1. Tan Omiya, Daisuke Miyamoto, Youki Kadobayashi, "Proposal of Cyber Security Game Practice Tool Secure-One", Transactions of Information Processing Society of Japan (Accepted) (in Japanese)
  2. Masayuki Jimichi, Daisuke Miyamoto, Chika Saka, Shuichi Nagata, "Visualization and Statistical Modeling of Financial Big Data: Double-Log Modeling with Skew-Symmetric Error Distributions", Springer, Japanese Journal of Statistics and Data Science. (Accepted)
  3. Ady Wahyudi Paundu, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi, "Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment", Security and Communication Networks, Vol. 2018, February 2018.
  4. Daisuke Miyamoto, Takuji Iimura, "PACKTER: implementation of Internet traffic visualizer and extension for network forensics," Springer, Journal of Computing, Vol. 96, Issue 1, pp.79-80, January 2014. [ (online available) ]
  5. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, Takeshi Takahashi, "Behind HumanBoost: Analysis of Users' Trust Decision Patterns for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications, Vol. 4, No.4, pp.319-329, November 2012. [ (online available) ]
  6. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, "HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications, Vol. 2, No. 4, pp.190-199, December 2010. [ (online available) ]
  7. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, "An Evaluation of Machine Learning-based Methods for Detection of Phishing Sites," Australian Journal of Intelligent Information Processing Systems, Vol. 10, No. 2, pp.54-63, November 2008. [ (camera ready version) ]
  8. Suzuki Mio, Hiroaki Hazeyama, Daisuke Miyamoto, Shinsuke Miwa, Youki Kadobayashi, "Expediting experiments across testbeds with AnyBed: a testbed-independent topology configuration system and its tool set," IEICE Transactions on Information and System, Vol. E92-D, No. 10, pp. 1877-1887, October 2009.
  1. Nissy Sombatruang, Youki Kadobayashi, Angela Sasse, Michelle Baddeley, Daisuke Miyamoto, "The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan", In Proceedings of the 16th Annual Conference on Privacy, Security and Trust, August 2018.
  2. Andrew M'Manga, Shamal Faily, John Mcalaney, Chris Williams, Youki Kadobayashi, Daisuke Miyamoto, "Eliciting Persona Characteristics for Risk Based Decision Making", In Proceedings of the 32nd British Human Computer Interaction Conference (Poster Session), July, 2018.
  3. Andrew M'Manga, Shamal Faily, John Mcalaney, Chris Williams, Youki Kadobayashi, Daisuke Miyamoto, "Qualitative Adaptation: Informing Design for Risk-based Decision Making", In Proceedings of the 2nd Workshop on the Challenges and Opportunities for Qualitative Data Research Methods in HCI, July, 2018.
  4. Ryo Nakamura, Yuji Sekiya, Daisuke Miyamoto, Kazuya Okada, Tomohiro Ishihara, “Malicious Host Detection by Imaging SYN Packets and A Neural Network”, In Proceedings of the 2018 International Symposium on Networks, Computers and Communications (ISNCC): Trust, Security and Privacy, June, 2018.
  5. Keiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi, "Classification of URL bitstreams using Bag of Bytes", In Proceeding of the first International Workshop on Network Intelligence (NI2018), February 2018.
  6. Masayuki Jimichi, Daisuke Miyamoto, Chika Saka, Syuichi Nagata, "Visualization And Statistical Modeling Of Financial Big Data", In Proceedings of the International Association of Statistical Computing (Asian Regional Society) and New Zealand Statistical Association (NZSA) Conference & Workshops, December 2017.
  7. Masatoshi Enomoto, Tomoya Inoue, Kunio Akashi, Shisuke Miwa, Toshiyuki Miyachi, Daisuke Miyamoto, "Ditto subsystem : A case study for building an experiment environment in StarBED using TopDL", In Proceedings of European Conference on Electrical Engineering & Computer Science, November 2017.
  8. Keiichi Shima, Hiroshi Abe, Daisuke Miyamotoi, Tomohiro Ishihara, Kazuya Okada and Yuji Sekiya, "URL Classification using BoF of URL bitstream", In Proceedings of the 12th International Conference on Future Internet Technologies (CFI), June 2017.
  9. Hiroshi Abe, Keiichi Shima, Yuji Sekiya, Daisuke Miyamoto, Tomohiro Ishihara and Kazuya Okada, "Hayabusa: A Simple and Fast Full-Text Search Engine for Massive System Log Data", In Proceedings of the 12th International Conference on Future Internet Technologies (CFI), June 2017.
  10. Takeshi Takahashi, Daisuke Miyamoto, "Structured Cybersecurity Information Exchange for Streamlining Incident Response Operations", In Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS), April 2016.
  11. Daisuke Miyamoto, Ryo Nakamura, Yuji Sekiya, Takeshi Takahashi, "Offloading Smartphone Firewalling Using OpenFlow-capable Wireless Access Points," In Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom WIP session), March 2016. [ PDF ]
  12. Takeshi Takahashi, Daisuke Miyamoto, Koji Nakao, "Toward Automated Vulnerability Monitoring Using Open Information and Standardized Tools," In Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom WIP Session), March 2016.
  13. Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi, "Eye Can Tell: On the Correlation between Eye Movement and Phishing Identification," In Proceedings of the 22nd International Conference on Neural Information Processing of the Asia-Pacific Neural Network Assembly (ICONIP), November 2015. [ PDF ]
  14. Daisuke Miyamoto, Yasuhiro Yamamoto, Masaya Nakayama, "Text mining-based Approach for Estimating Vulnerability Score," In Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), November 2015. [ PDF ]
  15. Ayumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki, "INTERCEPT+: SDN Support for Live Migration-based Honeypots," In Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), November 2015.
  16. Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi, "AJNA : Anti-phishing JS-based visual aNAlysis to Mitigate Users’ Excessive Trust in SSL/TLS," In Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), November 2015.
  17. Fei Han, Daisuke Miyamoto, Yasushi Wakahara, "RTOB: a TDMA-based MAC Protocol to Achieve High Reliability of One-hop Broadcast in VANET," In Proceedings of the 12th IEEE Workshop on Managing Ubiquitous Communications and Services (MUCS), March 2015.
  18. Daisuke Miyamoto, Takuji Iimura, Hajime Tazaki, Gregory Blanc, Youki Kadobayashi, "EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits," In Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014. [ PDF ]
  19. Takuji Iimura, Daisuke Miyamoto, Hajime Tazaki, Youki Kadobayashi, "NECOMAtter: Curating Approach for Sharing Cyber Threat Information," In Proceedings of the 9th International Conference on Future Internet Technologies (CFI, poster session), June 2014.[ PDF ]
  20. Daisuke Miyamoto, Satoru Teramura, Masaya Nakayama, "INTERCEPT: High-interaction Server-type Honeypot based on Live Migration," In Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (SimuTools), March 2014. [ PDF ]
  21. Daisuke Miyamoto, Takeshi Takahashi, "Toward Automated Reduction of Human Errors based on Cognitive Analysis," In Proceedings of the 7th International Workshop on Advances in Information Security (WAIS), July 2013. [ PDF ]
  22. Marat Vyshegorodtsev, Daisuke Miyamoto, Yasushi Wakahara, "Reputation Scoring System Using an Economic Trust Model - A distributed approach to evaluate trusted third parties on the Internet," In Proceedings of the 7th International Symposium on Security and Multimodality in Pervasive Environment (SMPE), March 2013.
  23. Daisuke Miyamoto, Yuzo Taenaka, Toshiyuki Miyachi, Hiroaki Hazeyama, "PhishCage: Reproduction of Fraudulent Websites in the Emulated Internet," In Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques (SimuTools), March 2013. [ PDF ]
  24. Daisuke Miyamoto, Toshiyuki Miyachi, "Poster Abstract: COSMO - Emulation of Internet Traffic," In the 6th International ICST Conference on Simulation Tools and Techniques (EMUTools workshop, poster session), March 2013.
  25. Eimatsu Moriyama, Takeshi Takahashi, Daisuke Miyamoto, "DNS-based Defense Against IP Spoofing Attacks," In Proceedings of the 19th International Conference on Neural Information Processing of the Asia-Pacific Neural Network Assembly (ICONIP), November 2012.
  26. Kentaro Yoshida, Daisuke Miyamoto, Yuji Sekiya, "Design and Evaluation of Area Limited Multicast with OpenFlow," In Procedings of the 3rd Annual International Conference on Network Technogies & Communications (NTC), October 2012.
  27. Kentaro Yoshida, Daisuke Miyamoto, Yuji Sekiya, "Area Limited Multicast with OpenFlow," In AsiaFI School, Workshop, and Meetings (poster sesseion), August 2012.
  28. Gregory Blanc, Daisuke Miyamoto, Mitsuaki Akiyama, Youki Kadobayashi, "Characterizing Obfuscated JavaScript using Abstract Syntax Trees: Experimenting with Malicious Scripts," In Proceedings of the 2012 IEEE Workshops of International Conference on Advanced Information Networking and Applications, March 2012.
  29. Takeshi Takahashi, Hiroaki Hazeyama, Daisuke Miyamoto, Youki Kadobayashi, "Taxonomical Approach to the Deployment of Traceback Mechanisms," In Proceedings of the Baltic Conference on Future Internet Communications (IEEE BCFIC Riga), February 2011.
  30. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, "HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites," In Proceedings of the 16th International Conference on Neural Information Processing of the Asia-Pacific Neural Network Assembly (ICONIP), December 2009. [ PDF ]
  31. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, "A Comparative Evaluation of Traceability in CJK Internet," In Proceedings of the 4th Joint Workshop on Information Security (JWIS), August 2009. [ PDF ]
  32. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, "An Evaluation of Machine Learning-based Methods for Detection of Phishing Sites," In Proceedings of the 15th International Conference on Neural Information Processing of the Asia-Pacific Neural Network Assembly (ICONIP), November 2008. [ PDF ]
  33. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, "Detecting Methods of Virus Email based on Mail Header and Encoding Anomaly," In Proceedings of the 15th International Conference on Neural Information Processing of the Asia-Pacific Neural Network Assembly (ICONIP), November 2008. [ PDF ]
  34. Hiroaki Hazeyama, Mio Suzuki, Shinsuke Miwa, Daisuke Miyamoto, and Youki Kadobayashi, "Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures," In Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2008.
  35. Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, "An Independent Evaluation of Web Timing Attack and its Countermeasure," In Proceedings of the 2nd International Workshop on Advances in Information Security (WAIS), March 2008.
  36. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, "A Proposal of the AdaBoost-Based Detection of Phishing Sites," In Proceedings of the 2nd Joint Workshop on Information Security (JWIS), August 2007. [ PDF ]
  37. Khamphao Sisaat, Daisuke Miyamoto. "Source address validation support for network forensics," In Proceedings of the 1st Joint Workshop on Information Security (JWIS), September 2006.
  38. Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyamoto, and Masafumi Oe. "An autonomous architecture for inter-domain traceback across the borders of network operation," In Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC), June 2006.
  39. Daisuke Miyamoto, Hiroaki Hazeyama, and Youki Kadobayashi, "SPS: A simple filtering algorithm to thwart phishing attacks," In Proceedings of Asian Internet Engineering Conference (AINTEC), December 2005. [ PDF ]

List of publications written in Japanese is available.

  1. X.1212, Design considerations for improved end-user perception of trustworthiness indicators
  2. RFC8134, Management Incident Lightweight Exchange (MILE) Implementation Report
  1. Daisuke Miyamoto. "A Machine Learning Approach for Detecting Fraudulent Websites," Doctoral Dissertation, Nara Institute of Science and Technology(NAIST-IS-DT0561032), March, 2009. [ LINK ]