Остановите войну!
for scientists:
default search action
Shigeki Goto
- > Home > Persons > Shigeki Goto
Publications
- 2019
- [c38]Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. Internet Measurement Conference 2019: 449-462 - [i1]Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. CoRR abs/1909.07539 (2019) - 2018
- [j21]Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Tatsuya Mori, Shigeki Goto:
DomainChroma: Building actionable threat intelligence from malicious domain names. Comput. Secur. 77: 138-161 (2018) - [j20]Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, Shigeki Goto:
Detecting Malware-Infected Devices Using the HTTP Header Patterns. IEICE Trans. Inf. Syst. 101-D(5): 1370-1379 (2018) - [j18]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. Int. J. Inf. Sec. 17(6): 661-680 (2018) - [c35]Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi:
A Feasibility Study of Radio-frequency Retroreflector Attack. WOOT @ USENIX Security Symposium 2018 - 2017
- [c33]Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi:
POSTER: Is Active Electromagnetic Side-channel Attack Practical? CCS 2017: 2587-2589 - [c32]Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names. COMPSAC (1) 2017: 643-648 - [c31]Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, Shigeki Goto:
BotDetector: A robust and scalable approach toward detecting malware-infected devices. ICC 2017: 1-7 - 2016
- [j16]Tatsuya Mori, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Shigeaki Harada, Keisuke Ishibashi, Shigeki Goto:
Statistical estimation of the names of HTTPS servers with domain name graphs. Comput. Commun. 94: 104-113 (2016) - [c29]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. DSN 2016: 491-502 - 2015
- [c26]Yumehisa Haga, Akira Saso, Tatsuya Mori, Shigeki Goto:
Increasing the Darkness of Darknet Traffic. GLOBECOM 2015: 1-7 - [c25]Akihiro Shimoda, Keisuke Ishibashi, Kazumichi Sato, Masayuki Tsujino, Takeru Inoue, Masaki Shimura, Takanori Takebe, Kazuki Takahashi, Tatsuya Mori, Shigeki Goto:
Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics. GLOBECOM 2015: 1-6 - [c24]Tatsuya Mori, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Keisuke Ishibashi, Shigeki Goto:
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs. TMA 2015: 126-139 - 2013
- [j11]Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto:
Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. J. Inf. Process. 21(3): 539-550 (2013) - 2012
- [j10]Akihiro Shimoda, Tatsuya Mori, Shigeki Goto:
Extended Darknet: Multi-Dimensional Internet Threat Monitoring System. IEICE Trans. Commun. 95-B(6): 1915-1923 (2012) - [c20]Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto:
Detecting Malicious Websites by Learning IP Address Features. SAINT 2012: 29-39 - 2010
- [c18]Akihiro Shimoda, Tatsuya Mori, Shigeki Goto:
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. SAINT 2010: 22-30 - 2007
- [j7]Tatsuya Mori, Tetsuya Takine, Jianping Pan, Ryoichi Kawahara, Masato Uchida, Shigeki Goto:
Identifying Heavy-Hitter Flows from Sampled Flow Statistics. IEICE Trans. Commun. 90-B(11): 3061-3072 (2007) - 2005
- [j5]Tatsuya Mori, Masato Uchida, Shigeki Goto:
Flow analysis of internet traffic: World Wide Web versus peer-to-peer. Syst. Comput. Jpn. 36(11): 70-81 (2005) - 2004
- [j4]Tatsuya Mori, Ryoichi Kawahara, Shozo Naito, Shigeki Goto:
On the Characteristics of Internet Traffic Variability: Spikes and Elephants. IEICE Trans. Inf. Syst. 87-D(12): 2644-2653 (2004) - [c13]Tatsuya Mori, Masato Uchida, Ryoichi Kawahara, Jianping Pan, Shigeki Goto:
Identifying elephant flows through periodically sampled packets. Internet Measurement Conference 2004: 115-120 - [c12]Tatsuya Mori, Ryoichi Kawahara, Shozo Naito, Shigeki Goto:
On the Characteristics of Internet Traffic Variability: Spikes and Elephants. SAINT 2004: 99-106
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint