Author of the publication

A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior.

, , , , , and . SAINT Workshops, page 82. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Akiyama, Mitsuaki
add a person with the name Akiyama, Mitsuaki
 

Other publications of authors with the same name

DomainProfiler: toward accurate and early discovery of domain names abused in future., , , , , and . Int. J. Inf. Sec., 17 (6): 661-680 (2018)Analysis of malware download sites by focusing on time series variation of malware., , and . J. Comput. Sci., (2017)Malware originated HTTP traffic detection utilizing cluster appearance ratio., , , , , and . ICOIN, page 248-253. IEEE, (2017)Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild., , , , , and . J. Inf. Process., (2022)Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails., , , and . J. Inf. Process., (2022)Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records., , , and . J. Inf. Process., (2019)Tracking the Human Mobility Using Mobile Device Sensors., , and . IEICE Trans. Inf. Syst., 100-D (8): 1680-1690 (2017)Client Honeypot Multiplication with High Performance and Precise Detection., , , , and . IEICE Trans. Inf. Syst., 98-D (4): 775-787 (2015)HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle., , , and . Int. J. Inf. Sec., 17 (2): 135-151 (2018)A Survey on the Geographic Diversity of Usable Privacy and Security Research., , and . CoRR, (2023)