• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20002021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • Discovering similar malware samples using API call topics

    Fujino, A., Murakami, J. & Mori, T., 2015 Jul 14, 2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015. Institute of Electrical and Electronics Engineers Inc., p. 140-147 8 p. 7157960. (2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints

    Sakurai, Y., Watanabe, T., Okuda, T., Akiyama, M. & Mori, T., 2020 Sep, Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. Institute of Electrical and Electronics Engineers Inc., p. 522-531 10 p. 9229674. (Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Detection accuracy of network anomalies using sampled flow statistics

    Kawahara, R., Ishibashi, K., Mori, T., Kamiyama, N., Harada, S. & Asano, S., 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 1959-1964 6 p. 4411286. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Detecting malicious websites by learning IP address features

    Chiba, D., Tobe, K., Mori, T. & Goto, S., 2012, Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 29-39 11 p. 6305258. (Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • Detecting and Classifying Android PUAs by Similarity of DNS queries

    Hatada, M. & Mori, T., 2017 Sep 7, Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference Workshops, COMPSAC 2017. Demartini, C., Yang, J-J., Ahamed, S. I., Conte, T., Akiyama, T., Reisman, S., Takakura, H., Hasan, K., Claycomb, W., Nakamura, M., Tovar, E., Zhang, Z., Liu, L., Lung, C-H. & Cimato, S. (eds.). IEEE Computer Society, p. 590-595 6 p. 8029995. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Design of an MPEG-4 general audio coder for improving speech quality

    Moriya, T., Jin, A., Iwakami, N. & Mori, T., 2000, 2000 IEEE Workshop on Speech Coding - Proceedings: Meeting the Challenges of the New Millennium. Institute of Electrical and Electronics Engineers Inc., p. 139-141 3 p. 878429. (2000 IEEE Workshop on Speech Coding - Proceedings: Meeting the Challenges of the New Millennium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?

    Mori, K., Watanabe, T., Zhou, Y., Akiyama Hasegawa, A., Akiyama, M. & Mori, T., 2019 Jun, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Institute of Electrical and Electronics Engineers Inc., p. 159-171 13 p. 8802462. (Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Clone or relative? Understanding the origins of similar Android apps

    Ishii, Y., Watanabe, T., Akiyama, M. & Mori, T., 2016 Mar 11, IWSPA 2016 - Proceedings of the 2016 ACM International Workshop on Security and Privacy Analytics, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 25-32 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Characterizing traffic flows originating from large-scale video sharing services

    Mori, T., Kawahara, R., Hasegawa, H. & Shimogawa, S., 2010 May 14, Traffic Monitoring and Analysis - Second International Workshop, TMA 2010, Proceedings. p. 17-31 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6003 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Characterizing promotional attacks in mobile app store

    Sun, B., Luo, X., Akiyama, M., Watanabe, T. & Mori, T., 2017, Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Proceedings. Kim, D. S., Li, G., Zhang, X. & Batten, L. (eds.). Springer Verlag, p. 113-127 15 p. (Communications in Computer and Information Science; vol. 719).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Careless participants are essential for our phishing study: Understanding the impact of screening methods

    Matsuura, T., Hasegawa, A. A., Akiyama, M. & Mori, T., 2021 Oct 11, Proceedings - EuroUSEC 2021: 2021 European Symposium on Usable Security. Association for Computing Machinery, p. 36-47 12 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • BotDetector: A robust and scalable approach toward detecting malware-infected devices

    Mizuno, S., Hatada, M., Mori, T. & Goto, S., 2017 Jul 28, 2017 IEEE International Conference on Communications, ICC 2017. Debbah, M., Gesbert, D. & Mellouk, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 7997372. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Autonomic load balancing for flow monitoring

    Kamiyama, N., Mori, T. & Kawahara, R., 2012, 2012 IEEE International Conference on Communications, ICC 2012. p. 2684-2688 5 p. 6363789. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • AutoBLG: Automatic URL blacklist generator using search space expansion and filters

    Sun, B., Akiyama, M., Yagi, T., Hatada, M. & Mori, T., 2016 Feb 11, 20th IEEE Symposium on Computers and Communication, ISCC 2015. Institute of Electrical and Electronics Engineers Inc., p. 625-631 7 p. 7405584. (Proceedings - IEEE Symposium on Computers and Communications; vol. 2016-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A study on detecting network anomalies using sampled flow statistics

    Kawahara, R., Mori, T., Kamiyama, N., Harada, S. & Asano, S., 2007 Dec 1, 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W. 4090152. (SAINT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • A periodic combined-content distribution mechanism in peer-assisted content delivery networks

    Maki, N., Shinkuma, R., Mori, T., Kamiyama, N. & Kawahara, R., 2013 Aug 14, International Telecommunication Union - Proceedings of the 2013 ITU Kaleidoscope Academic Conference: Building Sustainable Communities, K 2013. p. 217-224 8 p. 6533770. (International Telecommunication Union - Proceedings of the 2013 ITU Kaleidoscope Academic Conference: Building Sustainable Communities, K 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Analyzing influence of network topology on designing ISP-operated CDN

    Kamiyama, N., Mori, T., Kawahara, R., Harada, S. & Hasegawa, H., 2010, Proceedings of 2010 14th International Telecommunications Network Strategy and Planning Symposium, Networks 2010. 5624931. (Proceedings of 2010 14th International Telecommunications Network Strategy and Planning Symposium, Networks 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A method of detecting performance degradation at TCP flow level from sampled packet streams

    Kawahara, R., Ishibashi, K., Mori, T. & Abe, T., 2005 Nov 15, 2005 Workshop on High Performance Switching and Routing, HPSR 2005. p. 157-161 5 p. (2005 Workshop on High Performance Switching and Routing, HPSR 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A method of detecting network anomalies in cyclic traffic

    Harada, S., Kawahara, R., Mori, T., Kamiyama, N., Hasegawa, H. & Yoshino, H., 2008 Dec 1, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 2057-2061 5 p. 4698171. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A method of bandwidth dimensioning and management for aggregated TCP flows with heterogeneous access links

    Kawahara, R., Ishibashi, K., Mori, T., Ozawa, T., Sumita, S. & Abe, T., 2004, Networks 2004 - 11th International Telecommunications Network Strategy and Planning Symposium. VDE VERLAG GMBH, p. 15-20 6 p. (Networks 2004 - 11th International Telecommunications Network Strategy and Planning Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A First Look at COVID-19 Domain Names: Origin and Implications

    Kawaoka, R., Chiba, D., Watanabe, T., Akiyama, M. & Mori, T., 2021, Passive and Active Measurement - 22nd International Conference, PAM 2021, Proceedings. Hohlfeld, O., Lutu, A. & Levin, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 39-53 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12671 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Adaptive bandwidth control to handle long-duration large flows

    Kawahara, R., Mori, T., Kamiyama, N., Harada, S. & Hasegawa, H., 2009 Nov 19, Proceedings - 2009 IEEE International Conference on Communications, ICC 2009. 5198696. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2-D bitmap for summarizing inter-host communication patterns

    Ishibashi, K., Mori, T., Kawahara, R., Toyama, K., Osawa, S. & Asano, S., 2007, 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W. IEEE Computer Society, p. 83-86 4 p. 4090154. (SAINT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)