Tatsuya MORI


Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
Keika MORI Takuya WATANABE Yunao ZHOU Ayako AKIYAMA HASEGAWA Mitsuaki AKIYAMA Tatsuya MORI 
Publication:   
Publication Date: 2020/07/01
Vol. E103-D  No. 7  pp. 1541-1555
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network and System Security
Keyword: 
user authenticationpassword securitycross-cultural analysis
 Summary | Full Text:PDF

Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library
Takuya WATANABE Mitsuaki AKIYAMA Fumihiro KANEI Eitaro SHIOJI Yuta TAKATA Bo SUN Yuta ISHII Toshiki SHIBAHARA Takeshi YAGI Tatsuya MORI 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2  pp. 276-291
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category: Network Security
Keyword: 
mobile appsoftware libraryvulnerability
 Summary | Full Text:PDF

Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel
Takuya WATANABE Eitaro SHIOJI Mitsuaki AKIYAMA Keito SASAOKA Takeshi YAGI Tatsuya MORI 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2  pp. 239-255
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category: Network Security
Keyword: 
web security and privacyside channeluser identification
 Summary | Full Text:PDF

CLAP: Classification of Android PUAs by Similarity of DNS Queries
Mitsuhiro HATADA Tatsuya MORI 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2  pp. 265-275
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category: Network Security
Keyword: 
PUAPUPpotentially unwantedDNS queryclassification
 Summary | Full Text:PDF

Automatically Generating Malware Analysis Reports Using Sandbox Logs
Bo SUN Akinori FUJINO Tatsuya MORI Tao BAN Takeshi TAKAHASHI Daisuke INOUE 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2622-2632
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network Security
Keyword: 
sandbox logsmalware analysisautomated report generatingnatural language processing
 Summary | Full Text:PDF

Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps
Takuya WATANABE Mitsuaki AKIYAMA Tetsuya SAKAI Hironori WASHIZAKI Tatsuya MORI 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2584-2599
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Mobile Application and Web Security
Keyword: 
mobile securityandroidtextual descriptionprogram analysisprivacy leakage
 Summary | Full Text:PDF

Detecting Malware-Infected Devices Using the HTTP Header Patterns
Sho MIZUNO Mitsuhiro HATADA Tatsuya MORI Shigeki GOTO 
Publication:   
Publication Date: 2018/05/01
Vol. E101-D  No. 5  pp. 1370-1379
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
botnet detectionmalicious trafficHTTP headerautomatic template generation
 Summary | Full Text:PDF

Network Event Extraction from Log Data with Nonnegative Tensor Factorization
Tatsuaki KIMURA Keisuke ISHIBASHI Tatsuya MORI Hiroshi SAWADA Tsuyoshi TOYONO Ken NISHIMATSU Akio WATANABE Akihiro SHIMODA Kohei SHIOMOTO 
Publication:   
Publication Date: 2017/10/01
Vol. E100-B  No. 10  pp. 1865-1878
Type of Manuscript:  PAPER
Category: Network Management/Operation
Keyword: 
network managementsyslognonnegative tensor factorization (NTF)
 Summary | Full Text:PDF

Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study
Yumehisa HAGA Yuta TAKATA Mitsuaki AKIYAMA Tatsuya MORI 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1663-1670
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Privacy
Keyword: 
web trackingweb browser fingerprint
 Summary | Full Text:PDF

Finding New Varieties of Malware with the Classification of Network Behavior
Mitsuhiro HATADA Tatsuya MORI 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1691-1702
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Program Analysis
Keyword: 
malware communication modelclustering analysisnetwork behavior classificationnew varieties of malware
 Summary | Full Text:PDF

Tracking the Human Mobility Using Mobile Device Sensors
Takuya WATANABE Mitsuaki AKIYAMA Tatsuya MORI 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1680-1690
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Privacy
Keyword: 
mobile securityside-channel attacklocation identification
 Summary | Full Text:PDF

APPraiser: A Large Scale Analysis of Android Clone Apps
Yuta ISHII Takuya WATANABE Mitsuaki AKIYAMA Tatsuya MORI 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1703-1713
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Program Analysis
Keyword: 
mobile securityAndroidrepackaginglarge-scale data
 Summary | Full Text:PDF

Traffic Anomaly Detection Based on Robust Principal Component Analysis Using Periodic Traffic Behavior
Takahiro MATSUDA Tatsuya MORITA Takanori KUDO Tetsuya TAKINE 
Publication:   
Publication Date: 2017/05/01
Vol. E100-B  No. 5  pp. 749-761
Type of Manuscript:  PAPER
Category: Network
Keyword: 
principal component analysis (PCA)outlierrobust PCAanomaly detectionminimum covariance determinant (MCD)
 Summary | Full Text:PDF

Automating URL Blacklist Generation with Similarity Search Approach
Bo SUN Mitsuaki AKIYAMA Takeshi YAGI Mitsuhiro HATADA Tatsuya MORI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 873-882
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Web security
Keyword: 
drive-by-downloadURL blacklistsearch spacemachine learningweb client honeypot
 Summary | Full Text:PDF

Optimally Identifying Worm-Infected Hosts
Noriaki KAMIYAMA Tatsuya MORI Ryoichi KAWAHARA Shigeaki HARADA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/08/01
Vol. E96-B  No. 8  pp. 2084-2094
Type of Manuscript:  PAPER
Category: Network Management/Operation
Keyword: 
wormdetectionsamplingoptimum design
 Summary | Full Text:PDF

A Resilient Forest-Based Application Level Multicast for Real-Time Streaming
Kazuya TAKAHASHI Tatsuya MORI Yusuke HIROTA Hideki TODE Koso MURAKAMI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/07/01
Vol. E96-B  No. 7  pp. 1874-1885
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
Application Level Multicast (ALM)forest-basedisolationreal-time streamingresilient
 Summary | Full Text:PDF

Multicast Pre-Distribution VoD System
Noriaki KAMIYAMA Ryoichi KAWAHARA Tatsuya MORI Haruhisa HASEGAWA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/06/01
Vol. E96-B  No. 6  pp. 1459-1471
Type of Manuscript:  PAPER
Category: Network
Keyword: 
rich contentCDNISP
 Summary | Full Text:PDF

Optimally Designing ISP-Operated CDN
Noriaki KAMIYAMA Tatsuya MORI Ryoichi KAWAHARA Haruhisa HASEGAWA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/03/01
Vol. E96-B  No. 3  pp. 790-801
Type of Manuscript:  PAPER
Category: Network
Keyword: 
content deliveryCDNISP
 Summary | Full Text:PDF

Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data
Yasuhiro IKEDA Ryoichi KAWAHARA Noriaki KAMIYAMA Tatsuaki KIMURA Tatsuya MORI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/02/01
Vol. E96-B  No. 2  pp. 533-542
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
QoStraffic measurementTCP
 Summary | Full Text:PDF

Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-Distribution VoD
Noriaki KAMIYAMA Ryoichi KAWAHARA Tatsuya MORI Haruhisa HASEGAWA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/01/01
Vol. E96-B  No. 1  pp. 143-154
Type of Manuscript:  PAPER
Category: Network
Keyword: 
VoDcontent distributionmulticast
 Summary | Full Text:PDF

Traffic Engineering of Peer-Assisted Content Delivery Network with Content-Oriented Incentive Mechanism
Naoya MAKI Takayuki NISHIO Ryoichi SHINKUMA Tatsuya MORI Noriaki KAMIYAMA Ryoichi KAWAHARA Tatsuro TAKAHASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/12/01
Vol. E95-D  No. 12  pp. 2860-2869
Type of Manuscript:  Special Section PAPER (Special Section on Parallel and Distributed Computing and Networking)
Category: Network and Communication
Keyword: 
content delivery networkpeer-assisted networkcontents combinationscombining contentstraffic localization
 Summary | Full Text:PDF

Analyzing and Reducing the Impact of Traffic on Large-Scale NAT
Ryoichi KAWAHARA Tatsuya MORI Takeshi YADA Noriaki KAMIYAMA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/09/01
Vol. E95-B  No. 9  pp. 2815-2827
Type of Manuscript:  PAPER
Category: Network
Keyword: 
large scale NATnumber of active flowstraffic measurement
 Summary | Full Text:PDF

Extended Darknet: Multi-Dimensional Internet Threat Monitoring System
Akihiro SHIMODA Tatsuya MORI Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/06/01
Vol. E95-B  No. 6  pp. 1915-1923
Type of Manuscript:  Special Section PAPER (Special Section on Towards Management for Future Networks and Services)
Category: 
Keyword: 
darknetmulti-dimensional monitoringInternet threatsensor
 Summary | Full Text:PDF

Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability
Keisuke ISHIBASHI Ryoichi KAWAHARA Tatsuya MORI Tsuyoshi KONDOH Shoichiro ASANO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/02/01
Vol. E95-B  No. 2  pp. 466-476
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
anomaly detectionsamplingspatio/temporal granularityhurst parameter
 Summary | Full Text:PDF

Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection
Keisuke ISHIBASHI Tatsuya MORI Ryoichi KAWAHARA Yutaka HIROKAWA Atsushi KOBAYASHI Kimihiro YAMAMOTO Hitoaki SAKAMOTO Shoichiro ASANO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/05/01
Vol. E91-B  No. 5  pp. 1331-1339
Type of Manuscript:  Special Section PAPER (Special Section on Communication Quality)
Category: Measurement Methodology for Network Quality Such as IP, TCP and Routing
Keyword: 
cardinalityanomaly detectiondata stream
 Summary | Full Text:PDF

Packet Sampling TCP Flow Rate Estimation and Performance Degradation Detection Method
Ryoichi KAWAHARA Tatsuya MORI Keisuke ISHIBASHI Noriaki KAMIYAMA Hideaki YOSHINO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/05/01
Vol. E91-B  No. 5  pp. 1309-1319
Type of Manuscript:  Special Section PAPER (Special Section on Communication Quality)
Category: Measurement Methodology for Network Quality Such as IP, TCP and Routing
Keyword: 
packet samplingTCP performanceflow measurement
 Summary | Full Text:PDF

Identifying Heavy-Hitter Flows from Sampled Flow Statistics
Tatsuya MORI Tetsuya TAKINE Jianping PAN Ryoichi KAWAHARA Masato UCHIDA Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/11/01
Vol. E90-B  No. 11  pp. 3061-3072
Type of Manuscript:  Special Section PAPER (Special Section on Next Generation Network Management)
Category: 
Keyword: 
network measurementpacket samplingflow statisticsa priori distributionBayes' theorem
 Summary | Full Text:PDF

Method of Bandwidth Dimensioning and Management for Aggregated TCP Flows with Heterogeneous Access Links
Ryoichi KAWAHARA Keisuke ISHIBASHI Tatsuya MORI Toshihisa OZAWA Takeo ABE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/12/01
Vol. E88-B  No. 12  pp. 4605-4615
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
TCP performanceprocessor-sharing modelheterogeneous access linksbandwidth dimensioning and management
 Summary | Full Text:PDF

On the Characteristics of Internet Traffic Variability: Spikes and Elephants
Tatsuya MORI Ryoichi KAWAHARA Shozo NAITO Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/12/01
Vol. E87-D  No. 12  pp. 2644-2653
Type of Manuscript:  Special Section PAPER (Special Section on New Technologies and their Applications of the Internet)
Category: Traffic Measurement and Analysis
Keyword: 
measurementanalysistrafficspikeselephant flow
 Summary | Full Text:PDF

Active Noise Control System in a Duct with Partial Feedback Canceller
Takuya AOKI Tatsuya MORISHITA Toshiyuki TANAKA Masao TAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/02/01
Vol. E84-A  No. 2  pp. 400-405
Type of Manuscript:  Special Section PAPER (Special Section on Noise Cancellation and Reduction Techniques)
Category: Active Noise Control
Keyword: 
active noise controlacoustic feedbackreflectionduct
 Summary | Full Text:PDF