default search action
Ayumu Kubota
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c43]Norihiro Okui, Masataka Nakahara, Ayumu Kubota:
Survey and Experimentation to Compare IoT Device Model Identification Methods. WoWMoM 2025: 13-17 - 2024
- [c42]Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai:
Extension of Resource Authorization Method with SSI in Edge Computing. AINA (6) 2024: 385-394 - [c41]Shayan Azizi, Norihiro Okui, Masataka Nakahara, Ayumu Kubota, Gustavo Batista, Hassan Habibi Gharakheili:
Poster: Understanding and Managing Changes in IoT Device Behaviors for Reliable Network Traffic Inference. SIGCOMM (Posters and Demos) 2024: 25-27 - [i4]Naoto Watanabe, Taku Yamazaki, Takumi Miyoshi, Ryo Yamamoto, Masataka Nakahara, Norihiro Okui, Ayumu Kubota:
Self-adaptive Traffic Anomaly Detection System for IoT Smart Home Environments. CoRR abs/2403.02744 (2024) - 2023
- [j6]Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake, Ayumu Kubota:
Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data. Enterp. Inf. Syst. 17(9) (2023) - [j5]Arman Pashamokhtari, Norihiro Okui, Masataka Nakahara, Ayumu Kubota, Gustavo Batista, Hassan Habibi Gharakheili:
Dynamic Inference From IoT Traffic Flows Under Concept Drifts in Residential ISP Networks. IEEE Internet Things J. 10(17): 15761-15773 (2023) - [c40]Ryu Watanabe, Ayumu Kubota, Jun Kurihara:
Application of Generalized Deduplication Techniques in Edge Computing Environments. AINA (3) 2023: 585-596 - [c39]Norihiro Okui, Yusuke Akimoto, Ayumu Kubota, Takuya Yoshida:
A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow Data. COMPSAC 2023: 1017-1018 - [c38]Tomoyuki Ueda, Amgad Saif, Sumiko Miyata, Masataka Nakahara, Ayumu Kubota:
A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load. ICCE-Berlin 2023: 68-69 - [c37]Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota, Jumpei Urakawa:
Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert. ICISSP 2023: 313-320 - [i3]Arman Pashamokhtari, Norihiro Okui, Masataka Nakahara, Ayumu Kubota, Gustavo Batista, Hassan Habibi Gharakheili:
Quantifying and Managing Impacts of Concept Drifts on IoT Traffic Inference in Residential ISP Networks. CoRR abs/2301.06695 (2023) - 2022
- [c36]Ryu Watanabe, Ayumu Kubota, Jun Kurihara:
Resource Authorization Methods for Edge Computing. AINA (1) 2022: 167-179 - [c35]Norihiro Okui, Masataka Nakahara, Yutaka Miyake, Ayumu Kubota:
Identification of an IoT Device Model in the Home Domain Using IPFIX Records. COMPSAC 2022: 583-592 - [c34]Takayuki Nishio, Masataka Nakahara, Norihiro Okui, Ayumu Kubota, Yasuaki Kobayashi, Keizo Sugiyama, Ryoichi Shinkuma:
Anomaly Traffic Detection with Federated Learning toward Network-based Malware Detection in IoT. GLOBECOM 2022: 299-304 - [c33]Akira Yamada, Kyle Crichton, Yukiko Sawaya, Jin-Dong Dong, Sarah Pearman, Ayumu Kubota, Nicolas Christin:
On recruiting and retaining users for security-sensitive longitudinal measurement panels. SOUPS @ USENIX Security Symposium 2022: 347-366 - 2021
- [j4]Tran Phuong Thao, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan, Ayumu Kubota, Shinsaku Kiyomoto, Kazumasa Omote:
Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data. IEEE Trans. Big Data 7(4): 703-716 (2021) - [c32]Ayane Sano, Yukiko Sawaya, Akira Yamada, Ayumu Kubota:
SeBeST: Security Behavior Stage Model and Its Application to OS Update. AINA (2) 2021: 552-566 - [c31]Shoma Tanaka, Takashi Matsunaka, Akira Yamada, Ayumu Kubota:
Phishing Site Detection Using Similarity of Website Structure. DSC 2021: 1-8 - [c30]Ayane Sano, Yukiko Sawaya, Akira Yamada, Ayumu Kubota, Takamasa Isohara:
Designing Personalized OS Update Message based on Security Behavior Stage Model. PST 2021: 1-9 - 2020
- [c29]Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Ayumu Kubota, Tran Van Sang, Rie Shigetomi Yamaguchi:
Human Factors in Homograph Attack Recognition. ACNS (2) 2020: 408-435
2010 – 2019
- 2019
- [c28]Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota:
Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack. SEC 2019: 3-18 - [c27]Satomi Kaneko, Akira Yamada, Yukiko Sawaya, Tran Phuong Thao, Ayumu Kubota, Kazumasa Omote:
Detecting Malicious Websites by Query Templates. SECITC 2019: 65-77 - [i2]Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Ayumu Kubota:
Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition. CoRR abs/1904.10595 (2019) - 2018
- [c26]Mahmood Sharif, Jumpei Urakawa, Nicolas Christin, Ayumu Kubota, Akira Yamada:
Predicting Impending Exposure to Malicious Content from User Behavior. CCS 2018: 1487-1501 - [c25]Jesse Elwell, Angelo Sapello, Alexander Poylisher, Giovanni Di Crescenzo, Abhrajit Ghosh, Ayumu Kubota, Takashi Matsunaka:
Runtime Attestation for IAAS Clouds. CLOSER 2018: 233-247 - 2017
- [c24]Yukiko Sawaya, Mahmood Sharif, Nicolas Christin, Ayumu Kubota, Akihiro Nakarai, Akira Yamada:
Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior. CHI 2017: 2202-2214 - [c23]Angelo Sapello, C. Jason Chiang, Jesse Elwell, Abhrajit Ghosh, Ayumu Kubota, Takashi Matsunaka:
ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System. CLOSER 2017: 191-200 - [c22]Tran Phuong Thao, Adetokunbo Makanju, Ayumu Kubota:
Anonymous and analysable web browsing. IPCCC 2017: 1-8 - [c21]Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Ayumu Kubota:
Robust ORAM: Enhancing Availability, Confidentiality and Integrity. PRDC 2017: 30-39 - [c20]Tran Phuong Thao, Akira Yamada, Kosuke Murakami, Jumpei Urakawa, Yukiko Sawaya, Ayumu Kubota:
Classification of Landing and Distribution Domains Using Whois' Text Mining. TrustCom/BigDataSE/ICESS 2017: 1-8 - 2016
- [j3]Keisuke Takemori, Seiichiro Mizoguchi, Hideaki Kawabata, Ayumu Kubota:
In-Vehicle Network Security Using Secure Element. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 208-216 (2016) - [c19]Jumpei Urakawa, Cristina Basescu, Kohei Sugiyama, Christos Pappas, Akira Yamada, Ayumu Kubota, Adrian Perrig:
On the implementation of path-based dynamic pricing in edge-directed routing. APCC 2016: 254-260 - [c18]Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai:
A Comprehensive Security Analysis Checksheet for OpenFlow Networks. BWCCA 2016: 231-242 - [c17]Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa:
SIBRA: Scalable Internet Bandwidth Reservation Architecture. NDSS 2016 - 2015
- [c16]Shun Kurihara, Shoki Fukuda, Saneyasu Yamaguchi, Ayano Koyanagi, Masato Oguchi, Ayumu Kubota, Akihiro Nakarai:
A study on identifying battery-draining Android applications in screen-off state. GCCE 2015: 603-604 - [i1]Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa:
SIBRA: Scalable Internet Bandwidth Reservation Architecture. CoRR abs/1510.02696 (2015) - 2014
- [c15]Abhrajit Ghosh, Angelo Sapello, Alexander Poylisher, C. Jason Chiang, Ayumu Kubota, Takashi Matsunaka:
On the Feasibility of Deploying Software Attestation in Cloud Environments. IEEE CLOUD 2014: 128-135 - [c14]Takashi Matsunaka, Ayumu Kubota, Takahiro Kasama:
An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors. AsiaJCIS 2014: 19-25 - [c13]Keisuke Takemori, Toshiki Matsui, Hideaki Kawabata, Ayumu Kubota:
Ephemeral UUID for Protecting User Privacy in Mobile Advertisements. DEXA (2) 2014: 263-272 - 2013
- [c12]Takashi Matsunaka, Akira Yamada, Ayumu Kubota:
Passive OS Fingerprinting by DNS Traffic Analysis. AINA 2013: 243-250 - [c11]Takashi Matsunaka, Junpei Urakawa, Ayumu Kubota:
Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web. AsiaJCIS 2013: 48-55 - [c10]Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Junya Kani, Harunobu Agematsu, Masakatsu Nishigaki:
SanAdBox: Sandboxing third party advertising libraries in a mobile application. ICC 2013: 2150-2154 - 2012
- [c9]Yukiko Sawaya, Ayumu Kubota, Akira Yamada:
Understanding the time-series behavioral characteristics of evolutionally advanced email spammers. AISec 2012: 71-80 - [c8]Ravichander Vaidyanathan, Abhrajit Ghosh, Yukiko Sawaya, Ayumu Kubota:
On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic. ICNC 2012: 1-6 - 2011
- [c7]Takamasa Isohara, Keisuke Takemori, Ayumu Kubota:
Kernel-based Behavior Analysis for Android Malware Detection. CIS 2011: 1011-1015 - [c6]Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake:
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. SAINT 2011: 353-359
2000 – 2009
- 2009
- [j2]Akira Yamada, Ayumu Kubota, Yutaka Miyake, Kazuo Hashimoto:
Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation. IEICE Trans. Inf. Syst. 92-D(10): 1961-1970 (2009) - [c5]Ayumu Kubota, Yutaka Miyake:
Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking. ICC 2009: 1-6 - 2008
- [c4]Akira Yamada, Ayumu Kubota, Yutaka Miyake:
Service Independent Access Control Architecture for User Generated Content (UGC). Security and Management 2008: 220-226 - 2006
- [j1]Ayumu Kubota, Yutaka Miyake, Toshiaki Tanaka:
Secure Host Name Resolution Infrastructure for Overlay Networks. IEICE Trans. Commun. 89-B(9): 2434-2439 (2006) - [c3]Ayumu Kubota, Akira Yamada, Yutaka Miyake:
L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes. GLOBECOM 2006 - [c2]Dilip Antony Joseph, Jayanthkumar Kannan, Ayumu Kubota, Karthik Lakshminarayanan, Ion Stoica, Klaus Wehrle:
OCALA: An Architecture for Supporting Legacy Applications over Overlays. NSDI 2006 - 2003
- [c1]Yuichiro Hei, Ayumu Kubota, Takao Hotta, Katsuyuki Yamazaki:
Open 6to4 Relay Router Operation. SAINT Workshops 2003: 266-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint