Takeshi Yagi

Orcid: 0009-0006-6414-8815

According to our database1, Takeshi Yagi authored at least 61 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency.
IEEE Access, 2022

2021
Classification of diversified web crawler accesses inspired by biological adaptation.
Int. J. Bio Inspired Comput., 2021

2020
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel.
IEICE Trans. Inf. Syst., 2020

Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020

2019
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes.
J. Inf. Process., 2019

Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning.
IEICE Trans. Inf. Syst., 2019

Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities.
IEICE Trans. Inf. Syst., 2019

2018
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.
Int. J. Inf. Sec., 2018

DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences.
IEICE Trans. Inf. Syst., 2018

Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

DomainChroma: Building actionable threat intelligence from malicious domain names.
Comput. Secur., 2018

POSTER: Predicting Website Abuse Using Update Histories.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

A method for estimating process maliciousness with Seq2Seq model.
Proceedings of the 2018 International Conference on Information Networking, 2018

User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
IEICE Trans. Inf. Syst., 2017

A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules.
CoRR, 2017

Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots.
Comput. Secur., 2017

Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Understanding the security management of global third-party Android marketplaces.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017

Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Malware originated HTTP traffic detection utilizing cluster appearance ratio.
Proceedings of the 2017 International Conference on Information Networking, 2017

Malicious URL sequence detection using event de-noising convolutional neural network.
Proceedings of the IEEE International Conference on Communications, 2017

Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.
IEICE Trans. Inf. Syst., 2016

Automating URL Blacklist Generation with Similarity Search Approach.
IEICE Trans. Inf. Syst., 2016

BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure.
IEICE Trans. Commun., 2016

Website Forensic Investigation to Identify Evidence and Impact of Compromise.
Proceedings of the Security and Privacy in Communication Networks, 2016

Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

DomainProfiler: Discovering Domain Names Abused in Future.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Malware Detection with Deep Neural Network Using Process Behavior.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Evaluation on Malware Classification by Session Sequence of Common Protocols.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Client Honeypot Multiplication with High Performance and Precise Detection.
IEICE Trans. Inf. Syst., 2015

BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Ultra-compact 8-arrayed 8ç1 switch consists of ZrO2-SiO2-based high a PLC.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2015

Dynamic parametric dispersion compensation using FPGA pump controller and dispersion monitor.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2015

AutoBLG: Automatic URL blacklist generator using search space expansion and filters.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Crawler classification using ant-based clustering scheme.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites.
IEICE Trans. Commun., 2014

Development of Low Loss Ultra-High Δ ZrO<sub>2</sub>-SiO<sub>2</sub> PLC for Next Generation Compact and High-Density Integrated Devices.
IEICE Trans. Electron., 2014

Spot size converter with cross-vertical taper for low-loss coupling between ZrO2-SiO2 PLC and SMF.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014

Counter-dithering pump scheme for cascaded degenerate FWM based wavelength converter.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014

Ultra-small coherent mixer consists of 5.5%-Δ ZrO2-SiO2-based low loss PLC.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014

2013
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs.
IT Prof., 2013

Evaluations and Analysis of Malware Prevention Methods on Websites.
IEICE Trans. Commun., 2013

Active Credential Leakage for Observing Web-Based Attack Cycle.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2011
Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme.
IEICE Trans. Commun., 2011

Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Controlling malware HTTP communications in dynamic analysis system using search engine.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

2010
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution.
IEICE Trans. Commun., 2010

Investigation and analysis of malware on websites.
Proceedings of the 12th IEEE International Symposium on Web Systems Evolution, 2010

Life-cycle monitoring scheme of malware download sites for websites.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

Enhanced attack collection scheme on high-interaction web honeypots.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2009
Dynamic Topology Reconfiguration Method for Service Overlay Networks Using Users' Community Information.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

2008
NMF: Network Mining Framework Using Topological Structure of Complex Networks.
Proceedings of the 2008 IEEE World Congress on Services, 2008

Group-Oriented Communication: Concept and Network Architecture.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008


  Loading...