Daisuke Miyamoto

Orcid: 0000-0003-0967-9040

According to our database1, Daisuke Miyamoto authored at least 56 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Statistical Modeling of Financial Data with Skew-Symmetric Error Distributions.
Symmetry, September, 2023

Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware.
J. Comput. Virol. Hacking Tech., June, 2023

Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network.
J. Inf. Process., 2023

2022
mdx: A Cloud Platform for Supporting Data Science and Cross-Disciplinary Research Collaborations.
CoRR, 2022


2021
Classifying DNS Servers based on Response Message Matrix using Machine Learning.
CoRR, 2021

New LDoS Attack in Zigbee Network and its Possible Countermeasures.
Proceedings of the IEEE International Conference on Smart Computing, 2021

LDoS Attacker Detection Algorithms in Zigbee Network.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

2020
Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Slow Scan Attack Detection Based on Communication Behavior.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

2019
ViBrism DB: an interactive search and viewer platform for 2D/3D anatomical images of gene expression and co-expression networks.
Nucleic Acids Res., 2019

A normative decision-making model for cyber security.
Inf. Comput. Secur., 2019

An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents.
IEEE Access, 2019

Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Distributed Hayabusa: Scalable Syslog Search Engine Optimized for Time-Dimensional Search.
Proceedings of the AINTEC '19, 2019

2018
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment.
Secur. Commun. Networks, 2018

The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Malicious Host Detection by Imaging SYN Packets and A Neural Network.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Task and Instance Quadratic Ordering for Active Online Multitask Learning.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Classification of URL bitstreams using bag of bytes.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

A comparative study of smartphone-user security perception and preference towards redesigned security notifications.
Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, 2018

2017
Management Incident Lightweight Exchange (MILE) Implementation Report.
RFC, May, 2017

Hayabusa: Simple and Fast Full-Text Search Engine for Massive System Log Data.
Proceedings of the 12th International Conference on Future Internet Technologies, 2017

2016
Toward automated vulnerability monitoring using open information and standardized tools.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Offloading smartphone firewalling using OpenFlow-capable wireless access points.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Structured cybersecurity information exchange for streamlining incident response operations.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
RTOB: A TDMA-based MAC protocol to achieve high reliability of one-hop broadcast in VANET.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Text-Mining Approach for Estimating Vulnerability Score.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

INTERCEPT+: SDN Support for Live Migration-Based Honeypots.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
PACKTER: implementation of internet traffic visualizer and extension for network forensics.
Computing, 2014

INTERCEPT: high-interaction server-type honeypot based on live migration.
Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, 2014

NECOMAtter: curating approach for sharing cyber threat information.
Proceedings of the International Conference of Future Internet 2014, 2014

EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
PhishCage: reproduction of fraudulent websites in the emulated internet.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

COSMO - emulation of internet traffic: poster abstract.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

Toward Automated Reduction of Human Errors Based on Cognitive Analysis.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Reputation Scoring System Using an Economic Trust Model: A Distributed Approach to Evaluate Trusted Third Parties on the Internet.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Development of a Scheme and Tools to Construct a Standard Moth Brain for Neural Network Simulations.
Comput. Intell. Neurosci., 2012

Neural Circuit Simulation of Hodgkin-Huxley Type Neurons Toward Peta Scale Computers.
Proceedings of the 2012 SC Companion: High Performance Computing, 2012

DNS-Based Defense against IP Spoofing Attacks.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2010
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites.
J. Intell. Learn. Syst. Appl., 2010

2009
Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set.
IEICE Trans. Inf. Syst., 2009

Acoustic compensation methods for body transmitted speech conversion.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures.
Proceedings of the Workshop on Cyber Security and Test, 2008

Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Local Government ICT Platform Standardization Activities of ICT Systems and Services for Offering High Value-added Service by Interacting Local Governments, Regional Institutions and Private Sector.
Proceedings of the Towards Sustainable Society on Ubiquitous Networks, 2008

Service Interaction Platform Technologies Providing High Value-added ICT Services.
Proceedings of the Towards Sustainable Society on Ubiquitous Networks, 2008

Monitoring Cross-Site Processes Executed across Heterogeneous WS-BPEL Processors.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

An Independent Evaluation of Web Timing Attack and its Countermeasure.
Proceedings of the The Third International Conference on Availability, 2008

2006
An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Visual Feedback Tracking of Crane Hook.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

2005
SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks.
Proceedings of the Technologies for Advanced Heterogeneous Networks, 2005


  Loading...