Identifying elephant flows through periodically sampled packets T Mori, M Uchida, R Kawahara, J Pan, S Goto Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 115-120, 2004 | 268 | 2004 |
Spatio-temporal factorization of log data for understanding network events T Kimura, K Ishibashi, T Mori, H Sawada, T Toyono, K Nishimatsu, ... IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 610-618, 2014 | 106 | 2014 |
On the characteristics of internet traffic variability: Spikes and Elephants T Mori, R Kawahara, S Naito IEICE TRANSACTIONS on Information and Systems 87 (12), 2644-2653, 2004 | 88 | 2004 |
Detecting malicious websites by learning IP address features D Chiba, K Tobe, T Mori, S Goto 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012 | 76 | 2012 |
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots M Akiyama, T Yagi, T Yada, T Mori, Y Kadobayashi Computers & Security 69, 155-173, 2017 | 64 | 2017 |
Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps T Watanabe, M Akiyama, T Sakai, T Mori Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 241-255, 2015 | 61 | 2015 |
Domainprofiler: Discovering domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 58 | 2016 |
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ... 2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017 | 56 | 2017 |
Simple and adaptive identification of superspreaders by flow sampling N Kamiyama, T Mori, R Kawahara IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 56 | 2007 |
On the effectiveness of IP reputation for spam filtering H Esquivel, A Akella, T Mori 2010 Second International Conference on COMmunication Systems and NETworks …, 2010 | 54 | 2010 |
Simple and accurate identification of high-rate flows by packet sampling N Kamiyama, T Mori Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006 | 54 | 2006 |
Identifying heavy-hitter flows from sampled flow statistics T MORI, T TAKINE, J PAN, R KAWAHARA, M UCHIDA, S GOTO IEICE transactions on communications 90 (11), 3061-3072, 2007 | 53 | 2007 |
Stereocontrolled total synthesis of (-)-anisatin: a neurotoxic sesquiterpenoid possessing a novel spiro. beta.-lactone H Niwa, M Nisiwaki, I Tsukada, T Ishigaki, S Ito, K Wakamatsu, T Mori, ... Journal of the American Chemical Society 112 (24), 9001-9003, 1990 | 53 | 1990 |
ShamFinder: An automated framework for detecting IDN homographs H Suzuki, D Chiba, Y Yoneya, T Mori, S Goto Proceedings of the Internet Measurement Conference, 449-462, 2019 | 52 | 2019 |
Discovering similar malware samples using API call topics A Fujino, J Murakami, T Mori 2015 12th annual IEEE consumer communications and networking conference …, 2015 | 51 | 2015 |
Stay on-topic: Generating context-specific fake restaurant reviews M Juuti, B Sun, T Mori, N Asokan European Symposium on Research in Computer Security, 132-151, 2018 | 44 | 2018 |
Flow analysis of internet traffic: World Wide Web versus peer‐to‐peer T Mori, M Uchida, S Goto Systems and Computers in Japan 36 (11), 70-81, 2005 | 44 | 2005 |
Automating URL blacklist generation with similarity search approach B Sun, M Akiyama, T Yagi, M Hatada, T Mori IEICE TRANSACTIONS on Information and Systems 99 (4), 873-882, 2016 | 42 | 2016 |
Characterizing traffic flows originating from large-scale video sharing services T Mori, R Kawahara, H Hasegawa, S Shimogawa International Workshop on Traffic Monitoring and Analysis, 17-31, 2010 | 42 | 2010 |
Network failure detection and diagnosis by analyzing syslog and SNS data: Applying big data analysis to network operations T Kimura, K Takeshita, T Toyono, M Yokota, K Nishimatsu, T Mori NTT Technical Review 11 (11), 2013 | 37 | 2013 |