Follow
Akira Yamada
Akira Yamada
Kobe University
Verified email at acm.org - Homepage
Title
Cited by
Cited by
Year
Method, apparatus and program for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, A Naidu, A Yamada, A Kubota, Y Sawaya, ...
US Patent 8,925,079, 2014
2212014
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ...
US Patent 9,386,030, 2016
1552016
Self-confidence trumps knowledge: A cross-cultural study of security behavior
Y Sawaya, M Sharif, N Christin, A Kubota, A Nakarai, A Yamada
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
1352017
Method and apparatus for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, YH Cheng, A Yamada, Y Miyake
US Patent 8,281,397, 2012
1272012
Visual similarity-based phishing detection without victim site information
M Hara, A Yamada, Y Miyake
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 30-36, 2009
1162009
LAP: Lightweight anonymity and privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
2012 IEEE Symposium on Security and Privacy, 506-520, 2012
1092012
Predicting impending exposure to malicious content from user behavior
M Sharif, J Urakawa, N Christin, A Kubota, A Yamada
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
772018
Intrusion detection for encrypted web accesses
A Yamada, Y Miyake, K Takemori, A Studer, A Perrig
21st International Conference on Advanced Information Networking and …, 2007
652007
Passive OS fingerprinting by DNS traffic analysis
T Matsunaka, A Yamada, A Kubota
2013 IEEE 27th International Conference on Advanced Information Networking …, 2013
492013
System and method for real-time reporting of anomalous internet protocol attacks
Y Gottlieb, A Naidu, A Ghosh, A Yamada, Y Sawaya, A Kubota
US Patent 9,130,982, 2015
442015
Exploiting privacy policy conflicts in online social networks
A Yamada, THJ Kim, A Perrig
CMU-CyLab-12–005, 2012
362012
Relationgram: Tie-strength visualization for user-controlled online identity authentication
THJ Kim, A Yamada, V Gligor, J Hong, A Perrig
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
212013
Web tracking site detection based on temporal link analysis
A Yamada, H Masanori, Y Miyake
2010 IEEE 24th International Conference on Advanced Information Networking …, 2010
192010
Phishing site detection using similarity of website structure
S Tanaka, T Matsunaka, A Yamada, A Kubota
2021 IEEE conference on dependable and secure computing (DSC), 1-8, 2021
162021
Anomaly detection for DNS servers using frequent host selection
A Yamada, Y Miyake, M Terabe, K Hashimoto, N Kato
2009 International Conference on Advanced Information Networking and …, 2009
162009
Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data
A Yamada, Y Miyake, K Takemori, T Tanaka
International Conference on Information Technology: Coding and Computing …, 2005
152005
Hunting brand domain forgery: a scalable classification for homograph attack
TP Thao, Y Sawaya, HQ Nguyen-Son, A Yamada, K Omote, A Kubota
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
112019
On the use of BGP AS numbers to detect spoofing
R Vaidyanathan, A Ghosh, YH Cheng, A Yamada, Y Miyake
2010 IEEE Globecom Workshops, 1606-1610, 2010
102010
Designing a location trace anonymization contest
T Murakami, H Arai, K Hamada, T Hatano, M Iguchi, H Kikuchi, ...
arXiv preprint arXiv:2107.10407, 2021
92021
Classification of landing and distribution domains using whois’ text mining
TP Thao, A Yamada, K Murakami, J Urakawa, Y Sawaya, A Kubota
2017 IEEE Trustcom/BigDataSE/ICESS, 1-8, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20