Accepted to MSR2017

Our paper got accepted to 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR 2017), which is co-located with ICSE 2017. Congrats, Watanabe-kun!

Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi and Tatsuya Mori,
Understanding the Origins of Mobile App Vulnerabilities: A Large-scale Measurement Study of Free and Paid Apps,” Proceedings of IEEE/ACM 14th International Conference on Mining Software Repositories (MSR 2017), May 2017 (acceptance rate: 27.2%=43/158) (to appear)

A full version of this paper is available as a preprint:
https://arxiv.org/abs/1702.03112

A paper accepted for publication

Our paper submitted to IEICE Transaction got accepted. This work was a joint work with the NTT labs. Congrats Kimura-kun!

Tatsuaki KIMURA, Keisuke ISHIBASHI, Tatsuya MORI, Hiroshi SAWADA, Tsuyoshi TOYONO, Ken NISHIMATSU, Akio WATANABE, Akihiro SHIMODA, Members, and Kohei SHIOMOTO,
Network Event Extraction from Log Data with Nonnegative Tensor Factorization,” IEICE Transactions on Communications, Vol.EXX-B, No.X, pp. XXX–XXX, 2017 (accepted).

An earlier version of this work was presented at IEEE INFOCOM 2014.

Accepted to IEEE ICC 2017

Our paper submitted to IEEE International Conference on Communications (ICC 2017) got accepted. Congrats Mizuno-kun!

S. Mizuno, M. Hatada, T. Mori, and S. Goto,
BotDetector: A robust and scalable approach toward detecting malware-infected devices,” Proceedings of the IEEE International Conference on Communications (ICC 2017), May 2017 (acceptance rate, ICC CISS: 30.5%=84/275) (to appear).

Screen Shot 2017-01-29 at 10.32.18

Accepted to Elsevier Computers & Security

Our paper submitted to Elsevier Computers & Security got accepted. This work was done by Dr. Mitsuaki Akiyama, NTT Network Technology Labs. Congrats Akiyama-san!

M. Akiyama, T. Yagi, T. Yada, T. Mori, and Y. Kadobayashi,
Analyzing the Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots,”
Elsevier Computers & Security, vol. xx, issue xx, xx 2017, Pages xxxx–xxxx [online version] (in press)