default search action
Takeshi Takahashi 0001
Person information
- affiliation: National Institute of Information and Communications Technology, Japan
Other persons with the same name
- Takeshi Takahashi — disambiguation page
- Takeshi Takahashi 0002 — University of Massachusetts Amherst, MA, USA (and 1 more)
- Takeshi Takahashi 0003 — Advantest Laboratories Limited, Advantest America Research and Development Center, Inc., Santa Clara, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Akira Yamada, Takeshi Takahashi, Daisuke Inoue:
Securing Code With Context: Enhancing Vulnerability Detection Through Contextualized Graph Representations. IEEE Access 12: 142101-142126 (2024) - [j34]Fabien Charmet, Tomohiro Morikawa, Akira Tanaka, Takeshi Takahashi:
VORTEX : Visual phishing detectiOns aRe Through EXplanations. ACM Trans. Internet Techn. 24(2): 9:1-9:24 (2024) - [c82]Mariama Mbow, Rodrigo Roman, Takeshi Takahashi, Kouichi Sakurai:
Evading IoT Intrusion Detection Systems with GAN. AsiaJCIS 2024: 48-55 - 2023
- [j33]Tianxiang He, Chansu Han, Ryoichi Isawa, Takeshi Takahashi, Shuji Kijima, Jun'ichi Takeuchi:
Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering. IEEE Access 11: 8240-8253 (2023) - [j32]Akira Tanaka, Chansu Han, Takeshi Takahashi:
Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint. IEEE Access 11: 23227-23244 (2023) - [j31]Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Akira Yamada, Takeshi Takahashi, Sangwook Kim, Daisuke Inoue:
Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation. IEEE Access 11: 102727-102745 (2023) - [j30]Kohei Miyamoto, Masazumi Iida, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach. IEEE Access 11: 132792-132810 (2023) - [j29]Montida Pattaranantakul, Chalee Vorakulpipat, Takeshi Takahashi:
Service Function Chaining security survey: Addressing security challenges and threats. Comput. Networks 221: 109484 (2023) - [j28]Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Takeshi Takahashi, Daisuke Inoue:
IoT malware classification based on reinterpreted function-call graphs. Comput. Secur. 125: 103060 (2023) - [j27]Koji Nakao, Katsunari Yoshioka, Takayuki Sasaki, Rui Tanabe, Xuping Huang, Takeshi Takahashi, Akira Fujita, Jun'ichi Takeuchi, Noboru Murata, Junji Shikata, Kazuki Iwamoto, Kazuki Takada, Yuki Ishida, Masaru Takeuchi, Naoto Yanai:
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware. IEICE Trans. Inf. Syst. 106(9): 1302-1315 (2023) - [j26]Yu-Wei Chang, Hong-Yen Chen, Chansu Han, Tomohiro Morikawa, Takeshi Takahashi, Tsung-Nan Lin:
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities. IEEE Trans. Emerg. Top. Comput. 11(4): 934-949 (2023) - [c81]Soohyun Jung, Keisuke Furumoto, Takeshi Takahashi, Yoshiaki Shiraishi:
Model Selection for Continuous Operation of Automated Vulnerability Assessment System. ARTMAN@CCS 2023: 11-15 - [c80]Harry Chandra Tanuwidjaja, Takeshi Takahashi, Tsung-Nan Lin, Boyi Lee, Tao Ban:
Hybrid Explainable Intrusion Detection System: Global vs. Local Approach. ARTMAN@CCS 2023: 37-42 - [c79]Shota Kawanaka, Yoshikatsu Kashiwabara, Kohei Miyamoto, Masazumi Iida, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads. AsiaJCIS 2023: 88-94 - [c78]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Machine Learning-Based Security Alert Screening with Focal Loss. IEEE Big Data 2023: 3043-3052 - [c77]Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks. CCS 2023: 3662-3663 - [c76]Tianxiang He, Chansu Han, Akira Tanaka, Takeshi Takahashi, Jun'ichi Takeuchi:
Work in Progress: New Seed Set Selection Method of the Scalable Method for Constructing Phylogenetic Trees. CF 2023: 364-365 - [c75]Kei Oshio, Satoshi Takada, Tianxiang He, Chansu Han, Akira Tanaka, Takeshi Takahashi, Jun'ichi Takeuchi:
Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering. COMPSAC 2023: 1552-1557 - [c74]Chansu Han, Akira Tanaka, Jun'ichi Takeuchi, Takeshi Takahashi, Tomohiro Morikawa, Tsung-Nan Lin:
Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis. ICISSP 2023: 617-625 - [c73]Jiaxing Zhou, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi, Daisuke Inoue:
Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families. ISCC 2023: 1410-1416 - [e1]Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, ARTMAN 2023, Copenhagen, Denmark, 30 November 2023. ACM 2023 [contents] - 2022
- [j25]Chansu Han, Jun'ichi Takeuchi, Takeshi Takahashi, Daisuke Inoue:
Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns. IEEE Access 10: 13038-13058 (2022) - [j24]Ryosuke Ishibashi, Kohei Miyamoto, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems. IEEE Access 10: 53972-53986 (2022) - [j23]Fabien Charmet, Tomohiro Morikawa, Takeshi Takahashi:
Toward a Better Understanding of Mobile Users' Behavior: A Web Session Repair Scheme. IEEE Access 10: 99931-99943 (2022) - [j22]Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi, Zonghua Zhang:
Interactions between artificial intelligence and cybersecurity to protect future networks. Ann. des Télécommunications 77(11-12): 727-729 (2022) - [j21]Yuki Osada, Ryusei Nagasawa, Yoshiaki Shiraishi, Makoto Takita, Keisuke Furumoto, Takeshi Takahashi, Masami Mohri, Masakatu Morii:
Multi-labeling with topic models for searching security information. Ann. des Télécommunications 77(11-12): 777-788 (2022) - [j20]Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre-François Gimenez, Yufei Han, Houda Jmila, Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
Explainable artificial intelligence for cybersecurity: a literature survey. Ann. des Télécommunications 77(11-12): 789-812 (2022) - [j19]Bo Sun, Takeshi Takahashi, Tao Ban, Daisuke Inoue:
Detecting Android Malware and Classifying Its Families in Large-scale Datasets. ACM Trans. Manag. Inf. Syst. 13(2): 12:1-12:21 (2022) - [c72]Fabien Charmet, Harry Chandra Tanuwidjaja, Tomohiro Morikawa, Takeshi Takahashi:
Towards Polyvalent Adversarial Attacks on URL Classification Engines. AsiaCCS 2022: 1246-1248 - [c71]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks. AsiaJCIS 2022: 1-7 - [c70]Chansu Han, Akira Tanaka, Takeshi Takahashi:
Darknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension. IEEE Big Data 2022: 2980-2988 - [c69]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Critical-Threat-Alert Detection using Online Machine Learning. IEEE Big Data 2022: 3007-3014 - [c68]Chun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi:
IoT Botnet Detection Based on the Behaviors of DNS Queries. DSC 2022: 1-7 - [c67]Shih-Chun Lin, Pang-Cheng Wl, Hong-Yen Chen, Tomohiro Morikawa, Takeshi Takahashi, Tsung-Nan Lin:
SenseInput: An Image-Based Sensitive Input Detection Scheme for Phishing Website Detection. ICC 2022: 4180-4186 - [c66]Mitsuhiro Umizaki, Tomohiro Morikawa, Akira Fujita, Takeshi Takahashi, Tsung-Nan Lin, Daisuke Inoue:
Understanding the Characteristics of Public Blocklist Providers. ISCC 2022: 1-7 - [c65]Kohei Miyamoto, Hiroki Goto, Ryosuke Ishibashi, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Malicious Packet Classification Based on Neural Network Using Kitsune Features. ISPR 2022: 306-314 - 2021
- [j18]Bo Sun, Tao Ban, Chansu Han, Takeshi Takahashi, Katsunari Yoshioka, Jun'ichi Takeuchi, Abdolhossein Sarrafzadeh, Meikang Qiu, Daisuke Inoue:
Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks. IEEE Access 9: 87962-87971 (2021) - [j17]Yun-Chung Chen, Hong-Yen Chen, Takeshi Takahashi, Bo Sun, Tsung-Nan Lin:
Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection. IEEE Access 9: 123208-123219 (2021) - [j16]Ryusei Nagasawa, Keisuke Furumoto, Makoto Takita, Yoshiaki Shiraishi, Takeshi Takahashi, Masami Mohri, Yasuhiro Takano, Masakatu Morii:
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time. IEICE Trans. Inf. Syst. 104-D(5): 556-561 (2021) - [j15]Ryo Iijima, Shota Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori:
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility. IEEE Trans. Emerg. Top. Comput. 9(4): 2004-2018 (2021) - [c64]Ryosuke Ishibashi, Hiroki Goto, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions. AsiaJCIS 2021: 9-16 - [c63]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs. IEEE BigData 2021: 2119-2127 - [c62]Kohei Masumi, Chansu Han, Tao Ban, Takeshi Takahashi:
Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort. CODASPY 2021: 329-331 - [c61]Tianxiang He, Chansu Han, Takeshi Takahashi, Shuji Kijima, Jun'ichi Takeuchi:
Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection. FMEC 2021: 1-6 - [c60]Akira Tanaka, Chansu Han, Takeshi Takahashi, Katsuki Fujisawa:
Internet-Wide Scanner Fingerprint Identifier Based on TCP/IP Header. FMEC 2021: 1-6 - [c59]Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Sangwook Kim, Takeshi Takahashi, Daisuke Inoue:
JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism. ICONIP (2) 2021: 669-680 - [c58]Keisuke Furumoto, Mitsuhiro Umizaki, Akira Fujita, Takahiko Nagata, Takeshi Takahashi, Daisuke Inoue:
Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 138-145 - [c57]Takeshi Takahashi, Yuki Umemura, Chansu Han, Tao Ban, Keisuke Furumoto, Ohnori Nakamura, Katsunari Yoshioka, Jun'ichi Takeuchi, Noboru Murata, Yoshiaki Shiraishi:
Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines? PerCom Workshops 2021: 376-379 - [c56]Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Bo Sun, Takeshi Takahashi:
IoT Malware Detection Using Function-Call-Graph Embedding. PST 2021: 1-9 - [c55]Kazuki Hara, Takeshi Takahashi, Motoya Ishimaki, Kazumasa Omote:
Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the Ethereum. QRS Companion 2021: 652-659 - [c54]Reo Kawasoe, Chansu Han, Ryoichi Isawa, Takeshi Takahashi, Jun'ichi Takeuchi:
Investigating behavioral differences between IoT malware via function call sequence graphs. SAC 2021: 1674-1682 - [c53]Chansu Han, Jun'ichi Takeuchi, Takeshi Takahashi, Daisuke Inoue:
Automated Detection of Malware Activities Using Nonnegative Matrix Factorization. TrustCom 2021: 548-556 - [c52]Masaki Aota, Tao Ban, Takeshi Takahashi, Noboru Murata:
Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization. TrustCom 2021: 988-996 - [c51]Akira Fujita, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
On-premises Analysis of Advanced Threat Prevention Appliances. CSET @ USENIX Security Symposium 2021: 1-8 - [c50]Tao Ban, Samuel Ndichu, Takeshi Takahashi, Daisuke Inoue:
Combat Security Alert Fatigue with AI-Assisted Techniques. CSET @ USENIX Security Symposium 2021: 9-16 - 2020
- [j14]Muhamad Erza Aminanto, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis. IEEE Access 8: 217977-217986 (2020) - [j13]Chansu Han, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Jun'ichi Takeuchi, Koji Nakao:
Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso. IEICE Trans. Inf. Syst. 103-D(10): 2113-2124 (2020) - [j12]Takeshi Takahashi, Rodrigo Roman Castro, Bilhanan Silverajan, Ryan K. L. Ko, Said Tabet:
Message from the guest editors. Int. J. Inf. Sec. 19(1): 1-2 (2020) - [j11]Tzu-Ling Wan, Tao Ban, Shin-Ming Cheng, Yen-Ting Lee, Bo Sun, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files. IEEE Open J. Comput. Soc. 1: 262-275 (2020) - [c49]Ruei-Hau Hsu, Yi-Cheng Wang, Chun-I Fan, Bo Sun, Tao Ban, Takeshi Takahashi, Ting-Wei Wu, Shang-Wei Kao:
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing. AsiaJCIS 2020: 128-136 - [c48]Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
IoT-Malware Detection Based on Byte Sequences of Executable Files. AsiaJCIS 2020: 143-150 - [c47]Masaki Aota, Hideaki Kanehara, Masaki Kubo, Noboru Murata, Bo Sun, Takeshi Takahashi:
Automation of Vulnerability Classification from its Description using Machine Learning. ISCC 2020: 1-7 - [c46]Keisuke Furumoto, Antti Kolehmainen, Bilhanan Silverajan, Takeshi Takahashi, Daisuke Inoue, Koji Nakao:
Toward Automated Smart Ships: Designing Effective Cyber Risk Management. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 100-105 - [c45]Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue:
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? RAID 2020: 93-106 - [c44]Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Cross Platform IoT- Malware Family Classification based on Printable Strings. TrustCom 2020: 775-784 - [p1]Bo Sun, Takeshi Takahashi, Lei Zhu, Tatsuya Mori:
Discovering Malicious URLs Using Machine Learning Techniques. Data Science in Cybersecurity and Cyberthreat Intelligence 2020: 33-60 - [i5]Takeshi Takahashi, Roman Danyliw, Mio Suzuki:
JSON Binding of the Incident Object Description Exchange Format. RFC 8727: 1-88 (2020)
2010 – 2019
- 2019
- [j10]Shunta Nakagawa, Tatsuya Nagai, Hideaki Kanehara, Keisuke Furumoto, Makoto Takita, Yoshiaki Shiraishi, Takeshi Takahashi, Masami Mohri, Yasuhiro Takano, Masakatu Morii:
Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description. IEICE Trans. Inf. Syst. 102-D(9): 1679-1682 (2019) - [c43]Ryutaro Ushigome, Mio Suzuki, Tao Ban, Takeshi Takahashi, Daisuke Inoue, Takeshi Matsuda, Michio Sonoda:
Establishing Trusted and Timely Information Source using Social Media Services. CCNC 2019: 1-2 - [c42]Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest. ICONIP (1) 2019: 756-765 - [c41]Tianxiang He, Chansu Han, Ryoichi Isawa, Takeshi Takahashi, Shuji Kijima, Jun'ichi Takeuchi, Koji Nakao:
A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering. ICONIP (1) 2019: 766-778 - [c40]Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest. PST 2019: 1-3 - [c39]Bo Sun, Tao Ban, Shun-Chieh Chang, Yeali S. Sun, Takeshi Takahashi, Daisuke Inoue:
A scalable and accurate feature representation method for identifying malicious mobile applications. SAC 2019: 1182-1189 - [c38]Hideaki Kanehara, Yuma Murakami, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Noboru Murata:
Real-time botnet detection using nonnegative tucker decomposition. SAC 2019: 1337-1344 - [c37]Chansu Han, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Masanori Kawakita, Jun'ichi Takeuchi, Koji Nakao:
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso. TrustCom/BigDataSE 2019: 144-151 - 2018
- [j9]Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Automatically Generating Malware Analysis Reports Using Sandbox Logs. IEICE Trans. Inf. Syst. 101-D(11): 2622-2632 (2018) - [j8]Takeshi Takahashi, Bhola Panta, Youki Kadobayashi, Koji Nakao:
Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information. Int. J. Commun. Syst. 31(3) (2018) - [c36]Ryo Iijima, Shota Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori:
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams. CCS 2018: 2222-2224 - [c35]Lei Zhu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Employ Decision Values for Soft-Classifier Evaluation with Crispy References. ICONIP (4) 2018: 392-402 - [c34]Shaoning Pang, Lei Zhu, Tao Ban, Kazushi Ikeda, Wangfei Zhang, Abdolhossein Sarrafzadeh, Takeshi Takahashi, Daisuke Inoue:
Online Max-flow Learning via Augmenting and De-augmenting Path. IJCNN 2018: 1-8 - [c33]Chalee Vorakulpipat, Takeshi Takahashi, Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, Daisuke Inoue:
Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices. ISCC 2018: 274-277 - [c32]Shun-Chieh Chang, Yeali S. Sun, Wu-Long Chuang, Meng Chang Chen, Bo Sun, Takeshi Takahashi:
ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family. PRDC 2018: 257-262 - 2017
- [j7]Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation. J. Inf. Secur. Appl. 34: 84-91 (2017) - 2016
- [j6]Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi:
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation. IEEE Trans. Emerg. Top. Comput. 4(1): 88-101 (2016) - [c31]Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM. AsiaJCIS 2016: 141-146 - [c30]Takeshi Takahashi, Tao Ban, Chin-Wei Tien, Chih-Hung Lin, Daisuke Inoue, Koji Nakao:
The Usability of Metadata for Android Application Analysis. ICONIP (1) 2016: 546-554 - [c29]Takeshi Takahashi, Daisuke Miyamoto:
Structured cybersecurity information exchange for streamlining incident response operations. NOMS 2016: 949-954 - [c28]Daisuke Miyamoto, Ryo Nakamura, Takeshi Takahashi, Yuji Sekiya:
Offloading smartphone firewalling using OpenFlow-capable wireless access points. PerCom Workshops 2016: 1-4 - [c27]Takeshi Takahashi, Daisuke Miyamoto, Koji Nakao:
Toward automated vulnerability monitoring using open information and standardized tools. PerCom Workshops 2016: 1-4 - [c26]Takeshi Takahashi, Daisuke Inoue:
Generating software identifier dictionaries from Vulnerability Database. PST 2016: 417-420 - 2015
- [j5]Takeshi Takahashi, Youki Kadobayashi:
Reference Ontology for Cybersecurity Operational Information. Comput. J. 58(10): 2297-2312 (2015) - [j4]Joona Kannisto, Takeshi Takahashi, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan:
A non-repudiable negotiation protocol for security service level agreements. Int. J. Commun. Syst. 28(15): 2067-2081 (2015) - [c25]Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
A KEM/DEM-Based Construction for Secure and Anonymous Communication. COMPSAC Workshops 2015: 680-681 - [c24]Takeshi Takahashi, Tao Ban, Takao Mimura, Koji Nakao:
Fine-Grained Risk Level Quantication Schemes Based on APK Metadata. ICONIP (3) 2015: 663-673 - 2014
- [c23]Takeshi Takahashi, Koji Nakao, Akira Kanaoka:
Data Model for Android Package Information and Its Application to Risk Analysis System. WISCS@CCS 2014: 71-80 - [c22]Yuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, Tomoya Inoue:
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. PST 2014: 48-56 - [c21]Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
Building secure and anonymous communication channel: formal model and its prototype implementation. SAC 2014: 1641-1648 - [c20]Takeshi Takahashi, Youki Kadobayashi:
Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks. ICSC 2014: 279-284 - [c19]Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Akira Kanaoka, Yuuki Takano, Shin'ichiro Matsuo:
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme. SERVICES 2014: 121-128 - [i4]Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation. CoRR abs/1403.7014 (2014) - [i3]Takeshi Takahashi, Jarmo Harju, Joona Kannisto, Bilhanan Silverajan, Shin'ichiro Matsuo:
Tailored Security: Building Nonrepudiable Security Service-Level Agreements. CoRR abs/1403.7088 (2014) - [i2]Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara:
Ontological Approach toward Cybersecurity in Cloud Computing. CoRR abs/1405.6169 (2014) - [i1]Takeshi Takahashi, Kent Landfield, Youki Kadobayashi:
An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information. RFC 7203: 1-28 (2014) - 2013
- [j3]Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Seppo Heikkinen, Bilhanan Silverajan, Marko Helenius, Shin'ichiro Matsuo:
Tailored Security: Building Nonrepudiable Security Service-Level Agreements. IEEE Veh. Technol. Mag. 8(3): 54-62 (2013) - [c18]Takeshi Takahashi, Keita Emura, Akira Kanaoka, Shin'ichiro Matsuo, Tadashi Minowa:
Risk visualization and alerting system: architecture and proof-of-concept implementation. SESP@CCS Asia 2013: 3-10 - [c17]Daisuke Miyamoto, Takeshi Takahashi:
Toward Automated Reduction of Human Errors Based on Cognitive Analysis. IMIS 2013: 820-825 - [c16]Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan:
Accountable security mechanism based on security service level agreement. ISCC 2013: 404-410 - 2012
- [c15]Takeshi Takahashi, Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo:
Enabling secure multitenancy in cloud computing: Challenges and approaches. BCFIC 2012: 72-79 - [c14]Tadashi Minowa, Takeshi Takahashi:
Secure Distributed Storage for Bulk Data. ICONIP (5) 2012: 566-575 - [c13]Eimatsu Moriyama, Takeshi Takahashi, Daisuke Miyamoto:
DNS-Based Defense against IP Spoofing Attacks. ICONIP (5) 2012: 599-609 - 2011
- [c12]Takeshi Takahashi, Youki Kadobayashi, Koji Nakao:
Toward global cybersecurity collaboration: Cybersecurity operation activity model. Kaleidoscope 2011: 1-8 - [c11]Tao Ban, Changshui Zhang, Shigeo Abe, Takeshi Takahashi, Youki Kadobayashi:
Mining interlacing manifolds in high dimensional spaces. SAC 2011: 942-949 - 2010
- [j2]Anthony M. Rutkowski, Youki Kadobayashi, Inette Furey, Damir Rajnovic, Robert Martin, Takeshi Takahashi, Craig Schultz, Gavin Reid, Gregg Schudel, Mike Hird, Stephen Adegbite:
CYBEX: the cybersecurity information exchange framework (x.1500). Comput. Commun. Rev. 40(5): 59-64 (2010) - [c10]Takeshi Takahashi, Hiroyuki Fujiwara, Youki Kadobayashi:
Building ontology of cybersecurity operational information. CSIIRW 2010: 79 - [c9]Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara:
Ontological approach toward cybersecurity in cloud computing. SIN 2010: 100-109
2000 – 2009
- 2005
- [j1]Takeshi Takahashi, Koichi Asatani, Jarmo Harju, Hideyoshi Tominaga:
Proactive Handover Scheme Based on Forwarding Router Discovery for Mobile IP Networks. IEICE Trans. Commun. 88-B(7): 2718-2725 (2005) - [c8]Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga:
Multicast source handover scheme based on proxy router discovery. BROADNETS 2005: 865-874 - [c7]Takeshi Takahashi, Jarmo Harju, Koichi Asatani, Hideyoshi Tominaga:
A routing-aware handover scheme for mobile IP. ICC 2005: 1400-1406 - [c6]Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga:
Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery. ICN (2) 2005: 859-867 - [c5]Takeshi Takahashi, Jarmo Harju, Koichi Asatani, Hideyoshi Tominaga:
Inter-domain handover scheme based on forwarding router discovery for mobile IP networks. WCNC 2005: 1409-1414 - [c4]Kentaro Dobashi, Takeshi Takahashi, Hideyoshi Tominaga:
Adaptive MAC protocol for high-load inter-vehicle communication. WiMob (3) 2005: 138-145 - 2004
- [c3]Takeshi Takahashi, Miikka Tammi, Heikki Vatiainen, Rami Lehtonen, Jarmo Harju:
Implementation and performance evaluation of multicast control protocol. ISCC 2004: 1038-1043 - 2002
- [c2]Takeshi Takahashi, Hiroyuki Kasai, Tsuyoshi Hanamura, Hideyoshi Tominaga:
Packet-multiplexing scheme in MPEG-2 multi-program transport stream transcoder. ICASSP 2002: 4178 - 2001
- [c1]Takeshi Takahashi, Hiroyuki Kasai, Tsuyoshi Hanamura, Hideyoshi Tominaga:
MPEG-2 Multi-Program Transport Stream Transcoder. ICME 2001
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint