• 675 Citations
  • 13 h-Index
20002019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Tatsuya Mori is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?

Mori, K., Watanabe, T., Zhou, Y., Akiyama Hasegawa, A., Akiyama, M. & Mori, T., 2019 Jun 1, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Institute of Electrical and Electronics Engineers Inc., p. 159-171 13 p. 8802462. (Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Tap 'n ghost: A compilation of novel attack techniques against smartphone touchscreens

    Maruyama, S., Wakabayashi, S. & Mori, T., 2019 May, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 620-637 18 p. 8835251. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1 Citation (Scopus)

    Understanding the responsiveness of mobile app developers to software library updates

    Yasumatsu, T., Watanabe, T., Kanei, F., Shioji, E., Akiyama, M. & Mori, T., 2019 Mar 13, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 13-24 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 1 Citation (Scopus)

    Automatically generating malware analysis reports using sandbox logs

    Sun, B., Fujino, A., Mori, T., Ban, T., Takahashi, T. & Inoue, D., 2018 Nov 1, In : IEICE Transactions on Information and Systems. E101D, 11, p. 2622-2632 11 p.

    Research output: Contribution to journalArticle

  • Detecting malware-infected devices using the HTTP header patterns

    Mizuno, S., Hatada, M., Mori, T. & Goto, S., 2018 May 1, In : IEICE Transactions on Information and Systems. E101D, 5, p. 1370-1379 10 p.

    Research output: Contribution to journalArticle

  • 1 Citation (Scopus)