• 742 引用
  • 14 h指数
20002020

年単位の研究成果

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
Article
2020
公開

Follow your silhouette: Identifying the social account of website visitors through user-blocking side channel

Watanabe, T., Shioji, E., Akiyama, M., Sasaoka, K., Yagi, T. & Mori, T., 2020, : : IEICE Transactions on Information and Systems. E103D, 2, p. 239-255 17 p.

研究成果: Article

公開

Study on the vulnerabilities of free and paid mobile apps associated with software library

Watanabe, T., Akiyama, M., Kanei, F., Shioji, E., Takata, Y., Sun, B., Ishii, Y., Shibahara, T., Yagi, T. & Mori, T., 2020, : : IEICE Transactions on Information and Systems. E103D, 2, p. 276-291 16 p.

研究成果: Article

公開
2019

Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility

Iijima, R., Minami, S., Zhou, Y., Takehisa, T., Takahashi, T., Oikawa, Y. & Mori, T., 2019, (Accepted/In press) : : IEEE Transactions on Emerging Topics in Computing.

研究成果: Article

Understanding the origins of weak cryptographic algorithms used for signing android apps

Yoshida, K., Imai, H., Serizawa, N., Mori, T. & Kanaoka, A., 2019, : : Journal of information processing. 27, p. 593-602 10 p.

研究成果: Article

公開
2018

Automatically generating malware analysis reports using sandbox logs

Sun, B., Fujino, A., Mori, T., Ban, T., Takahashi, T. & Inoue, D., 2018 11 1, : : IEICE Transactions on Information and Systems. E101D, 11, p. 2622-2632 11 p.

研究成果: Article

1 引用 (Scopus)

Detecting malware-infected devices using the HTTP header patterns

Mizuno, S., Hatada, M., Mori, T. & Goto, S., 2018 5 1, : : IEICE Transactions on Information and Systems. E101D, 5, p. 1370-1379 10 p.

研究成果: Article

1 引用 (Scopus)

DomainChroma: Building actionable threat intelligence from malicious domain names

Chiba, D., Akiyama, M., Yagi, T., Hato, K., Mori, T. & Goto, S., 2018 8, : : Computers and Security. 77, p. 138-161 24 p.

研究成果: Article

4 引用 (Scopus)

DomainProfiler: toward accurate and early discovery of domain names abused in future

Chiba, D., Yagi, T., Akiyama, M., Shibahara, T., Mori, T. & Goto, S., 2018 11 1, : : International Journal of Information Security. 17, 6, p. 661-680 20 p.

研究成果: Article

PADetective: A systematic approach to automate detection of promotional attackers in mobile app store

Sun, B., Luo, X., Akiyama, M., Watanabe, T. & Mori, T., 2018 1 1, : : Journal of Information Processing. 26, p. 212-223 12 p.

研究成果: Article

1 引用 (Scopus)
2017

Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots

Akiyama, M., Yagi, T., Yada, T., Mori, T. & Kadobayashi, Y., 2017, (Accepted/In press) : : Computers and Security.

研究成果: Article

10 引用 (Scopus)

APPraiser: A large scale analysis of android clone apps

Ishii, Y., Watanabe, T., Akiyama, M. & Mori, T., 2017 8 1, : : IEICE Transactions on Information and Systems. E100D, 8, p. 1703-1713 11 p.

研究成果: Article

1 引用 (Scopus)

Building a scalable web tracking detection system: Implementation and the empirical study

Haga, Y., Takata, Y., Akiyama, M. & Mori, T., 2017 8, : : IEICE Transactions on Information and Systems. E100D, 8, p. 1663-1670 8 p.

研究成果: Article

Evaluation of EM information leakage caused by IEMI with hardware Trojan

Kinugawa, M., Hayashi, Y. I. & Mori, T., 2017, : : IEEJ Transactions on Fundamentals and Materials. 137, 3, p. 153-157 5 p.

研究成果: Article

Network event extraction from log data with nonnegative tensor factorization

Kimura, T., Ishibashi, K., Mori, T., Sawada, H., Toyono, T., Nishimatsu, K., Watanabe, A., Shimoda, A. & Shiomoto, K., 2017 10 1, : : IEICE Transactions on Communications. E100B, 10, p. 1865-1878 14 p.

研究成果: Article

2 引用 (Scopus)

Tracking the human mobility using mobile device sensors

Watanabe, T., Akiyama, M. & Mori, T., 2017 8, : : IEICE Transactions on Information and Systems. E100D, 8, p. 1680-1690 11 p.

研究成果: Article

1 引用 (Scopus)
2016

Automating URL blacklist generation with similarity search approach

Sun, B., Akiyama, M., Yagi, T., Hatada, M. & Mori, T., 2016 4 1, : : IEICE Transactions on Information and Systems. E99D, 4, p. 873-882 10 p.

研究成果: Article

5 引用 (Scopus)
2015

Statistical estimation of the names of HTTPS servers with domain name graphs

Mori, T., Inoue, T., Shimoda, A., Sato, K., Harada, S., Ishibashi, K. & Goto, S., 2015 9 30, (Accepted/In press) : : Computer Communications.

研究成果: Article

7 引用 (Scopus)
2013

Analyzing characteristics of TCP quality metrics with respect to type of connection through measured traffic data

Ikeda, Y., Kawahara, R., Kamiyama, N., Kimura, T. & Mori, T., 2013 2, : : IEICE Transactions on Communications. E96-B, 2, p. 533-542 10 p.

研究成果: Article

1 引用 (Scopus)

Analyzing influence of network topology on designing ISP-operated CDN

Kamiyama, N., Mori, T., Kawahara, R., Harada, S. & Hasegawa, H., 2013 2 1, : : Telecommunication Systems. 52, 2, p. 969-977 9 p.

研究成果: Article

5 引用 (Scopus)

Analyzing spatial structure of IP addresses for detecting malicious websites

Chiba, D., Tobe, K., Mori, T. & Goto, S., 2013, : : Journal of information processing. 21, 3, p. 539-550 12 p.

研究成果: Article

1 引用 (Scopus)

Autonomic load balancing of flow monitors

Kamiyama, N., Mori, T. & Kawahara, R., 2013 2 26, : : Computer Networks. 57, 3, p. 741-761 21 p.

研究成果: Article

2 引用 (Scopus)

Effect of limiting pre-distribution and clustering users on multicast pre-distribution vod

Kamiyama, N., Kawahara, R., Mori, T. & Hasegawa, H., 2013 1, : : IEICE Transactions on Communications. E96-B, 1, p. 143-154 12 p.

研究成果: Article

Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management

Kawahara, R., Takine, T., Mori, T., Kamiyama, N. & Ishibashi, K., 2013 4 22, : : Computer Networks. 57, 6, p. 1560-1576 17 p.

研究成果: Article

2 引用 (Scopus)

Multicast pre-distribution VoD system

Kamiyama, N., Kawahara, R., Mori, T. & Hasegawa, H., 2013 6, : : IEICE Transactions on Communications. E96-B, 6, p. 1459-1471 13 p.

研究成果: Article

1 引用 (Scopus)

Optimally designing ISP-operated CDN

Kamiyama, N., Mori, T., Kawahara, R. & Hasegawa, H., 2013 3, : : IEICE Transactions on Communications. E96-B, 3, p. 790-801 12 p.

研究成果: Article

7 引用 (Scopus)

Optimally identifyingworm-infected hosts

Kamiyama, N., Mori, T., Kawahara, R. & Harada, S., 2013 8, : : IEICE Transactions on Communications. E96-B, 8, p. 2084-2094 11 p.

研究成果: Article

2012

Analyzing and reducing the impact of traffic on large-scale NAT

Kawahara, R., Mori, T., Yada, T. & Kamiyama, N., 2012 9, : : IEICE Transactions on Communications. E95-B, 9, p. 2815-2827 13 p.

研究成果: Article

Effects of sampling and spatio/temporal granularity in traffic monitoring on anomaly detectability

Ishibashi, K., Kawahara, R., Mori, T., Kondoh, T. & Asano, S., 2012 2, : : IEICE Transactions on Communications. E95-B, 2, p. 466-476 11 p.

研究成果: Article

2 引用 (Scopus)

Extended darknet: Multi-dimensional internet threat monitoring system

Shimoda, A., Mori, T. & Goto, S., 2012 6, : : IEICE Transactions on Communications. E95-B, 6, p. 1915-1923 9 p.

研究成果: Article

1 引用 (Scopus)

Traffic engineering of peer-assisted content delivery network with content-oriented incentive mechanism

Maki, N., Nishio, T., Shinkuma, R., Mori, T., Kamiyama, N., Kawahara, R. & Takahashi, T., 2012 12, : : IEICE Transactions on Information and Systems. E95-D, 12, p. 2860-2869 10 p.

研究成果: Article

4 引用 (Scopus)
2011

Detection accuracy of network anomalies using sampled flow statistics

Kawahara, R., Ishibashi, K., Mori, T., Kamiyama, N., Harada, S., Hasegawa, H. & Asano, S., 2011 11 1, : : International Journal of Network Management. 21, 6, p. 513-535 23 p.

研究成果: Article

5 引用 (Scopus)

Optimally designing caches to reduce P2P traffic

Kamiyama, N., Kawahara, R., Mori, T., Harada, S. & Hasegawa, H., 2011 5 16, : : Computer Communications. 34, 7, p. 883-897 15 p.

研究成果: Article

7 引用 (Scopus)

Parallel video streaming optimizing network throughput

Kamiyama, N., Kawahara, R., Mori, T., Harada, S. & Hasegawa, H., 2011 7 1, : : Computer Communications. 34, 10, p. 1182-1194 13 p.

研究成果: Article

4 引用 (Scopus)
2010

Traffic engineering using overlay network

Kawahara, R., Kamiyama, N., Mori, T. & Hasegawa, H., 2010 9 1, : : NTT Technical Review. 8, 9

研究成果: Article

2008

Finding cardinality heavy-hitters in massive traffic data and its application to anomaly detection

Ishibashi, K., Mori, T., Kawahara, R., Hirokawa, Y., Kobayashi, A., Yamamoto, K., Sakamoto, H. & Asano, S., 2008 1 1, : : IEICE Transactions on Communications. E91-B, 5, p. 1331-1339 9 p.

研究成果: Article

4 引用 (Scopus)

Packet sampling TCP flow rate estimation and performance degradation detection method

Kawahara, R., Mori, T., Ishibashi, K., Kamiyama, N. & Yoshino, H., 2008 1 1, : : IEICE Transactions on Communications. E91-B, 5, p. 1309-1319 11 p.

研究成果: Article

2 引用 (Scopus)
2007

Identifying heavy-hitter flows from sampled flow statistics

Mori, T., Takine, T., Pan, J., Kawahara, R., Uchida, M. & Goto, S., 2007, : : IEICE Transactions on Communications. E90-B, 11, p. 3061-3072 12 p.

研究成果: Article

35 引用 (Scopus)
2005
19 引用 (Scopus)

Method of bandwidth dimensioning and management for aggregated TCP flows with heterogeneous access links

Kawahara, R., Ishibashi, K., Mori, T., Ozawa, T. & Abe, T., 2005 12, : : IEICE Transactions on Communications. E88-B, 12, p. 4605-4614 10 p.

研究成果: Article

1 引用 (Scopus)
2004

On the characteristics of internet traffic variability: Spikes and elephants

Mori, T., Kawahara, R., Naito, S. & Goto, S., 2004 12, : : IEICE Transactions on Information and Systems. E87-D, 12, p. 2644-2653 10 p.

研究成果: Article

10 引用 (Scopus)