Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ... 2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017 | 56 | 2017 |
Malicious URL sequence detection using event de-noising convolutional neural network T Shibahara, K Yamanishi, Y Takata, D Chiba, M Akiyama, T Yagi, ... 2017 IEEE International Conference on Communications (ICC), 1-7, 2017 | 54 | 2017 |
マルウェア対策のための研究用データセット~ MWS Datasets 2018~ 高田雄太, 寺田真敏, 松木隆宏, 笠間貴弘, 荒木粧子, 畑田充弘 研究報告セキュリティ心理学とトラスト (SPT) 2018 (38), 1-8, 2018 | 37 | 2018 |
Detecting malicious websites by integrating malicious, benign, and compromised redirection subgraph similarities T Shibahara, Y Takata, M Akiyama, T Yagi, T Yada 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 22 | 2017 |
Minespider: Extracting urls from environment-dependent drive-by download attacks Y Takata, M Akiyama, T Yagi, T Hariu, S Goto 2015 IEEE 39th Annual Computer Software and Applications Conference 2, 444-449, 2015 | 19 | 2015 |
Analysis of redirection caused by web-based malware Y Takata, S Goto, T Mori Proceedings of the Asia-Pacific advanced network 32, 53-62, 2011 | 17 | 2011 |
Datasets for anti-malware research mws datasets 2018 Y Takata, M Terada, T Matsuki, T Kasama, S Araki, M Hatada Information Processing Society of Japan 2018 (38), 2018 | 15 | 2018 |
Understanding the security management of global third-party android marketplaces Y Ishii, T Watanabe, F Kanei, Y Takata, E Shioji, M Akiyama, T Yagi, ... Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market …, 2017 | 14 | 2017 |
Analysis device, analysis method, and analysis program Y Takata, M Akiyama, T Yagi US Patent 10,416,970, 2019 | 10 | 2019 |
Website forensic investigation to identify evidence and impact of compromise Y Takata, M Akiyama, T Yagi, T Yada, S Goto Security and Privacy in Communication Networks: 12th International …, 2017 | 9 | 2017 |
Access classification device, access classification method, and recording medium T Shibahara, T Yagi, M Akiyama, Y Takata US Patent 11,212,297, 2021 | 8 | 2021 |
Event de-noising convolutional neural network for detecting malicious url sequences from proxy logs T Shibahara, K Yamanishi, Y Takata, D Chiba, T Hokaguchi, M Akiyama, ... IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2018 | 7 | 2018 |
Fine-grained analysis of compromised websites with redirection graphs and javascript traces Y Takata, M Akiyama, T Yagi, T Yada, S Goto IEICE TRANSACTIONS on Information and Systems 100 (8), 1714-1728, 2017 | 7 | 2017 |
実践サイバーセキュリティモニタリング 八木毅, 青木一史, 秋山満昭, 幾世知範, 高田雄太, 千葉大紀 コロナ社, 2016 | 7 | 2016 |
Identifying evasive code in malicious websites by analyzing redirection differences Y Takata, M Akiyama, T Yagi, T Hariu, K Ohkubo, S Goto IEICE TRANSACTIONS on Information and Systems 101 (11), 2600-2611, 2018 | 6 | 2018 |
Building a scalable web tracking detection system: Implementation and the empirical study Y Haga, Y Takata, M Akiyama, T Mori IEICE TRANSACTIONS on Information and Systems 100 (8), 1663-1670, 2017 | 6 | 2017 |
MineSpider: Extracting hidden URLs behind evasive drive-by download attacks Y Takata, M Akiyama, T Yagi, T Hariu, S Goto IEICE TRANSACTIONS on Information and Systems 99 (4), 860-872, 2016 | 6 | 2016 |
ドライブバイダウンロード攻撃に使用される悪性な JavaScript の実態調査 高田雄太, 秋山満昭, 針生剛男 研究報告セキュリティ心理学とトラスト (SPT) 2014 (11), 1-6, 2014 | 6 | 2014 |
Browser emulator device, construction device, browser emulation method, browser emulation program, construction method, and construction program Y Takata, M Akiyama, T Yagi US Patent 10,621,347, 2020 | 5 | 2020 |
Study on the vulnerabilities of free and paid mobile apps associated with software library T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ... IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020 | 5 | 2020 |