log modeling with skew-symmetric error distributions M Jimichi, D Miyamoto, C Saka, S Nagata Japanese Journal of Statistics and Data Science 1, 347-371, 2018 | 16 | 2018 |
Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures. H Hazeyama, M Suzuki, S Miwa, D Miyamoto, Y Kadobayashi CSET, 2008 | 16 | 2008 |
RTOB: A TDMA-based MAC protocol to achieve high reliability of one-hop broadcast in VANET F Han, D Miyamoto, Y Wakahara 2015 IEEE International Conference on Pervasive Computing and Communication …, 2015 | 15 | 2015 |
Attributes affecting user decision to adopt a Virtual Private Network (VPN) app N Sombatruang, T Omiya, D Miyamoto, MA Sasse, Y Kadobayashi, ... Information and Communications Security: 22nd International Conference …, 2020 | 14 | 2020 |
An independent evaluation of web timing attack and its countermeasure Y Nagami, D Miyamoto, H Hazeyama, Y Kadobayashi 2008 Third International Conference on Availability, Reliability and …, 2008 | 14 | 2008 |
New ldos attack in zigbee network and its possible countermeasures S Okada, D Miyamoto, Y Sekiya, H Nakamura 2021 IEEE International Conference on Smart Computing (SMARTCOMP), 246-251, 2021 | 13 | 2021 |
AJNA: anti-phishing JS-based visual analysis, to mitigate users' excessive trust in SSL/TLS P Mensah, G Blanc, K Okada, D Miyamoto, Y Kadobayashi 2015 4th International Workshop on Building Analysis Datasets and Gathering …, 2015 | 12 | 2015 |
Taxonomical approach to the deployment of traceback mechanisms T Takahashi, H Hazeyama, D Miyamoto, Y Kadobayashi 2011 Baltic Congress on Future Internet and Communications, 13-20, 2011 | 12 | 2011 |
A normative decision-making model for cyber security A M’manga, S Faily, J McAlaney, C Williams, Y Kadobayashi, D Miyamoto Information & Computer Security 27 (5), 636-646, 2019 | 11 | 2019 |