Author of the publication

Understanding the security management of global third-party Android marketplaces.

, , , , , , , , and . WAMA@ESEC/SIGSOFT FSE, page 12-18. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Akiyama, Mitsuaki
add a person with the name Akiyama, Mitsuaki
 

Other publications of authors with the same name

Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails., , , and . SOUPS @ USENIX Security Symposium, page 319-338. USENIX Association, (2021)It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites., , , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 171-191. Springer, (2020)User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts., , , , , and . EuroS&P, page 323-337. IEEE, (2018)Objection!: Identifying Misclassified Malicious Activities with XAI., , , , and . ICC, page 2065-2070. IEEE, (2022)Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering., , , and . IEEE Trans. Inf. Forensics Secur., (2023)Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites., , , and . NDSS, The Internet Society, (2020)DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency., , , , , , and . IEEE Access, (2022)A First Look at COVID-19 Domain Names: Origin and Implications., , , , and . PAM, volume 12671 of Lecture Notes in Computer Science, page 39-53. Springer, (2021)Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations., , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 278-294. Springer, (2017)Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts., , , and . AINA Workshops, page 344-351. IEEE Computer Society, (2012)