Sign in
Takashi Koide
ORCID
Publication Activity (10 Years)
Years Active: 2015-2023
Publications (10 Years): 16
Top Topics
User Comments
Dos Attacks
Security Risks
Microblog Posts
Top Venues
CoRR
J. Inf. Process.
RAID
IEICE Trans. Inf. Syst.
</>
Publications
</>
Hiroki Nakano
,
Daiki Chiba
,
Takashi Koide
,
Naoki Fukushi
,
Takeshi Yagi
,
Takeo Hariu
,
Katsunari Yoshioka
,
Tsutomu Matsumoto
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts.
CoRR
(2023)
Takashi Koide
,
Naoki Fukushi
,
Hiroki Nakano
,
Daiki Chiba
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names.
CoRR
(2023)
Takashi Koide
,
Naoki Fukushi
,
Hiroki Nakano
,
Daiki Chiba
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names.
ACSAC
(2023)
Hiroki Nakano
,
Daiki Chiba
,
Takashi Koide
,
Naoki Fukushi
,
Takeshi Yagi
,
Takeo Hariu
,
Katsunari Yoshioka
,
Tsutomu Matsumoto
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts.
ARES
(2023)
Takashi Koide
,
Naoki Fukushi
,
Hiroki Nakano
,
Daiki Chiba
Detecting Phishing Sites Using ChatGPT.
CoRR
(2023)
Hiroki Nakano
,
Daiki Chiba
,
Takashi Koide
,
Mitsuaki Akiyama
,
Katsunari Yoshioka
,
Tsutomu Matsumoto
Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild.
J. Inf. Process.
30 (2022)
Naoki Fukushi
,
Takashi Koide
,
Daiki Chiba
,
Hiroki Nakano
,
Mitsuaki Akiyama
Understanding Security Risks of Ad-based URL Shortening Services Caused by Users' Behaviors.
J. Inf. Process.
30 (2022)
Hiroki Nakano
,
Daiki Chiba
,
Takashi Koide
,
Mitsuaki Akiyama
Detecting Event-synced Navigation Attacks across User-generated Content Platforms.
COMPSAC
(2021)
Takashi Koide
,
Daiki Chiba
,
Mitsuaki Akiyama
,
Katsunari Yoshioka
,
Tsutomu Matsumoto
To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2021)
Naoki Fukushi
,
Takashi Koide
,
Daiki Chiba
,
Hiroki Nakano
,
Mitsuaki Akiyama
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' Behaviors.
SecureComm (2)
(2021)
Takashi Koide
,
Daiki Chiba
,
Mitsuaki Akiyama
,
Katsunari Yoshioka
,
Tsutomu Matsumoto
Understanding the Fake Removal Information Advertisement Sites.
J. Inf. Process.
29 (2021)
Takashi Koide
,
Daiki Chiba
,
Mitsuaki Akiyama
,
Katsunari Yoshioka
,
Tsutomu Matsumoto
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.
DIMVA
(2020)
Daiki Chiba
,
Ayako Akiyama Hasegawa
,
Takashi Koide
,
Yuta Sawabe
,
Shigeki Goto
,
Mitsuaki Akiyama
DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names.
IEICE Trans. Inf. Syst.
(7) (2020)
Takashi Koide
,
Daiki Chiba
,
Mitsuaki Akiyama
To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web.
AsiaCCS
(2020)
Daiki Chiba
,
Ayako Akiyama Hasegawa
,
Takashi Koide
,
Yuta Sawabe
,
Shigeki Goto
,
Mitsuaki Akiyama
DomainScouter: Understanding the Risks of Deceptive IDNs.
RAID
(2019)
Lukas Krämer
,
Johannes Krupp
,
Daisuke Makita
,
Tomomi Nishizoe
,
Takashi Koide
,
Katsunari Yoshioka
,
Christian Rossow
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
RAID
(2015)