Follow
Daisuke Miyamoto
Daisuke Miyamoto
Verified email at nc.u-tokyo.ac.jp
Title
Cited by
Cited by
Year
An evaluation of machine learning-based methods for detection of phishing sites
D Miyamoto, H Hazeyama, Y Kadobayashi
Advances in Neuro-Information Processing: 15th International Conference …, 2009
1382009
SPS: a simple filtering algorithm to thwart phishing attacks
D Miyamoto, H Hazeyama, Y Kadobayashi
Technologies for Advanced Heterogeneous Networks: First Asian Internet …, 2005
372005
Text-mining approach for estimating vulnerability score
Y Yamamoto, D Miyamoto, M Nakayama
2015 4th International Workshop on Building Analysis Datasets and Gathering …, 2015
332015
An autonomous architecture for inter-domain traceback across the borders of network operation
H Hazeyama, Y Kadobayashi, D Miyamoto, M Oe
11th IEEE Symposium on Computers and Communications (ISCC'06), 378-385, 2006
302006
A proposal of the AdaBoost-based detection of phishing sites
D Miyamoto, H Hazeyama, Y Kadobayashi
Proceedings of the joint workshop on information security, 2007
212007
EyeBit: eye-tracking approach for enforcing phishing prevention habits
D Miyamoto, T Iimura, G Blanc, H Tazaki, Y Kadobayashi
2014 Third International Workshop on Building Analysis Datasets and …, 2014
192014
Classification of URL bitstreams using bag of bytes
K Shima, D Miyamoto, H Abe, T Ishihara, K Okada, Y Sekiya, H Asai, ...
2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018
182018
Eye can tell: On the correlation between eye movement and phishing identification
D Miyamoto, G Blanc, Y Kadobayashi
Neural Information Processing: 22nd International Conference, ICONIP 2015 …, 2015
162015
Characterizing obfuscated JavaScript using abstract syntax trees: Experimenting with malicious scripts
G Blanc, D Miyamoto, M Akiyama, Y Kadobayashi
2012 26th International Conference on Advanced Information Networking and …, 2012
162012
RTOB: A TDMA-based MAC protocol to achieve high reliability of one-hop broadcast in VANET
F Han, D Miyamoto, Y Wakahara
2015 IEEE International Conference on Pervasive Computing and Communication …, 2015
142015
Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures.
H Hazeyama, M Suzuki, S Miwa, D Miyamoto, Y Kadobayashi
CSET, 2008
142008
Taxonomical approach to the deployment of traceback mechanisms
T Takahashi, H Hazeyama, D Miyamoto, Y Kadobayashi
2011 Baltic Congress on Future Internet and Communications, 13-20, 2011
132011
An independent evaluation of web timing attack and its countermeasure
Y Nagami, D Miyamoto, H Hazeyama, Y Kadobayashi
2008 Third International Conference on Availability, Reliability and …, 2008
122008
AJNA: anti-phishing JS-based visual analysis, to mitigate users' excessive trust in SSL/TLS
P Mensah, G Blanc, K Okada, D Miyamoto, Y Kadobayashi
2015 4th International Workshop on Building Analysis Datasets and Gathering …, 2015
112015
An empirical approach to phishing countermeasures through smart glasses and validation agents
JD Ndibwile, ET Luhanga, D Fall, D Miyamoto, G Blanc, Y Kadobayashi
IEEE Access 7, 130758-130771, 2019
102019
Leveraging KVM events to detect cache-based side channel attacks in a virtualization environment
AW Paundu, D Fall, D Miyamoto, Y Kadobayashi
Security and Communication Networks 2018, 1-18, 2018
102018
Toward automated vulnerability monitoring using open information and standardized tools
T Takahashi, D Miyamoto, K Nakao
2016 IEEE International Conference on Pervasive Computing and Communication …, 2016
102016
A normative decision-making model for cyber security
A M˘manga, S Faily, J McAlaney, C Williams, Y Kadobayashi, D Miyamoto
Information & Computer Security, 2019
92019
Toward automated reduction of human errors based on cognitive analysis
D Miyamoto, T Takahashi
2013 Seventh International Conference on Innovative Mobile and Internet …, 2013
92013
Reputation scoring system using an economic trust model: a distributed approach to evaluate trusted third parties on the internet
M Vyshegorodtsev, D Miyamoto, Y Wakahara
2013 27th International Conference on Advanced Information Networking and …, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20