Tatsuya Mori

According to our database1, Tatsuya Mori authored at least 120 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Discovering Malicious URLs Using Machine Learning Techniques.
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020

Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel.
IEICE Trans. Inf. Syst., 2020

Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020

CLAP: Classification of Android PUAs by Similarity of DNS Queries.
IEICE Trans. Inf. Syst., 2020

Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps.
J. Inf. Process., 2019

Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Learning Robust Options by Conditional Value at Risk Optimization.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

ShamFinder: An Automated Framework for Detecting IDN Homographs.
Proceedings of the Internet Measurement Conference, 2019

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Understanding the Responsiveness of Mobile App Developers to Software Library Updates.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Poster: A First Look at the Privacy Risks of Voice Assistant Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

EIGER: automated IOC generation for accurate and interpretable endpoint malware detection.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store.
J. Inf. Process., 2018

DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018

Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps.
IEICE Trans. Inf. Syst., 2018

Automatically Generating Malware Analysis Reports Using Sandbox Logs.
IEICE Trans. Inf. Syst., 2018

Detecting Malware-Infected Devices Using the HTTP Header Patterns.
IEICE Trans. Inf. Syst., 2018

DomainChroma: Building actionable threat intelligence from malicious domain names.
Comput. Secur., 2018

A Feasibility Study of Radio-frequency Retroreflector Attack.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews.
Proceedings of the Computer Security, 2018

Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Tracking the Human Mobility Using Mobile Device Sensors.
IEICE Trans. Inf. Syst., 2017

Network Event Extraction from Log Data with Nonnegative Tensor Factorization.
IEICE Trans. Commun., 2017

APPraiser: A Large Scale Analysis of Android Clone Apps.
IEICE Trans. Inf. Syst., 2017

Finding New Varieties of Malware with the Classification of Network Behavior.
IEICE Trans. Inf. Syst., 2017

Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.
IEICE Trans. Inf. Syst., 2017

A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules.
CoRR, 2017

Trojan of Things: Embedding Malicious NFC Tags into Common Objects.
CoRR, 2017

Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots.
Comput. Secur., 2017

Understanding the security management of global third-party Android marketplaces.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017

Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

BotDetector: A robust and scalable approach toward detecting malware-infected devices.
Proceedings of the IEEE International Conference on Communications, 2017

Eating moment recognition using heart rate responses.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

Detecting and Classifying Android PUAs by Similarity of DNS queries.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

POSTER: Is Active Electromagnetic Side-channel Attack Practical?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

POSTER: TOUCHFLOOD: A Novel Class of Attacks against Capacitive Touchscreens.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Characterizing Promotional Attacks in Mobile App Store.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Automating URL Blacklist Generation with Similarity Search Approach.
IEICE Trans. Inf. Syst., 2016

Statistical estimation of the names of HTTPS servers with domain name graphs.
Comput. Commun., 2016

Spoofing detection for embedded face recognition system using a low cost stereo camera.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

DomainProfiler: Discovering Domain Names Abused in Future.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Clone or Relative?: Understanding the Origins of Similar Android Apps.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Continuous Real-Time Measurement Method for Heart Rate Monitoring Using Face Images.
Proceedings of the Biomedical Engineering Systems and Technologies, 2016

Continuous Real-time Heart Rate Monitoring from Face Images.
Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2016), 2016

2015
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

AutoBLG: Automatic URL blacklist generator using search space expansion and filters.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Increasing the Darkness of Darknet Traffic.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Discovering similar malware samples using API call topics.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
Spatio-temporal factorization of log data for understanding network events.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Analyzing influence of network topology on designing ISP-operated CDN.
Telecommun. Syst., 2013

Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites.
J. Inf. Process., 2013

A Resilient Forest-Based Application Level Multicast for Real-Time Streaming.
IEICE Trans. Commun., 2013

Optimally Identifying Worm-Infected Hosts.
IEICE Trans. Commun., 2013

Optimally Designing ISP-Operated CDN.
IEICE Trans. Commun., 2013

Multicast Pre-Distribution VoD System.
IEICE Trans. Commun., 2013

Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-Distribution VoD.
IEICE Trans. Commun., 2013

Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data.
IEICE Trans. Commun., 2013

Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management.
Comput. Networks, 2013

Autonomic load balancing of flow monitors.
Comput. Networks, 2013

A periodic combined-content distribution mechanism in peer-assisted content delivery networks.
Proceedings of the 2013 ITU Kaleidoscope: Building Sustainable Communities, 2013

Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks.
Proceedings of the International Conference on Information Networking 2013, 2013

2012
SpACCE: a sophisticated ad hoc cloud computing environment built by server migration to facilitate distributed collaboration.
Int. J. Space Based Situated Comput., 2012

Extended Darknet: Multi-Dimensional Internet Threat Monitoring System.
IEICE Trans. Commun., 2012

Traffic Engineering of Peer-Assisted Content Delivery Network with Content-Oriented Incentive Mechanism.
IEICE Trans. Inf. Syst., 2012

Analyzing and Reducing the Impact of Traffic on Large-Scale NAT.
IEICE Trans. Commun., 2012

Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability.
IEICE Trans. Commun., 2012

Fundamental Study for Controlling Environment using Biological signal.
Control. Intell. Syst., 2012

Detecting Malicious Websites by Learning IP Address Features.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Autonomic load balancing for flow monitoring.
Proceedings of IEEE International Conference on Communications, 2012

A Sophisticated Ad Hoc Cloud Computing Environment Built by the Migration of a Server to Facilitate Distributed Collaboration.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Detection accuracy of network anomalies using sampled flow statistics.
Int. J. Netw. Manag., 2011

Parallel video streaming optimizing network throughput.
Comput. Commun., 2011

Optimally designing caches to reduce P2P traffic.
Comput. Commun., 2011

Limiting pre-distribution and clustering users on multicast pre-distribution VoD.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Traffic Engineering Using Overlay Network.
Proceedings of IEEE International Conference on Communications, 2011

How is e-mail sender authentication used and misused?
Proceedings of the 8th Annual Collaboration, 2011

Performance evaluation of peer-assisted content distribution.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Characterizing Traffic Flows Originating from Large-Scale Video Sharing Services.
Proceedings of the Traffic Monitoring and Analysis, Second International Workshop, 2010

Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Impact of topology on parallel video streaming.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Optimally Designing Capacity and Location of Caches to Reduce P2P Traffic.
Proceedings of IEEE International Conference on Communications, 2010

On the effectiveness of IP reputation for spam filtering.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

2009
A Power, Performance Scalable Eight-Cores Media Processor for Mobile Multimedia Applications.
IEEE J. Solid State Circuits, 2009

Exploitation of the wikipedia category system for enhancing the value of LCSH.
Proceedings of the 2009 Joint International Conference on Digital Libraries, 2009

Adaptive Bandwidth Control to Handle Long-Duration Large Flows.
Proceedings of IEEE International Conference on Communications, 2009

Improving Deployability of Peer-Assisted CDN Platform with Incentive.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Design and implementation of scalable, transparent threads for multi-core media processor.
Proceedings of the Design, Automation and Test in Europe, 2009

2008
Packet Sampling TCP Flow Rate Estimation and Performance Degradation Detection Method.
IEICE Trans. Commun., 2008

Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection.
IEICE Trans. Commun., 2008

Extracting Worm-Infected Hosts Using White List.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Optimum Identification of Worm-Infected Hosts.
Proceedings of the IP Operations and Management, 8th IEEE International Workshop, 2008

Integrated Method for Loss-Resilient Multicast Source Authentication and Data Reconstruction.
Proceedings of IEEE International Conference on Communications, 2008

A Method of Detecting Network Anomalies in Cyclic Traffic.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Identifying Heavy-Hitter Flows from Sampled Flow Statistics.
IEICE Trans. Commun., 2007

Inferring Original Traffic Pattern from Sampled Flow Statistics.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

A Study on Detecting Network Anomalies Using Sampled Flow Statistics.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

2-D Bitmap for Summarizing Inter-Host Communication Patterns.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Simple and Adaptive Identification of Superspreaders by Flow Sampling.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Efficient Timeout Checking Mechanism for Traffic Control.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Detection Accuracy of Network Anomalies Using Sampled Flow Statistics.
Proceedings of the Global Communications Conference, 2007

2006
Simple and Accurate Identification of High-Rate Flows by Packet Sampling.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Estimating Top N Hosts in Cardinality Using Small Memory Resources.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

QoS control to handle long-duration large flows and its performance evaluation.
Proceedings of IEEE International Conference on Communications, 2006

Estimating Flow Rate from Sampled Packet Streams for Detection of Performance Degradation at TCP Flow Level.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Flow analysis of internet traffic: World Wide Web versus peer-to-peer.
Systems and Computers in Japan, 2005

Method of Bandwidth Dimensioning and Management for Aggregated TCP Flows with Heterogeneous Access Links.
IEICE Trans. Commun., 2005

2004
On the Characteristics of Internet Traffic Variability: Spikes and Elephants.
IEICE Trans. Inf. Syst., 2004

Identifying elephant flows through periodically sampled packets.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2002
Analysis of Non-Gaussian Nature of Network Traffic and its Implication on Network Performance
CoRR, 2002

Analysis of Non-Gaussian Nature of Network Traffic
CoRR, 2002


  Loading...