The Uncontrolled Web: Measuring Security Governance on the Web
TAKATA, Yuta, KUMAGAI, Hiroshi, KAMIZONO, Masaki
Published in IEICE Transactions on Information and Systems (01.11.2021)
Published in IEICE Transactions on Information and Systems (01.11.2021)
Get full text
Journal Article
Analysis of Privacy Compliance by Classifying Multiple Policies on the Web
Mori, Keika, Nagai, Tatsuya, Takata, Yuta, Kamizono, Masaki
Published in 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (01.01.2022)
Published in 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (01.01.2022)
Get full text
Conference Proceeding
Risk Analysis of Cookie Sharing by Link Decoration and CNAME Cloaking
Takata, Yuta, Ito, Daiki, Kumagai, Hiroshi, Kamizono, Masaki
Published in Journal of Information Processing (2021)
Published in Journal of Information Processing (2021)
Get full text
Journal Article
4-1 NIRVANA-Kai: A Real-time Visual SIEM System Against Targeted Attacks
Tsuda, Yu, Kanaya, Nobuyuki, Tomine, Takashi, Kamizono, Masaki, Jingu, Masato, Takagi, Yaichiro, Suzuki, Koei
Published in Journal of the National Institute of Information and Communications Technology (01.03.2017)
Get full text
Published in Journal of the National Institute of Information and Communications Technology (01.03.2017)
Journal Article
4-1 NIRVANA-Kai: A Real-time Visual SIEM System Against Targeted Attacks
Tsuda, Yu, Kanaya, Nobuyuki, Tomine, Takashi, Kamizono, Masaki, Jingu, Masato, Takagi, Yaichiro, Suzuki, Koei
Published in Journal of the National Institute of Information and Communications Technology (2017)
Published in Journal of the National Institute of Information and Communications Technology (2017)
Get full text
Journal Article
NIRVANA-Kai: A Real-time Visual SIEM System Against Targeted Attacks
Tsuda, Yu, Kanaya, Nobuyuki, Tomine, Takashi, Kamizono, Masaki, Jingu, Masato, Takagi, Yaichiro, Suzuki, Koei
Published in Journal of the National Institute of Information and Communications Technology (01.01.2016)
Get full text
Published in Journal of the National Institute of Information and Communications Technology (01.01.2016)
Journal Article
Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs
Ito, Daiki, Takata, Yuta, Kamizono, Masaki
Published in 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA) (01.12.2022)
Published in 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA) (01.12.2022)
Get full text
Conference Proceeding
A Trust Service Model Adaptable to Various Assurance Levels by Linking Digital IDs and Certificates
Hayata, Junichiro, Nomura, Kenta, Takata, Yuta, Kumagai, Hiroshi, Kamizono, Masaki, Kono, Tsuyoshi, Maeda, Yoshihiro, Fukuda, Naohisa
Published in 2024 8th International Conference on Cryptography, Security and Privacy (CSP) (20.04.2024)
Published in 2024 8th International Conference on Cryptography, Security and Privacy (CSP) (20.04.2024)
Get full text
Conference Proceeding
Decoy-File-Based Deception without Usability Degradation
Aoike, Yu, Kamizono, Masaki, Eto, Masashi, Matsumoto, Noriko, Yoshida, Norihiko
Published in 2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (08.12.2021)
Published in 2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (08.12.2021)
Get full text
Conference Proceeding
Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System
Hirotomo, Masanori, Nishio, Yuya, Kamizono, Masaki, Fukuta, Youji, Mohri, Masami, Shiraishi, Yoshiaki
Published in 2017 12th Asia Joint Conference on Information Security (AsiaJCIS) (01.08.2017)
Published in 2017 12th Asia Joint Conference on Information Security (AsiaJCIS) (01.08.2017)
Get full text
Conference Proceeding