Ayumu Kubota
Orcid: 0009-0008-1337-311X
According to our database1,
Ayumu Kubota
authored at least 52 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025
2024
CoRR, 2024
Poster: Understanding and Managing Changes in IoT Device Behaviors for Reliable Network Traffic Inference.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
Dynamic Inference From IoT Traffic Flows Under Concept Drifts in Residential ISP Networks.
IEEE Internet Things J., September, 2023
Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data.
Enterp. Inf. Syst., September, 2023
Quantifying and Managing Impacts of Concept Drifts on IoT Traffic Inference in Residential ISP Networks.
CoRR, 2023
Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load.
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023
A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow Data.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the Advanced Information Networking and Applications, 2023
2022
On recruiting and retaining users for security-sensitive longitudinal measurement panels.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Anomaly Traffic Detection with Federated Learning toward Network-based Malware Detection in IoT.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
2021
IEEE Trans. Big Data, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition.
CoRR, 2019
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
2018
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System.
Proceedings of the CLOSER 2017, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
2015
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015
2014
Proceedings of the Database and Expert Systems Applications, 2014
An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
2013
Proceedings of IEEE International Conference on Communications, 2013
Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
Understanding the time-series behavioral characteristics of evolutionally advanced email spammers.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
2011
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2009
Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation.
IEICE Trans. Inf. Syst., 2009
Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking.
Proceedings of IEEE International Conference on Communications, 2009
2008
Service Independent Access Control Architecture for User Generated Content (UGC).
Proceedings of the 2008 International Conference on Security & Management, 2008
2006
IEICE Trans. Commun., 2006
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2003
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003