Journal Papers

Since 2013.

[Google Scholar][DBLP][Microsoft Academic Search]

  1. Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, Akira Kanaoka, “Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps,” Journal of Information Processing (JIP) Vol. 27, pp. 593-602, September 2019 [PDF]
  2. Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, and Daisuke Inoue, “Automatically Generating Malware Analysis Reports Using Sandbox Logs,” IEICE Transactions on Information and Systems, Vol. E101-D, No. 11, pp. 2622–2632, November 2018. [PDF]
  3. T. Watanabe, M. Akiyama, T. Sakai, H. Washizaki, and T. Mori, “Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps,” IEICE Transactions on Information and Systems, Vol. Vol.E101-D, No. 11, pp. 2584–2599, November 2018. [PDF]
  4. 長谷川 彩子, 秋山 満昭, 八木 毅, 森 達哉, “オンラインオークションにおける購入履歴漏洩のリスクとユーザ認識の調査,” 情報処理学会論文誌, Vol. 59, No. 9, pp. 1689–1698, 2018年9月 [PDF]
  5. D. Chiba, M. Akiyama, T. Yagi, K. Hato, T. Mori, and S. Goto, “DomainChroma: Building Actionable Threat Intelligence from Malicious Domain Names,” Elsevier Computers & Security, Volume 77, Pages 138-161, August 2018 [PDF]
  6. S. Mizuno, M. Hatada, T. Mori, and S. Goto, “Detecting Malware-infected Devices Using the HTTP Header Patterns,” IEICE Transactions on Information and Systems, Vol. E101-D, No.5, pp.1370-1379, May. 2018. [PDF]
  7. B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori, “PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store,” Journal of Information Processing (JIP), vol. 26, pp. 212-223, April 2018 https://doi.org/10.2197/ipsjjip.26.212
  8. D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Mori, and S. Goto, “DomainProfiler: Towards Accurate and Early Discovery of Domain Names Abused in Future,” International Journal of Information Security, Volume 17, Issue 6, pp 661–680, 2018 [PDF] DOI:10.1007/s10207-017-0396-7
  9. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, “Network Event Extraction from Log Data with Nonnegative Tensor Factorization,” IEICE Transactions on Communications, Vol.E100-B, No.10, pp.1865-1878, Oct. 2017.
  10. M. Hatada and T. Mori, “Finding New Varieties of Malware with the Classification of Network Behavior,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1691–1702, Aug. 2017 [PDF]
  11. T. Watanabe, M. Akiyama, and T. Mori, “Tracking the Human Mobility Using Mobile Device Sensors,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1680–1690, Aug. 2017 [PDF]
  12. Y. Haga, Y. Takata, M. Akiyama, and T. Mori, “Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study,” IEICE Transactions on Information and Systems, Vol. 100-D, No.
    8, pp. 1663–1670, Aug. 2017 [PDF]
  13. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “APPraiser: A large scale analysis of Android clone apps,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1703–1713, Aug. 2017 [PDF]
  14. M. Akiyama, T. Yagi, T. Yada, T. Mori, and Y. Kadobayashi, “Analyzing the Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots,” Elsevier Computers & Security, vol. 69, pp. 155–173, Aug. 2017 [abstract]
  15. 衣川昌宏,林優一,森達哉 “意図的な電磁妨害時にハードウェアトロイよって引き起こされる情報漏えい評価” 電気学会論文誌A,Vol. 137, No. 3, pp. 153–157, 2017年3月 [JSTAGE]
  16. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto, “Statistical Estimation of the Names of HTTPS Servers with Domain Name Graphs,” Computer Communications, Volume 94, Pages 104–113, November 2016. [abstract]
  17. B. Sun, M. Akiyama, T. Yagi, M. Hatada, and T. Mori, “Automating URL Blacklist Generation with Similarity Search Approach,” IEICE Transactions on Information and Systems, Vol.E99-D, No.4, pp. 873–882, April 2016 [IEICE].
  18. Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto: Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. Journal of Information Processing 21(3): 539-550 (2013) [PDF][bibtex]