Follow
Tatsuya Mori
Tatsuya Mori
Verified email at nsl.cs.waseda.ac.jp - Homepage
Title
Cited by
Cited by
Year
Identifying elephant flows through periodically sampled packets
T Mori, M Uchida, R Kawahara, J Pan, S Goto
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 115-120, 2004
2732004
Spatio-temporal factorization of log data for understanding network events
T Kimura, K Ishibashi, T Mori, H Sawada, T Toyono, K Nishimatsu, ...
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 610-618, 2014
1092014
On the characteristics of internet traffic variability: Spikes and Elephants
T Mori, R Kawahara, S Naito
IEICE TRANSACTIONS on Information and Systems 87 (12), 2644-2653, 2004
882004
Detecting malicious websites by learning IP address features
D Chiba, K Tobe, T Mori, S Goto
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012
812012
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots
M Akiyama, T Yagi, T Yada, T Mori, Y Kadobayashi
Computers & Security 69, 155-173, 2017
652017
DomainProfiler: Discovering domain names abused in future
D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
622016
Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps
T Watanabe, M Akiyama, T Sakai, T Mori
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 241-255, 2015
622015
Simple and adaptive identification of superspreaders by flow sampling
N Kamiyama, T Mori, R Kawahara
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
602007
On the effectiveness of IP reputation for spam filtering
H Esquivel, A Akella, T Mori
2010 Second International Conference on COMmunication Systems and NETworks …, 2010
582010
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
572017
ShamFinder: An automated framework for detecting IDN homographs
H Suzuki, D Chiba, Y Yoneya, T Mori, S Goto
Proceedings of the Internet Measurement Conference, 449-462, 2019
552019
Simple and accurate identification of high-rate flows by packet sampling
N Kamiyama, T Mori
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
552006
Identifying heavy-hitter flows from sampled flow statistics
T MORI, T TAKINE, J PAN, R KAWAHARA, M UCHIDA, S GOTO
IEICE transactions on communications 90 (11), 3061-3072, 2007
542007
Endothelium-dependent vasodilator effects of platelet activating factor on rat resistance vessels.
K Kamata, T Mori, K Shigenobu, Y Kasuya
British journal of pharmacology 98 (4), 1360, 1989
541989
Stereocontrolled total synthesis of (-)-anisatin: a neurotoxic sesquiterpenoid possessing a novel spiro. beta.-lactone
H Niwa, M Nisiwaki, I Tsukada, T Ishigaki, S Ito, K Wakamatsu, T Mori, ...
Journal of the American Chemical Society 112 (24), 9001-9003, 1990
531990
Discovering similar malware samples using API call topics
A Fujino, J Murakami, T Mori
2015 12th annual IEEE consumer communications and networking conference …, 2015
512015
Method of producing multilayer wiring structure of integrated circuit
A Saiki, K Sato, T Mori, S Harada
US Patent 3,846,166, 1974
481974
Tap'n ghost: A compilation of novel attack techniques against smartphone touchscreens
S Maruyama, S Wakabayashi, T Mori
2019 IEEE Symposium on Security and Privacy (SP), 620-637, 2019
472019
Stay on-topic: Generating context-specific fake restaurant reviews
M Juuti, B Sun, T Mori, N Asokan
European Symposium on Research in Computer Security, 132-151, 2018
462018
Automating URL blacklist generation with similarity search approach
B Sun, M Akiyama, T Yagi, M Hatada, T Mori
IEICE TRANSACTIONS on Information and Systems 99 (4), 873-882, 2016
442016
The system can't perform the operation now. Try again later.
Articles 1–20