Satoru Torii

According to our database1, Satoru Torii authored at least 12 papers between 1986 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Developing the Analysis Tool of Cyber-Attacks by Using CTI and Attributes of Organization.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

2017
Suspicious User Detection Based on File Server Usage Features.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

2016
TOPASE: Detection and Prevention of Brute Force Attacks with Disciplined IPs from IDS Logs.
J. Inf. Process., 2016

Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
TOPASE: Detection of brute force attacks used disciplined IPs from IDS log.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

RAT-based malicious activities detection on enterprise internal networks.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2013
On Detection for Scarcely Collided Super-Slow Port Scannings in IDSs' Log-Data.
J. Commun., 2013

2012
Editor's Message to Special Issue on Computer Security Technology Achieving Smart Society.
J. Inf. Process., 2012

2010
A Combinatorics Proliferation Model with Threshold for Malware Countermeasure.
J. Inf. Process., 2010

2007
A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware.
Proceedings of the SECRYPT 2007, 2007

Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

1986
A Prototype Software Simulator for FGHC.
Proceedings of the Logic Programming '86, 1986


  Loading...