default search action
Daisuke Miyamoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Satoshi Okada, Kunio Akashi, Daisuke Miyamoto, Yuji Sekiya, Hideki Takase, Hiroshi Nakamura:
Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network. J. Inf. Process. 31: 537-549 (2023) - [j10]Masayuki Jimichi, Yoshinori Kawasaki, Daisuke Miyamoto, Chika Saka, Shuichi Nagata:
Statistical Modeling of Financial Data with Skew-Symmetric Error Distributions. Symmetry 15(9): 1772 (2023) - [j9]Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto:
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware. J. Comput. Virol. Hacking Tech. 19(2): 149-163 (2023) - 2022
- [c43]Toyotaro Suzumura, Akiyoshi Sugiki, Hiroyuki Takizawa, Akira Imakura, Hiroshi Nakamura, Kenjiro Taura, Tomohiro Kudoh, Toshihiro Hanawa, Yuji Sekiya, Hill Hiroki Kobayashi, Yohei Kuga, Ryo Nakamura, Renhe Jiang, Junya Kawase, Masatoshi Hanai, Hiroshi Miyazaki, Tsutomu Ishizaki, Daisuké Shimotoku, Daisuke Miyamoto, Kento Aida, Atsuko Takefusa, Takashi Kurimoto, Koji Sasayama, Naoya Kitagawa, Ikki Fujiwara, Yusuke Tanimura, Takayuki Aoki, Toshio Endo, Satoshi Ohshima, Keiichiro Fukazawa, Susumu Date, Toshihiro Uchibayashi:
mdx: A Cloud Platform for Supporting Data Science and Cross-Disciplinary Research Collaborations. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-7 - [i5]Toyotaro Suzumura, Akiyoshi Sugiki, Hiroyuki Takizawa, Akira Imakura, Hiroshi Nakamura, Kenjiro Taura, Tomohiro Kudoh, Toshihiro Hanawa, Yuji Sekiya, Hill Hiroki Kobayashi, Shin Matsushima, Yohei Kuga, Ryo Nakamura, Renhe Jiang, Junya Kawase, Masatoshi Hanai, Hiroshi Miyazaki, Tsutomu Ishizaki, Daisuké Shimotoku, Daisuke Miyamoto, Kento Aida, Atsuko Takefusa, Takashi Kurimoto, Koji Sasayama, Naoya Kitagawa, Ikki Fujiwara, Yusuke Tanimura, Takayuki Aoki, Toshio Endo, Satoshi Ohshima, Keiichiro Fukazawa, Susumu Date, Toshihiro Uchibayashi:
mdx: A Cloud Platform for Supporting Data Science and Cross-Disciplinary Research Collaborations. CoRR abs/2203.14188 (2022) - 2021
- [c42]Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hideki Takase, Hiroshi Nakamura:
LDoS Attacker Detection Algorithms in Zigbee Network. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 43-50 - [c41]Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura:
New LDoS Attack in Zigbee Network and its Possible Countermeasures. SMARTCOMP 2021: 246-251 - [i4]Keiichi Shima, Ryo Nakamura, Kazuya Okada, Tomohiro Ishihara, Daisuke Miyamoto, Yuji Sekiya:
Classifying DNS Servers based on Response Message Matrix using Machine Learning. CoRR abs/2111.05034 (2021) - [i3]Keiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi:
Classification of URL bitstreams using Bag of Bytes. CoRR abs/2111.06087 (2021) - 2020
- [c40]Tomoya Yamashita, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura:
Slow Scan Attack Detection Based on Communication Behavior. ICCNS 2020: 14-20 - [c39]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. ICICS 2020: 223-242 - [i2]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes affecting user decision to adopt a Virtual Private Network (VPN) app. CoRR abs/2008.06813 (2020)
2010 – 2019
- 2019
- [j8]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi:
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents. IEEE Access 7: 130758-130771 (2019) - [j7]Andrew M'manga, Shamal Faily, John McAlaney, Chris Williams, Youki Kadobayashi, Daisuke Miyamoto:
A normative decision-making model for cyber security. Inf. Comput. Secur. 27(5) (2019) - [j6]Masahiko Morita, Kazuro Shimokawa, Masaomi Nishimura, Sakiko Nakamura, Yuki Tsujimura, Satoko Takemoto, Takehiro Tawara, Hideo Yokota, Shuhei Wemler, Daisuke Miyamoto, Hidetoshi Ikeno, Akira Sato, Teiichi Furuichi, Norio Kobayashi, Yoshihiro Okumura, Yoko Shiraishi-Yamaguchi, Yuko Okamura-Oho:
ViBrism DB: an interactive search and viewer platform for 2D/3D anatomical images of gene expression and co-expression networks. Nucleic Acids Res. 47(Database-Issue): D859-D866 (2019) - [c38]Hiroshi Abe, Keiichi Shima, Daisuke Miyamoto, Yuji Sekiya, Tomohiro Ishihara, Kazuya Okada, Ryo Nakamura, Satoshi Matsuura:
Distributed Hayabusa: Scalable Syslog Search Engine Optimized for Time-Dimensional Search. AINTEC 2019: 9-16 - [c37]Shun Yonamine, Youki Kadobayashi, Daisuke Miyamoto, Yuzo Taenaka:
Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection. ICISSP 2019: 471-478 - 2018
- [j5]Ady Wahyudi Paundu, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment. Secur. Commun. Networks 2018: 4216240:1-4216240:18 (2018) - [c36]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
A comparative study of smartphone-user security perception and preference towards redesigned security notifications. AfriCHI 2018: 17:1-17:6 - [c35]Keiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi:
Classification of URL bitstreams using bag of bytes. ICIN 2018: 1-5 - [c34]Jing Zhao, Shaoning Pang, Iman Tabatabaei Ardekani, Yuji Sekiya, Daisuke Miyamoto:
Task and Instance Quadratic Ordering for Active Online Multitask Learning. ICONIP (3) 2018: 435-447 - [c33]Ryo Nakamura, Yuji Sekiya, Daisuke Miyamoto, Kazuya Okada, Tomohiro Ishihara:
Malicious Host Detection by Imaging SYN Packets and A Neural Network. ISNCC 2018: 1-4 - [c32]Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto:
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. PST 2018: 1-11 - 2017
- [c31]Hiroshi Abe, Keiichi Shima, Yuji Sekiya, Daisuke Miyamoto, Tomohiro Ishihara, Kazuya Okada:
Hayabusa: Simple and Fast Full-Text Search Engine for Massive System Log Data. CFI 2017: 2:1-2:7 - [i1]Chris Inacio, Daisuke Miyamoto:
Management Incident Lightweight Exchange (MILE) Implementation Report. RFC 8134: 1-16 (2017) - 2016
- [c30]Takeshi Takahashi, Daisuke Miyamoto:
Structured cybersecurity information exchange for streamlining incident response operations. NOMS 2016: 949-954 - [c29]Daisuke Miyamoto, Ryo Nakamura, Takeshi Takahashi, Yuji Sekiya:
Offloading smartphone firewalling using OpenFlow-capable wireless access points. PerCom Workshops 2016: 1-4 - [c28]Takeshi Takahashi, Daisuke Miyamoto, Koji Nakao:
Toward automated vulnerability monitoring using open information and standardized tools. PerCom Workshops 2016: 1-4 - 2015
- [c27]Ayumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki:
INTERCEPT+: SDN Support for Live Migration-Based Honeypots. BADGERS@RAID 2015: 16-24 - [c26]Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama:
Text-Mining Approach for Estimating Vulnerability Score. BADGERS@RAID 2015: 67-73 - [c25]Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi:
AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. BADGERS@RAID 2015: 74-84 - [c24]Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi:
Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification. ICONIP (3) 2015: 223-232 - [c23]Fei Han, Daisuke Miyamoto, Yasushi Wakahara:
RTOB: A TDMA-based MAC protocol to achieve high reliability of one-hop broadcast in VANET. PerCom Workshops 2015: 87-92 - 2014
- [j4]Daisuke Miyamoto, Takuji Iimura:
PACKTER: implementation of internet traffic visualizer and extension for network forensics. Computing 96(1): 79-80 (2014) - [c22]Daisuke Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki, Youki Kadobayashi:
EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits. BADGERS@ESORICS 2014: 56-65 - [c21]Takuji Iimura, Daisuke Miyamoto, Hajime Tazaki, Youki Kadobayashi:
NECOMAtter: curating approach for sharing cyber threat information. CFI 2014: 19:1-19:2 - [c20]Daisuke Miyamoto, Satoru Teramura, Masaya Nakayama:
INTERCEPT: high-interaction server-type honeypot based on live migration. SimuTools 2014: 147-152 - 2013
- [c19]Marat Vyshegorodtsev, Daisuke Miyamoto, Yasushi Wakahara:
Reputation Scoring System Using an Economic Trust Model: A Distributed Approach to Evaluate Trusted Third Parties on the Internet. AINA Workshops 2013: 730-737 - [c18]Daisuke Miyamoto, Takeshi Takahashi:
Toward Automated Reduction of Human Errors Based on Cognitive Analysis. IMIS 2013: 820-825 - [c17]Daisuke Miyamoto, Toshiyuki Miyachi, Yuzo Taenaka, Hiroaki Hazeyama:
PhishCage: reproduction of fraudulent websites in the emulated internet. SimuTools 2013: 242-247 - [c16]Daisuke Miyamoto, Toshiyuki Miyachi:
COSMO - emulation of internet traffic: poster abstract. SimuTools 2013: 274-276 - 2012
- [j3]Hidetoshi Ikeno, Tomoki Kazawa, Shigehiro Namiki, Daisuke Miyamoto, Yohei Sato, Stephan Shuichi Haupt, Ikuko Nishikawa, Ryohei Kanzaki:
Development of a Scheme and Tools to Construct a Standard Moth Brain for Neural Network Simulations. Comput. Intell. Neurosci. 2012: 795291:1-795291:10 (2012) - [c15]Gregory Blanc, Daisuke Miyamoto, Mitsuaki Akiyama, Youki Kadobayashi:
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts. AINA Workshops 2012: 344-351 - [c14]Eimatsu Moriyama, Takeshi Takahashi, Daisuke Miyamoto:
DNS-Based Defense against IP Spoofing Attacks. ICONIP (5) 2012: 599-609 - [c13]Daisuke Miyamoto, Tomoki Kazawa, Ryohei Kanzaki:
Neural Circuit Simulation of Hodgkin-Huxley Type Neurons Toward Peta Scale Computers. SC Companion 2012: 1541 - 2010
- [j2]Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites. J. Intell. Learn. Syst. Appl. 2(4): 190-199 (2010)
2000 – 2009
- 2009
- [j1]Mio Suzuki, Hiroaki Hazeyama, Daisuke Miyamoto, Shinsuke Miwa, Youki Kadobayashi:
Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set. IEICE Trans. Inf. Syst. 92-D(10): 1877-1887 (2009) - [c12]Daisuke Miyamoto, Keigo Nakamura, Tomoki Toda, Hiroshi Saruwatari, Kiyohiro Shikano:
Acoustic compensation methods for body transmitted speech conversion. ICASSP 2009: 3901-3904 - [c11]Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites. ICONIP (2) 2009: 548-555 - 2008
- [c10]Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
An Independent Evaluation of Web Timing Attack and its Countermeasure. ARES 2008: 1319-1324 - [c9]Yohsuke Isozaki, Yoshihiro Kanna, Koki Kato, Tsuyoshi Kanai, Daisuke Miyamoto, Shinji Kikuchi:
Monitoring Cross-Site Processes Executed across Heterogeneous WS-BPEL Processors. EDOCW 2008: 389-392 - [c8]Akihira Yoshimoto, Shu-ichi Muto, Genichi Kaneda, Kazuaki Ohara, Masahiko Nakayama, Atsushi Hirao, Hidekazu Masaki, Daisuke Miyamoto:
Local Government ICT Platform Standardization Activities of ICT Systems and Services for Offering High Value-added Service by Interacting Local Governments, Regional Institutions and Private Sector. II3E 2008: 315-326 - [c7]Takashi Kai, Atsushi Hirao, Daisuke Miyamoto, Yuko Ueda:
Service Interaction Platform Technologies Providing High Value-added ICT Services. II3E 2008: 327-340 - [c6]Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites. ICONIP (1) 2008: 539-546 - [c5]Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly. ICONIP (1) 2008: 547-554 - [c4]Hiroaki Hazeyama, Mio Suzuki, Shinsuke Miwa, Daisuke Miyamoto, Youki Kadobayashi:
Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures. CSET 2008 - 2006
- [c3]Shunsuke Nara, Daisuke Miyamoto, Satoru Takahashi, Shun'ichi Kaneko:
Visual Feedback Tracking of Crane Hook. IROS 2006: 2736-2742 - [c2]Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyamoto, Masafumi Oe:
An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation. ISCC 2006: 378-385 - 2005
- [c1]Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks. AINTEC 2005: 195-209
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint