Ayumu Kubota

According to our database1, Ayumu Kubota authored at least 50 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Self-adaptive Traffic Anomaly Detection System for IoT Smart Home Environments.
CoRR, 2024

Extension of Resource Authorization Method with SSI in Edge Computing.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Dynamic Inference From IoT Traffic Flows Under Concept Drifts in Residential ISP Networks.
IEEE Internet Things J., September, 2023

Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data.
Enterp. Inf. Syst., September, 2023

Quantifying and Managing Impacts of Concept Drifts on IoT Traffic Inference in Residential ISP Networks.
CoRR, 2023

Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load.
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023

A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow Data.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Application of Generalized Deduplication Techniques in Edge Computing Environments.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
On recruiting and retaining users for security-sensitive longitudinal measurement panels.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Anomaly Traffic Detection with Federated Learning toward Network-based Malware Detection in IoT.
Proceedings of the IEEE Global Communications Conference, 2022

Identification of an IoT Device Model in the Home Domain Using IPFIX Records.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Resource Authorization Methods for Edge Computing.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data.
IEEE Trans. Big Data, 2021

Designing Personalized OS Update Message based on Security Behavior Stage Model.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Phishing Site Detection Using Similarity of Website Structure.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

SeBeST: Security Behavior Stage Model and Its Application to OS Update.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Human Factors in Homograph Attack Recognition.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition.
CoRR, 2019

Detecting Malicious Websites by Query Templates.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2018
Runtime Attestation for IAAS Clouds.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018

Predicting Impending Exposure to Malicious Content from User Behavior.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Classification of Landing and Distribution Domains Using Whois' Text Mining.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Robust ORAM: Enhancing Availability, Confidentiality and Integrity.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Anonymous and analysable web browsing.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System.
Proceedings of the CLOSER 2017, 2017

Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
In-Vehicle Network Security Using Secure Element.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

SIBRA: Scalable Internet Bandwidth Reservation Architecture.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

A Comprehensive Security Analysis Checksheet for OpenFlow Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

On the implementation of path-based dynamic pricing in edge-directed routing.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

2015
A study on identifying battery-draining Android applications in screen-off state.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

2014
Ephemeral UUID for Protecting User Privacy in Mobile Advertisements.
Proceedings of the Database and Expert Systems Applications, 2014

An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

On the Feasibility of Deploying Software Attestation in Cloud Environments.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
SanAdBox: Sandboxing third party advertising libraries in a mobile application.
Proceedings of IEEE International Conference on Communications, 2013

Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

Passive OS Fingerprinting by DNS Traffic Analysis.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Understanding the time-series behavioral characteristics of evolutionally advanced email spammers.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Kernel-based Behavior Analysis for Android Malware Detection.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation.
IEICE Trans. Inf. Syst., 2009

Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking.
Proceedings of IEEE International Conference on Communications, 2009

2008
Service Independent Access Control Architecture for User Generated Content (UGC).
Proceedings of the 2008 International Conference on Security & Management, 2008

2006
Secure Host Name Resolution Infrastructure for Overlay Networks.
IEICE Trans. Commun., 2006

OCALA: An Architecture for Supporting Legacy Applications over Overlays.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2003
Open 6to4 Relay Router Operation.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003


  Loading...