Author of the publication

Understanding the security management of global third-party Android marketplaces.

, , , , , , , , and . WAMA@ESEC/SIGSOFT FSE, page 12-18. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Akiyama, Mitsuaki
add a person with the name Akiyama, Mitsuaki
 

Other publications of authors with the same name

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?, , , , , and . IEICE Trans. Inf. Syst., 103-D (7): 1541-1555 (2020)Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots., , , , and . Comput. Secur., (2017)Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering., , , and . IEEE Trans. Inf. Forensics Secur., (2023)Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel., , , , , and . IEICE Trans. Inf. Syst., 103-D (2): 239-255 (2020)Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study., , , and . IEICE Trans. Inf. Syst., 100-D (8): 1663-1670 (2017)Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities., , , , , and . IEICE Trans. Inf. Syst., 102-D (3): 430-443 (2019)Detection Method of Homograph Internationalized Domain Names with OCR., , , and . J. Inf. Process., (2019)Auto-creation of Robust Android Malware Family Trees., , , and . J. Inf. Process., (2021)DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency., , , , , , and . IEEE Access, (2022)On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework., , , , and . Proc. Priv. Enhancing Technol., 2022 (4): 140-161 (2022)