Mitsuaki Akiyama
Orcid: 0000-0001-7052-8562
According to our database1,
Mitsuaki Akiyama
authored at least 118 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Understanding the Breakdown of Same-origin Policies in Web Services That Rehost Websites.
J. Inf. Process., 2024
J. Inf. Process., 2024
Editor's Message to Special Issue of Cybersecurity Technologies for Secure Supply-Chain.
J. Inf. Process., 2024
Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games.
IEEE Access, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the HCI International 2024 Posters, 2024
2023
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey.
Comput. Secur., October, 2023
IEICE Trans. Inf. Syst., September, 2023
IEEE Trans. Inf. Forensics Secur., 2023
J. Inf. Process., 2023
CoRR, 2023
IEEE Access, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework.
Proc. Priv. Enhancing Technol., 2022
Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild.
J. Inf. Process., 2022
Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails.
J. Inf. Process., 2022
Understanding Security Risks of Ad-based URL Shortening Services Caused by Users' Behaviors.
J. Inf. Process., 2022
IEEE Access, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the Network Science - 7th International Winter Conference, 2022
Proceedings of the IEEE International Conference on Communications, 2022
2021
IEICE Trans. Commun., July, 2021
J. Inf. Process., 2021
J. Cyber Secur. Mobil., 2021
To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' Behaviors.
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions.
Proceedings of the Advances in Information and Computer Security, 2021
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021
Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services.
J. Inf. Process., 2020
1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
IEICE Trans. Inf. Syst., 2020
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
IEICE Trans. Inf. Syst., 2020
IEICE Trans. Inf. Syst., 2020
IEICE Trans. Inf. Syst., 2020
Exploration into Gray Area: Toward Efficient Labeling for Detecting Malicious Domain Names.
IEICE Trans. Commun., 2020
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel.
IEICE Trans. Inf. Syst., 2020
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes.
J. Inf. Process., 2019
J. Inf. Process., 2019
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records.
J. Inf. Process., 2019
IEICE Trans. Inf. Syst., 2019
IEICE Trans. Inf. Syst., 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Understanding the Responsiveness of Mobile App Developers to Software Library Updates.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
I know what you did last login: inconsistent messages tell existence of a target's account to insiders.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store.
J. Inf. Process., 2018
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.
Int. J. Inf. Sec., 2018
DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Inf. Syst., 2018
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.
IEICE Trans. Inf. Syst., 2018
Comput. Secur., 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
J. Comput. Sci., 2017
IEICE Trans. Inf. Syst., 2017
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.
IEICE Trans. Inf. Syst., 2017
CoRR, 2017
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots.
Comput. Secur., 2017
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
Malicious URL sequence detection using event de-noising convolutional neural network.
Proceedings of the IEEE International Conference on Communications, 2017
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
IEICE Trans. Inf. Syst., 2016
IEICE Trans. Inf. Syst., 2016
BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure.
IEICE Trans. Commun., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
J. Inf. Process., 2015
IEICE Trans. Inf. Syst., 2015
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2013
IT Prof., 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks.
IEICE Trans. Commun., 2010
2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007