Follow
Daisuke Miyamoto
Daisuke Miyamoto
Verified email at nc.u-tokyo.ac.jp
Title
Cited by
Cited by
Year
An evaluation of machine learning-based methods for detection of phishing sites
D Miyamoto, H Hazeyama, Y Kadobayashi
Advances in Neuro-Information Processing: 15th International Conference …, 2009
1612009
Text-mining approach for estimating vulnerability score
Y Yamamoto, D Miyamoto, M Nakayama
2015 4th International Workshop on Building Analysis Datasets and Gathering …, 2015
442015
SPS: a simple filtering algorithm to thwart phishing attacks
D Miyamoto, H Hazeyama, Y Kadobayashi
Technologies for Advanced Heterogeneous Networks: First Asian Internet …, 2005
382005
An autonomous architecture for inter-domain traceback across the borders of network operation
H Hazeyama, Y Kadobayashi, D Miyamoto, M Oe
11th IEEE Symposium on Computers and Communications (ISCC'06), 378-385, 2006
332006
EyeBit: eye-tracking approach for enforcing phishing prevention habits
D Miyamoto, T Iimura, G Blanc, H Tazaki, Y Kadobayashi
2014 Third International Workshop on Building Analysis Datasets and …, 2014
322014
An empirical approach to phishing countermeasures through smart glasses and validation agents
JD Ndibwile, ET Luhanga, D Fall, D Miyamoto, G Blanc, Y Kadobayashi
IEEE Access 7, 130758-130771, 2019
252019
Classification of URL bitstreams using bag of bytes
K Shima, D Miyamoto, H Abe, T Ishihara, K Okada, Y Sekiya, H Asai, ...
2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018
222018
Eye can tell: On the correlation between eye movement and phishing identification
D Miyamoto, G Blanc, Y Kadobayashi
Neural Information Processing: 22nd International Conference, ICONIP 2015 …, 2015
222015
A proposal of the AdaBoost-based detection of phishing sites
D Miyamoto, H Hazeyama, Y Kadobayashi
Proceedings of the joint workshop on information security, 2007
222007
mdx: A cloud platform for supporting data science and cross-disciplinary research collaborations
T Suzumura, A Sugiki, H Takizawa, A Imakura, H Nakamura, K Taura, ...
2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2022
212022
Characterizing obfuscated JavaScript using abstract syntax trees: Experimenting with malicious scripts
G Blanc, D Miyamoto, M Akiyama, Y Kadobayashi
2012 26th International Conference on Advanced Information Networking and …, 2012
182012
Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures.
H Hazeyama, M Suzuki, S Miwa, D Miyamoto, Y Kadobayashi
CSET, 2008
162008
RTOB: A TDMA-based MAC protocol to achieve high reliability of one-hop broadcast in VANET
F Han, D Miyamoto, Y Wakahara
2015 IEEE International Conference on Pervasive Computing and Communication …, 2015
152015
Visualization and statistical modeling of financial big data: Double-log modeling with skew-symmetric error distributions
M Jimichi, D Miyamoto, C Saka, S Nagata
Japanese Journal of Statistics and Data Science 1, 347-371, 2018
142018
An independent evaluation of web timing attack and its countermeasure
Y Nagami, D Miyamoto, H Hazeyama, Y Kadobayashi
2008 Third International Conference on Availability, Reliability and …, 2008
142008
Attributes affecting user decision to adopt a Virtual Private Network (VPN) app
N Sombatruang, T Omiya, D Miyamoto, MA Sasse, Y Kadobayashi, ...
Information and Communications Security: 22nd International Conference …, 2020
132020
AJNA: anti-phishing JS-based visual analysis, to mitigate users' excessive trust in SSL/TLS
P Mensah, G Blanc, K Okada, D Miyamoto, Y Kadobayashi
2015 4th International Workshop on Building Analysis Datasets and Gathering …, 2015
122015
Taxonomical approach to the deployment of traceback mechanisms
T Takahashi, H Hazeyama, D Miyamoto, Y Kadobayashi
2011 Baltic Congress on Future Internet and Communications, 13-20, 2011
122011
New ldos attack in zigbee network and its possible countermeasures
S Okada, D Miyamoto, Y Sekiya, H Nakamura
2021 IEEE International Conference on Smart Computing (SMARTCOMP), 246-251, 2021
112021
A normative decision-making model for cyber security
A M’manga, S Faily, J McAlaney, C Williams, Y Kadobayashi, D Miyamoto
Information & Computer Security 27 (5), 636-646, 2019
112019
The system can't perform the operation now. Try again later.
Articles 1–20