Follow
Akira Yamada
Akira Yamada
KDDI Research, Inc.
Verified email at acm.org - Homepage
Title
Cited by
Cited by
Year
Method, apparatus and program for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, A Naidu, A Yamada, A Kubota, Y Sawaya, ...
US Patent 8,925,079, 2014
2202014
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ...
US Patent 9,386,030, 2016
1312016
Self-confidence trumps knowledge: A cross-cultural study of security behavior
Y Sawaya, M Sharif, N Christin, A Kubota, A Nakarai, A Yamada
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
1262017
Method and apparatus for detecting spoofed network traffic
R Vaidyanathan, A Ghosh, YH Cheng, A Yamada, Y Miyake
US Patent 8,281,397, 2012
1222012
LAP: Lightweight anonymity and privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
2012 IEEE Symposium on Security and Privacy, 506-520, 2012
1042012
Visual similarity-based phishing detection without victim site information
M Hara, A Yamada, Y Miyake
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 30-36, 2009
1042009
Predicting impending exposure to malicious content from user behavior
M Sharif, J Urakawa, N Christin, A Kubota, A Yamada
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
722018
Intrusion detection for encrypted web accesses
A Yamada, Y Miyake, K Takemori, A Studer, A Perrig
21st International Conference on Advanced Information Networking and …, 2007
622007
Passive OS fingerprinting by DNS traffic analysis
T Matsunaka, A Yamada, A Kubota
2013 IEEE 27th International Conference on Advanced Information Networking …, 2013
452013
System and method for real-time reporting of anomalous internet protocol attacks
Y Gottlieb, A Naidu, A Ghosh, A Yamada, Y Sawaya, A Kubota
US Patent 9,130,982, 2015
412015
Exploiting privacy policy conflicts in online social networks
A Yamada, THJ Kim, A Perrig
CMU-CyLab-12–005, 2012
352012
Exploiting privacy policy conflicts in online social networks
A Yamada, THJ Kim, A Perrig
CMU-CyLab-12–005, 2012
352012
Relationgram: Tie-strength visualization for user-controlled online identity authentication
THJ Kim, A Yamada, V Gligor, J Hong, A Perrig
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
212013
Web tracking site detection based on temporal link analysis
A Yamada, H Masanori, Y Miyake
2010 IEEE 24th International Conference on Advanced Information Networking …, 2010
182010
Anomaly detection for DNS servers using frequent host selection
A Yamada, Y Miyake, M Terabe, K Hashimoto, N Kato
2009 International Conference on Advanced Information Networking and …, 2009
152009
Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data
A Yamada, Y Miyake, K Takemori, T Tanaka
International Conference on Information Technology: Coding and Computing …, 2005
152005
Hunting brand domain forgery: a scalable classification for homograph attack
TP Thao, Y Sawaya, HQ Nguyen-Son, A Yamada, K Omote, A Kubota
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
102019
Hunting brand domain forgery: a scalable classification for homograph attack
TP Thao, Y Sawaya, HQ Nguyen-Son, A Yamada, K Omote, A Kubota
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
102019
Classification of landing and distribution domains using whois’ text mining
TP Thao, A Yamada, K Murakami, J Urakawa, Y Sawaya, A Kubota
2017 IEEE Trustcom/BigDataSE/ICESS, 1-8, 2017
82017
A comprehensive security analysis checksheet for OpenFlow networks
Y Hori, S Mizoguchi, R Miyazaki, A Yamada, Y Feng, A Kubota, K Sakurai
Advances on Broad-Band Wireless Computing, Communication and Applications …, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20