Takeshi Yagi
Orcid: 0009-0006-6414-8815
According to our database1,
Takeshi Yagi
authored at least 62 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter.
IEICE Trans. Inf. Syst., 2024
2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
IEEE Access, 2022
2021
Classification of diversified web crawler accesses inspired by biological adaptation.
Int. J. Bio Inspired Comput., 2021
2020
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel.
IEICE Trans. Inf. Syst., 2020
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020
2019
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes.
J. Inf. Process., 2019
IEICE Trans. Inf. Syst., 2019
IEICE Trans. Inf. Syst., 2019
2018
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.
Int. J. Inf. Sec., 2018
DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018
IEICE Trans. Inf. Syst., 2018
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Comput. Secur., 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
IEICE Trans. Inf. Syst., 2017
CoRR, 2017
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots.
Comput. Secur., 2017
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
Malicious URL sequence detection using event de-noising convolutional neural network.
Proceedings of the IEEE International Conference on Communications, 2017
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
IEICE Trans. Inf. Syst., 2016
IEICE Trans. Inf. Syst., 2016
BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure.
IEICE Trans. Commun., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
IEICE Trans. Inf. Syst., 2015
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2015
Dynamic parametric dispersion compensation using FPGA pump controller and dispersion monitor.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEICE Trans. Commun., 2014
Development of Low Loss Ultra-High Δ ZrO<sub>2</sub>-SiO<sub>2</sub> PLC for Next Generation Compact and High-Density Integrated Devices.
IEICE Trans. Electron., 2014
Spot size converter with cross-vertical taper for low-loss coupling between ZrO2-SiO2 PLC and SMF.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014
Counter-dithering pump scheme for cascaded degenerate FWM based wavelength converter.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014
2013
IT Prof., 2013
IEICE Trans. Commun., 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
2011
IEICE Trans. Commun., 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Controlling malware HTTP communications in dynamic analysis system using search engine.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011
2010
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution.
IEICE Trans. Commun., 2010
Proceedings of the 12th IEEE International Symposium on Web Systems Evolution, 2010
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
2009
Dynamic Topology Reconfiguration Method for Service Overlay Networks Using Users' Community Information.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
2008
Proceedings of the 2008 IEEE World Congress on Services, 2008
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008