Shigeki Goto

According to our database1, Shigeki Goto authored at least 61 papers between 1978 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names.
IEICE Trans. Inf. Syst., 2020

2019
Detection Method of Homograph Internationalized Domain Names with OCR.
J. Inf. Process., 2019

Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records.
J. Inf. Process., 2019

DomainScouter: Understanding the Risks of Deceptive IDNs.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

ShamFinder: An Automated Framework for Detecting IDN Homographs.
Proceedings of the Internet Measurement Conference, 2019

2018
DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences.
IEICE Trans. Inf. Syst., 2018

Detecting Malware-Infected Devices Using the HTTP Header Patterns.
IEICE Trans. Inf. Syst., 2018

DomainChroma: Building actionable threat intelligence from malicious domain names.
Comput. Secur., 2018

POSTER: Predicting Website Abuse Using Update Histories.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

A Feasibility Study of Radio-frequency Retroreflector Attack.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Monitoring TLS adoption using backbone and edge traffic.
Proceedings of the IEEE INFOCOM 2018, 2018

2017
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
IEICE Trans. Inf. Syst., 2017

Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

BotDetector: A robust and scalable approach toward detecting malware-infected devices.
Proceedings of the IEEE International Conference on Communications, 2017

DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

POSTER: Is Active Electromagnetic Side-channel Attack Practical?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.
IEICE Trans. Inf. Syst., 2016

BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure.
IEICE Trans. Commun., 2016

Statistical estimation of the names of HTTPS servers with domain name graphs.
Comput. Commun., 2016

Website Forensic Investigation to Identify Evidence and Impact of Compromise.
Proceedings of the Security and Privacy in Communication Networks, 2016

DomainProfiler: Discovering Domain Names Abused in Future.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Behavior Analysis of Video Application Users on Smart Phones Based on State Transition Diagram.
IEICE Trans. Commun., 2015

BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Increasing the Darkness of Darknet Traffic.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Introducing Routing Guidance Name in Content-Centric Networking.
IEICE Trans. Commun., 2014

2013
Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites.
J. Inf. Process., 2013

A Practical Behavior Analysis of Video Application Users on Smart Phones.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
Extended Darknet: Multi-Dimensional Internet Threat Monitoring System.
IEICE Trans. Commun., 2012

i-Path: Improving Path Visibility for the Future Internet.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Detecting Malicious Websites by Learning IP Address Features.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Performance evaluation of file transmission in content-centric network.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2010
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

2009
Privacy-conscious P2P data sharing scheme with bogus profile distribution.
Web Intell. Agent Syst., 2009

Algorithms to minimize channel interference in multiple channels multiple interfaces environments.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

2007
Identifying Heavy-Hitter Flows from Sampled Flow Statistics.
IEICE Trans. Commun., 2007

Anonymous P2P Web Browse History Sharing for Web Page Recommendation.
IEICE Trans. Inf. Syst., 2007

An Implementation of Multiple Home Agents Mechanism in Mobile IPv6.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Filling the P2P Network with White Lies to Make It Anonymous.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

2005
Flow analysis of internet traffic: World Wide Web versus peer-to-peer.
Syst. Comput. Jpn., 2005

Traffic Matrix Estimation Using Spike Flow Detection.
IEICE Trans. Commun., 2005

2004
On the Characteristics of Internet Traffic Variability: Spikes and Elephants.
IEICE Trans. Inf. Syst., 2004

Utilizing multiple home links in mobile IPv6.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Identifying elephant flows through periodically sampled packets.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

New Binding Update Method in Mobile IPv6.
Proceedings of the Information Networking, 2004

2002
A New Intrusion Detection Method based on Process Profiling.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002

Remote Attack Detection Method in IDA: MLSI-Based Intrusion Detection using Discriminant Analysis.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002

Packet Analysis in Congested Networks.
Proceedings of the Progress in Discovery Science, 2002

2001
A multi-agent monitoring and diagnostic system for TCP/IP-based network and its coordination.
Knowl. Based Syst., 2001

2000
The Use of Mobile Agents in Tracing an Intruder in a Local Area Network.
Proceedings of the PRICAI 2000, Topics in Artificial Intelligence, 6th Pacific Rim International Conference on Artificial Intelligence, Melbourne, Australia, August 28, 2000

1999
Active Measurement and Analysis of Delay Time in the Internet.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1996
Would Internet Meet Global Acceptance?
Proceedings of the COMPSAC '96, 1996

1995
Equilibrium Analysis of the Distribution of Information in Human Society.
Artif. Intell., 1995

1991
Proof Normalization with Nonstandard Objects.
Theor. Comput. Sci., 1991

1985
Concurrency in Proof Normalization and Logic Programming.
Proceedings of the 9th International Joint Conference on Artificial Intelligence. Los Angeles, 1985

1982
DURAL: an Extended Prolog Language.
Proceedings of the RIMS Symposium on Software Science and Engineering, 1982

1979
Program Synthesis from Natural Deduction Proofs.
Proceedings of the Sixth International Joint Conference on Artificial Intelligence, 1979

1978
Program synthesis through Gödel's interpretation.
Proceedings of the Mathematical Studies of Information Processing, 1978


  Loading...