Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kubota, Ayumu
add a person with the name Kubota, Ayumu
 

Other publications of authors with the same name

Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack., , , , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 3-18. Springer, (2019)Anonymous and analysable web browsing., , and . IPCCC, page 1-8. IEEE Computer Society, (2017)Secure Host Name Resolution Infrastructure for Overlay Networks., , and . IEICE Transactions, 89-B (9): 2434-2439 (2006)Robust ORAM: Enhancing Availability, Confidentiality and Integrity., , , , and . PRDC, page 30-39. IEEE Computer Society, (2017)Kernel-based Behavior Analysis for Android Malware Detection., , and . CIS, page 1011-1015. IEEE Computer Society, (2011)L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes., , and . GLOBECOM, IEEE, (2006)OCALA: An Architecture for Supporting Legacy Applications over Overlays., , , , , and . NSDI, USENIX, (2006): SIBRA: Scalable Internet Bandwidth Reservation Architecture., , , , , , , and . NDSS, The Internet Society, (2016)Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web., , and . AsiaJCIS, page 48-55. IEEE Computer Society, (2013)Predicting Impending Exposure to Malicious Content from User Behavior., , , , and . ACM Conference on Computer and Communications Security, page 1487-1501. ACM, (2018)