Daisuke Miyamoto

405 total citations
38 papers, 154 citations indexed

About

Daisuke Miyamoto is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Daisuke Miyamoto has authored 38 papers receiving a total of 154 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Computer Networks and Communications, 14 papers in Information Systems and 14 papers in Artificial Intelligence. Recurrent topics in Daisuke Miyamoto's work include Advanced Malware Detection Techniques (11 papers), Network Security and Intrusion Detection (10 papers) and Internet Traffic Analysis and Secure E-voting (9 papers). Daisuke Miyamoto is often cited by papers focused on Advanced Malware Detection Techniques (11 papers), Network Security and Intrusion Detection (10 papers) and Internet Traffic Analysis and Secure E-voting (9 papers). Daisuke Miyamoto collaborates with scholars based in Japan, United Kingdom and Tanzania. Daisuke Miyamoto's co-authors include Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Grégory Blanc, Satoru Takahashi, Satoshi Okada, Shamal Faily, Hiroshi Nakamura, Mitsuaki Akiyama and John McAlaney and has published in prestigious journals such as Nucleic Acids Research, SHILAP Revista de lepidopterología and IEEE Access.

In The Last Decade

Daisuke Miyamoto

36 papers receiving 147 citations

Peers

Daisuke Miyamoto
David O. Manz United States
Naipeng Dong Australia
Yong Ho Hwang South Korea
Fengmin Gong United States
Brian Sniffen United States
Victor Heorhiadi United States
Ruan He France
David O. Manz United States
Daisuke Miyamoto
Citations per year, relative to Daisuke Miyamoto Daisuke Miyamoto (= 1×) peers David O. Manz

Countries citing papers authored by Daisuke Miyamoto

Since Specialization
Citations

This map shows the geographic impact of Daisuke Miyamoto's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Daisuke Miyamoto with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Daisuke Miyamoto more than expected).

Fields of papers citing papers by Daisuke Miyamoto

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Daisuke Miyamoto. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Daisuke Miyamoto. The network helps show where Daisuke Miyamoto may publish in the future.

Co-authorship network of co-authors of Daisuke Miyamoto

This figure shows the co-authorship network connecting the top 25 collaborators of Daisuke Miyamoto. A scholar is included among the top collaborators of Daisuke Miyamoto based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Daisuke Miyamoto. Daisuke Miyamoto is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kawasaki, Yoshinori, et al.. (2023). Statistical Modeling of Financial Data with Skew-Symmetric Error Distributions. Symmetry. 15(9). 1772–1772. 2 indexed citations
2.
Okada, Satoshi, et al.. (2021). Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it. IEICE Technical Report; IEICE Tech. Rep.. 1 indexed citations
3.
Okada, Satoshi, et al.. (2021). LDoS Attacker Detection Algorithms in Zigbee Network. 8. 43–50. 1 indexed citations
4.
Okada, Satoshi, et al.. (2021). New LDoS Attack in Zigbee Network and its Possible Countermeasures. 246–251. 7 indexed citations
5.
Fall, Doudou, et al.. (2019). An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents. IEEE Access. 7. 130758–130771. 13 indexed citations
6.
Faily, Shamal, et al.. (2019). A normative decision-making model for cyber security. Information and Computer Security. 27(5). 636–646. 5 indexed citations
8.
Morita, Masahiko, Kazuro Shimokawa, Satoko Takemoto, et al.. (2018). ViBrism DB: an interactive search and viewer platform for 2D/3D anatomical images of gene expression and co-expression networks. Nucleic Acids Research. 47(D1). D859–D866. 4 indexed citations
9.
Faily, Shamal, et al.. (2018). Eliciting Persona Characteristics for Risk-based Decision Making. Electronic workshops in computing. 1 indexed citations
10.
11.
Miyamoto, Daisuke, Hidefumi Mitsuno, Takeshi Fujii, et al.. (2016). Identification of repellent odorants to the body louse, Pediculus humanus corporis, in clove essential oil. Parasitology Research. 115(4). 1659–1666. 5 indexed citations
12.
Miyamoto, Daisuke, et al.. (2015). Text-Mining Approach for Estimating Vulnerability Score. 67–73. 23 indexed citations
13.
Miyamoto, Daisuke, et al.. (2014). NECOMAtter: Curating approach for sharing cyber threat information. 1 indexed citations
14.
Miyamoto, Daisuke, et al.. (2013). PhishCage: reproduction of fraudulent websites in the emulated internet. 242–247.
16.
Blanc, Grégory, Daisuke Miyamoto, Mitsuaki Akiyama, & Youki Kadobayashi. (2012). Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts. 344–351. 8 indexed citations
17.
Miyamoto, Daisuke, K. Nakamura, Tomoki Toda, Hiroshi Saruwatari, & Kiyohiro Shikano. (2009). Adaptive Approach to Varying Recording Conditions in Body Transmitted Voice Conversion Based on Acoustic Compensation. IPSJ SIG Notes. 2009(10). 7–12. 1 indexed citations
18.
Hazeyama, Hiroaki, et al.. (2009). Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set. IEICE Transactions on Information and Systems. E92-D(10). 1877–1887. 2 indexed citations
19.
Hazeyama, Hiroaki, et al.. (2008). Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures. USENIX Security Symposium. 2. 2 indexed citations
20.
Miyamoto, Daisuke, et al.. (2006). Visual Feedback Control with Laser for the Position Detection of Crane Hook. 2006 SICE-ICASE International Joint Conference. 2079–2083. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026