Method, apparatus and program for detecting spoofed network traffic R Vaidyanathan, A Ghosh, A Naidu, A Yamada, A Kubota, Y Sawaya, ... US Patent 8,925,079, 2014 | 220 | 2014 |
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ... US Patent 9,386,030, 2016 | 133 | 2016 |
Self-confidence trumps knowledge: A cross-cultural study of security behavior Y Sawaya, M Sharif, N Christin, A Kubota, A Nakarai, A Yamada Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017 | 128 | 2017 |
Method and apparatus for detecting spoofed network traffic R Vaidyanathan, A Ghosh, YH Cheng, A Yamada, Y Miyake US Patent 8,281,397, 2012 | 124 | 2012 |
LAP: Lightweight anonymity and privacy HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng 2012 IEEE Symposium on Security and Privacy, 506-520, 2012 | 106 | 2012 |
Visual similarity-based phishing detection without victim site information M Hara, A Yamada, Y Miyake 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 30-36, 2009 | 106 | 2009 |
Predicting impending exposure to malicious content from user behavior M Sharif, J Urakawa, N Christin, A Kubota, A Yamada Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 73 | 2018 |
Intrusion detection for encrypted web accesses A Yamada, Y Miyake, K Takemori, A Studer, A Perrig 21st International Conference on Advanced Information Networking and …, 2007 | 63 | 2007 |
Passive OS fingerprinting by DNS traffic analysis T Matsunaka, A Yamada, A Kubota 2013 IEEE 27th International Conference on Advanced Information Networking …, 2013 | 46 | 2013 |
System and method for real-time reporting of anomalous internet protocol attacks Y Gottlieb, A Naidu, A Ghosh, A Yamada, Y Sawaya, A Kubota US Patent 9,130,982, 2015 | 42 | 2015 |
Exploiting privacy policy conflicts in online social networks A Yamada, THJ Kim, A Perrig CMU-CyLab-12–005, 2012 | 35 | 2012 |
Exploiting privacy policy conflicts in online social networks A Yamada, THJ Kim, A Perrig CMU-CyLab-12–005, 2012 | 35 | 2012 |
Relationgram: Tie-strength visualization for user-controlled online identity authentication THJ Kim, A Yamada, V Gligor, J Hong, A Perrig Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 21 | 2013 |
Web tracking site detection based on temporal link analysis A Yamada, H Masanori, Y Miyake 2010 IEEE 24th International Conference on Advanced Information Networking …, 2010 | 18 | 2010 |
Anomaly detection for DNS servers using frequent host selection A Yamada, Y Miyake, M Terabe, K Hashimoto, N Kato 2009 International Conference on Advanced Information Networking and …, 2009 | 15 | 2009 |
Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data A Yamada, Y Miyake, K Takemori, T Tanaka International Conference on Information Technology: Coding and Computing …, 2005 | 15 | 2005 |
Hunting brand domain forgery: a scalable classification for homograph attack TP Thao, Y Sawaya, HQ Nguyen-Son, A Yamada, K Omote, A Kubota ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 11 | 2019 |
Hunting brand domain forgery: a scalable classification for homograph attack TP Thao, Y Sawaya, HQ Nguyen-Son, A Yamada, K Omote, A Kubota ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 11 | 2019 |
Classification of landing and distribution domains using whois’ text mining TP Thao, A Yamada, K Murakami, J Urakawa, Y Sawaya, A Kubota 2017 IEEE Trustcom/BigDataSE/ICESS, 1-8, 2017 | 8 | 2017 |
A comprehensive security analysis checksheet for OpenFlow networks Y Hori, S Mizoguchi, R Miyazaki, A Yamada, Y Feng, A Kubota, K Sakurai Advances on Broad-Band Wireless Computing, Communication and Applications …, 2017 | 8 | 2017 |