研究活動

  • Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment
    Ady Wahyudi Paundu, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi
    Security and Communication Networks, Vol. 2018, 18pages, February 2018.
    • Classification of URL bitstreams using Bag of Bytes
      Keiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi
      In Proceeding of the first International Workshop on Network Intelligence (NI2018), February 2018.
      • Visualization And Statistical Modeling Of Financial Big Data
        Masayuki Jimichi, Daisuke Miyamoto, Chika Saka, Syuichi Nagata
        In Proceedings of the International Association of Statistical Computing and New Zealand Statistical Association Conference & Workshops, 2 pages, December 2017.
        • Ditto subsystem: A case study for building an experiment environment in StarBED using TopDL
          Masatoshi Enomoto, Tomoya Inoue, Kunio Akashi, Shisuke Miwa, Toshiyuki Miyachi, Daisuke Miyamoto
          In Proceedings of European Conference on Electrical Engineering & Computer Science, 6 pages, Bern, Switzerland, November 2017.
          • URL Classification using BoF of URL bitstream
            Keiichi Shima, Hiroshi Abe, Daisuke Miyamoto, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya
            In Proceedings of the 12th International Conference on Future Internet Technologies (CFI), (Extended Abstract Session) June 2017.
            • Hayabusa: A Simple and Fast Full-Text Search Engine for Massive System Log Data
              Hiroshi Abe, Keiichi Shima, Yuji Sekiya, Daisuke Miyamoto, Tomohiro Ishihara, Kazuya Okada
              In Proceedings of the 12th International Conference on Future Internet Technologies, 7 pages, Fukuoka, Japan, June 2017.
              • 超小型端末向け視線フリックを利用した文字入力手法の提案と評価
                粂 尚成, 宮本 大輔, 中山 雅哉
                電子情報通信学会技術研究報告, IE-2016-167 116(495), pp.187-192, 2017年3月.
                Japanese
                • 認知心理学とサイバーセキュリティに関する一考察:視線分析の事例
                  宮本 大輔
                  暗号と情報セキュリティシンポジウム, 2017年1月.
                  Japanese
                  • 認知心理学に基づいたサイバーセキュリティ研究に関する一考察
                    宮本 大輔
                    日本認知心理学会 第14回大会, 2016年6月.
                    • Structured Cybersecurity Information Exchange for Streamlining Incident Response Operations
                      Takeshi Takahashi, Daisuke Miyamoto
                      In Proceedings of IEEE/IFIP Network Operations and Management Symposium, pp.949-954, Istanbul, Turkey, April 2016.
                      • Offloading Smartphone Firewalling Using OpenFlow-capable Wireless Access Points
                        Daisuke Miyamoto, Ryo Nakamura, Yuji Sekiya, Takeshi Takahashi
                        In Proceedings of IEEE International Conference on Pervasive Computing and Communications, 4 pages, Sydney, Australia, March 2016.
                        • Toward Automated Vulnerability Monitoring Using Open Information and Standardized Tools
                          Takeshi Takahashi, Daisuke Miyamoto, Koji Nakao
                          In Proceedings of IEEE International Conference on Pervasive Computing and Communications, 4 pages, Sydney, Australia, March 2016
                          • Text mining-based Approach for Estimating Vulnerability Score
                            Daisuke Miyamoto, Yasuhiro Yamamoto, Masaya Nakayama
                            In Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp, 67-73, Kyoto, Japan, November 2015.
                            • INTERCEPT+: SDN Support for Live Migration-based Honeypots
                              Ayumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki
                              In Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp,16-24, Kyoto, Japan, November 2015.
                              • AJNA: Anti-phishing JS-based visual aNAlysis to Mitigate Users’ Excessive Trust in SSL/TLS
                                Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi
                                In Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.74-84, Kyoto, Japan, November 2015
                                • Eye Can Tell: On the Correlation between Eye Movement and Phishing Identification
                                  Daisuke Miyamoto, Blanc Gregory, Youki Kadobayashi
                                  In Proceedings of the 22nd International Conference on Neural Information Processing (ICONIP), pp.223-232, Istanbul, Turkey, November 2015.
                                  • 年次的な脆弱性情報への教師あり潜在ディリクレ配分法の適用による脆弱性スコア予測の研究
                                    山本 康裕, 宮本 大輔, 中山 雅哉
                                    電子情報信学会技術研究報告 ICSS2014-79 114(489), pp.97-102, 2015年3月.
                                    Japanese
                                    • RTOB: a TDMA-based MAC Protocol to Achieve High Reliability of One-hop Broadcast in VANET
                                      Fei Han, Daisuke Miyamoto, Yasushi Wakahara
                                      In Proceedings of the 12th IEEE Workshop on Managing Ubiquitous Communications and Services, pp.26-31, St.Louis, MO, USA, March 2015
                                      • EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits
                                        Daisuke Miyamoto, Takuji Iimura, Hajime Tazaki, Gregory Blanc, Youki Kadobayashi
                                        In Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Wroclaw, Poland, pp.56-65, September 2014.
                                        • NECOMAtter: Curating Approach for Sharing Cyber Threat Information
                                          Takuji Iimura, Daisuke Miyamoto, Hajime Tazaki, Youki Kadobayashi
                                          In Proceedings of the 9th International Conference on Future Internet Technologies (CFI, poster session), June 2014.
                                        1 2 3 5