关注
Tatsuya Mori
Tatsuya Mori
在 nsl.cs.waseda.ac.jp 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Identifying elephant flows through periodically sampled packets
T Mori, M Uchida, R Kawahara, J Pan, S Goto
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 115-120, 2004
2682004
Spatio-temporal factorization of log data for understanding network events
T Kimura, K Ishibashi, T Mori, H Sawada, T Toyono, K Nishimatsu, ...
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 610-618, 2014
1062014
On the characteristics of internet traffic variability: Spikes and Elephants
T Mori, R Kawahara, S Naito
IEICE TRANSACTIONS on Information and Systems 87 (12), 2644-2653, 2004
882004
Detecting malicious websites by learning IP address features
D Chiba, K Tobe, T Mori, S Goto
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012
762012
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots
M Akiyama, T Yagi, T Yada, T Mori, Y Kadobayashi
Computers & Security 69, 155-173, 2017
642017
Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps
T Watanabe, M Akiyama, T Sakai, T Mori
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 241-255, 2015
612015
Domainprofiler: Discovering domain names abused in future
D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
582016
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
562017
Simple and adaptive identification of superspreaders by flow sampling
N Kamiyama, T Mori, R Kawahara
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
562007
On the effectiveness of IP reputation for spam filtering
H Esquivel, A Akella, T Mori
2010 Second International Conference on COMmunication Systems and NETworks …, 2010
542010
Simple and accurate identification of high-rate flows by packet sampling
N Kamiyama, T Mori
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
542006
Identifying heavy-hitter flows from sampled flow statistics
T MORI, T TAKINE, J PAN, R KAWAHARA, M UCHIDA, S GOTO
IEICE transactions on communications 90 (11), 3061-3072, 2007
532007
Stereocontrolled total synthesis of (-)-anisatin: a neurotoxic sesquiterpenoid possessing a novel spiro. beta.-lactone
H Niwa, M Nisiwaki, I Tsukada, T Ishigaki, S Ito, K Wakamatsu, T Mori, ...
Journal of the American Chemical Society 112 (24), 9001-9003, 1990
531990
ShamFinder: An automated framework for detecting IDN homographs
H Suzuki, D Chiba, Y Yoneya, T Mori, S Goto
Proceedings of the Internet Measurement Conference, 449-462, 2019
522019
Discovering similar malware samples using API call topics
A Fujino, J Murakami, T Mori
2015 12th annual IEEE consumer communications and networking conference …, 2015
512015
Stay on-topic: Generating context-specific fake restaurant reviews
M Juuti, B Sun, T Mori, N Asokan
European Symposium on Research in Computer Security, 132-151, 2018
442018
Flow analysis of internet traffic: World Wide Web versus peer‐to‐peer
T Mori, M Uchida, S Goto
Systems and Computers in Japan 36 (11), 70-81, 2005
442005
Automating URL blacklist generation with similarity search approach
B Sun, M Akiyama, T Yagi, M Hatada, T Mori
IEICE TRANSACTIONS on Information and Systems 99 (4), 873-882, 2016
422016
Characterizing traffic flows originating from large-scale video sharing services
T Mori, R Kawahara, H Hasegawa, S Shimogawa
International Workshop on Traffic Monitoring and Analysis, 17-31, 2010
422010
Network failure detection and diagnosis by analyzing syslog and SNS data: Applying big data analysis to network operations
T Kimura, K Takeshita, T Toyono, M Yokota, K Nishimatsu, T Mori
NTT Technical Review 11 (11), 2013
372013
系统目前无法执行此操作,请稍后再试。
文章 1–20