From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Akiyama, Mitsuaki
add a person with the name Akiyama, Mitsuaki
 

Другие публикации лиц с тем же именем

DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency., , , , , , и . IEEE Access, (2022)Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering., , , и . IEEE Trans. Inf. Forensics Secur., (2023)A First Look at COVID-19 Domain Names: Origin and Implications., , , , и . PAM, том 12671 из Lecture Notes in Computer Science, стр. 39-53. Springer, (2021)Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails., , , и . SOUPS @ USENIX Security Symposium, стр. 319-338. USENIX Association, (2021)It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites., , , , и . DIMVA, том 12223 из Lecture Notes in Computer Science, стр. 171-191. Springer, (2020)Objection!: Identifying Misclassified Malicious Activities with XAI., , , , и . ICC, стр. 2065-2070. IEEE, (2022)Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites., , , и . NDSS, The Internet Society, (2020)User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts., , , , , и . EuroS&P, стр. 323-337. IEEE, (2018)A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior., , , , , и . SAINT Workshops, стр. 82. IEEE Computer Society, (2007)Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations., , , , и . WISE (2), том 10570 из Lecture Notes in Computer Science, стр. 278-294. Springer, (2017)