Takeo Hariu

Orcid: 0009-0007-4415-5310

According to our database1, Takeo Hariu authored at least 24 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter.
IEICE Trans. Inf. Syst., 2024

2023
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2018
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.
Int. J. Inf. Sec., 2018

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences.
IEICE Trans. Inf. Syst., 2018

2017
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

2016
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.
IEICE Trans. Inf. Syst., 2016

BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure.
IEICE Trans. Commun., 2016

2015
Client Honeypot Multiplication with High Performance and Precise Detection.
IEICE Trans. Inf. Syst., 2015

BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites.
IEICE Trans. Commun., 2014

2013
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs.
IT Prof., 2013

Evaluations and Analysis of Malware Prevention Methods on Websites.
IEICE Trans. Commun., 2013

API Chaser: Anti-analysis Resistant Malware Analyzer.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Active Credential Leakage for Observing Web-Based Attack Cycle.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Scalable and Performance-Efficient Client Honeypot on High Interaction System.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme.
IEICE Trans. Commun., 2011

2010
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution.
IEICE Trans. Commun., 2010

Investigation and analysis of malware on websites.
Proceedings of the 12th IEEE International Symposium on Web Systems Evolution, 2010

Life-cycle monitoring scheme of malware download sites for websites.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

Enhanced attack collection scheme on high-interaction web honeypots.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2008
Safe and Secure Services Based on NGN.
IEICE Trans. Inf. Syst., 2008

1997
An Experimental Study of Logical Office service over International ATM Networks.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997


  Loading...