¹Ø×¢
Mitsuaki Akiyama
Mitsuaki Akiyama
NTT
ÔÚ ieee.org µÄµç×ÓÓʼþ¾­¹ýÑéÖ¤
±êÌâ
ÒýÓôÎÊý
ÒýÓôÎÊý
Äê·Ý
Efficient dynamic malware analysis based on network behavior using deep learning
T Shibahara, T Yagi, M Akiyama, D Chiba, T Yada
2016 IEEE Global Communications Conference (GLOBECOM), 1-7, 2016
1102016
Design and implementation of high interaction client honeypot for drive-by-download attacks
M Akiyama, M Iwamura, Y Kawakoya, K Aoki, M Itoh
IEICE transactions on communications 93 (5), 1131-1139, 2010
982010
A proposal of metrics for botnet detection based on its cooperative behavior
M Akiyama, T Kawamoto, M Shimamura, T Yokoyama, Y Kadobayashi, ...
2007 International Symposium on Applications and the Internet Workshops, 82-82, 2007
882007
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots
M Akiyama, T Yagi, T Yada, T Mori, Y Kadobayashi
Computers & Security 69, 155-173, 2017
632017
Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps
T Watanabe, M Akiyama, T Sakai, T Mori
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 241-255, 2015
612015
Searching structural neighborhood of malicious urls to improve blacklisting
M Akiyama, T Yagi, M Itoh
2011 IEEE/IPSJ International Symposium on Applications and the Internet, 1-10, 2011
602011
Domainprofiler: Discovering domain names abused in future
D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems ¡­, 2016
582016
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories ¡­, 2017
562017
Malicious URL sequence detection using event de-noising convolutional neural network
T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ...
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
512017
Graph signal processing for directed graphs based on the hermitian laplacian
S Furutani, T Shibahara, M Akiyama, K Hato, M Aida
Machine Learning and Knowledge Discovery in Databases: European Conference ¡­, 2020
492020
¥Þ¥ë¥¦¥§¥¢対²ß¤Î¤¿¤á¤ÎÑо¿ÓÃ¥Çþí¥¿¥»¥Ã¥È~ MWS Datasets 2015~
Éñ薗ÑÅ紀£¬ Çïɽ満ÕÑ£¬ óÒ間貴ºë£¬ ´åÉÏ純Ò»£¬ 畑Ìï³äºë£¬ ËÂÌïÕæÃô
Ñо¿報¸æ¥»¥­¥å¥ê¥Æ¥£ÐÄÀíѧ¤È¥È¥é¥¹¥È (SPT) 2015 (6), 1-8, 2015
442015
Automating URL blacklist generation with similarity search approach
B Sun, M Akiyama, T Yagi, M Hatada, T Mori
IEICE TRANSACTIONS on Information and Systems 99 (4), 873-882, 2016
402016
Empowering anti-malware research in Japan by sharing the MWS datasets
M Hatada, M Akiyama, T Matsuki, T Kasama
Journal of Information Processing 23 (5), 579-588, 2015
382015
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
M Akiyama, T Yagi, T Hariu, Y Kadobayashi
International Journal of Information Security 17, 135-151, 2018
362018
¥Þ¥ë¥¦¥§¥¢対²ß¤Î¤¿¤á¤ÎÑо¿ÓÃ¥Çþí¥¿¥»¥Ã¥È~ MWS Datasets 2014~
Çïɽ満ÕÑ£¬ Éñ薗ÑÅ紀£¬ ËÉľ¡ºê£¬ 畑Ìï³äºë
Ñо¿報¸æ¥³¥ó¥Ô¥åþí¥¿¥»¥­¥å¥ê¥Æ¥£ (CSEC) 2014 (19), 1-7, 2014
342014
DomainChroma: Building actionable threat intelligence from malicious domain names
D Chiba, M Akiyama, T Yagi, K Hato, T Mori, S Goto
Computers & Security 77, 138-161, 2018
322018
Analysis of malware download sites by focusing on time series variation of malware
Y Tanaka, M Akiyama, A Goto
Journal of computational science 22, 301-313, 2017
312017
Unauthorized access detecting system and unauthorized access detecting method
M Akiyama, T Yagi
US Patent 10,142,343, 2018
27*2018
Scalable and performance-efficient client honeypot on high interaction system
M Akiyama, Y Kawakoya, T Hariu
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet ¡­, 2012
252012
¥Þ¥ë¥¦¥§¥¢対²ß¤Î¤¿¤á¤ÎÑо¿ÓÃ¥Çþí¥¿¥»¥Ã¥È~ MWS 2011 Datasets~
畑Ìï³äºë£¬ ÖнòÁôÓ£¬ Çïɽ満ÕÑ
¥³¥ó¥Ô¥åþí¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2011 論Îļ¯ 2011 (3), 1-5, 2011
252011
ϵͳĿǰÎÞ·¨Ö´Ðд˲Ù×÷£¬ÇëÉÔºóÔÙÊÔ¡£
ÎÄÕÂ 1–20