Shigeki Goto

According to our database1, Shigeki Goto authored at least 60 papers between 1978 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Detection Method of Homograph Internationalized Domain Names with OCR.
J. Inf. Process., 2019

Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records.
J. Inf. Process., 2019

DomainScouter: Understanding the Risks of Deceptive IDNs.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

ShamFinder: An Automated Framework for Detecting IDN Homographs.
Proceedings of the Internet Measurement Conference, 2019

DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences.
IEICE Trans. Inf. Syst., 2018

Detecting Malware-Infected Devices Using the HTTP Header Patterns.
IEICE Trans. Inf. Syst., 2018

DomainChroma: Building actionable threat intelligence from malicious domain names.
Comput. Secur., 2018

POSTER: Predicting Website Abuse Using Update Histories.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

A Feasibility Study of Radio-frequency Retroreflector Attack.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Monitoring TLS adoption using backbone and edge traffic.
Proceedings of the IEEE INFOCOM 2018, 2018

Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
IEICE Trans. Inf. Syst., 2017

Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

BotDetector: A robust and scalable approach toward detecting malware-infected devices.
Proceedings of the IEEE International Conference on Communications, 2017

DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

POSTER: Is Active Electromagnetic Side-channel Attack Practical?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.
IEICE Trans. Inf. Syst., 2016

BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure.
IEICE Trans. Commun., 2016

Statistical estimation of the names of HTTPS servers with domain name graphs.
Comput. Commun., 2016

Website Forensic Investigation to Identify Evidence and Impact of Compromise.
Proceedings of the Security and Privacy in Communication Networks, 2016

DomainProfiler: Discovering Domain Names Abused in Future.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Behavior Analysis of Video Application Users on Smart Phones Based on State Transition Diagram.
IEICE Trans. Commun., 2015

BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Increasing the Darkness of Darknet Traffic.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Introducing Routing Guidance Name in Content-Centric Networking.
IEICE Trans. Commun., 2014

Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites.
J. Inf. Process., 2013

A Practical Behavior Analysis of Video Application Users on Smart Phones.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Extended Darknet: Multi-Dimensional Internet Threat Monitoring System.
IEICE Trans. Commun., 2012

i-Path: Improving Path Visibility for the Future Internet.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Detecting Malicious Websites by Learning IP Address Features.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Performance evaluation of file transmission in content-centric network.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Privacy-conscious P2P data sharing scheme with bogus profile distribution.
Web Intell. Agent Syst., 2009

Algorithms to minimize channel interference in multiple channels multiple interfaces environments.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Identifying Heavy-Hitter Flows from Sampled Flow Statistics.
IEICE Trans. Commun., 2007

Anonymous P2P Web Browse History Sharing for Web Page Recommendation.
IEICE Trans. Inf. Syst., 2007

An Implementation of Multiple Home Agents Mechanism in Mobile IPv6.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Filling the P2P Network with White Lies to Make It Anonymous.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

Flow analysis of internet traffic: World Wide Web versus peer-to-peer.
Systems and Computers in Japan, 2005

Traffic Matrix Estimation Using Spike Flow Detection.
IEICE Trans. Commun., 2005

On the Characteristics of Internet Traffic Variability: Spikes and Elephants.
IEICE Trans. Inf. Syst., 2004

Utilizing multiple home links in mobile IPv6.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Identifying elephant flows through periodically sampled packets.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

New Binding Update Method in Mobile IPv6.
Proceedings of the Information Networking, 2004

A New Intrusion Detection Method based on Process Profiling.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002

Remote Attack Detection Method in IDA: MLSI-Based Intrusion Detection using Discriminant Analysis.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002

Packet Analysis in Congested Networks.
Proceedings of the Progress in Discovery Science, 2002

A multi-agent monitoring and diagnostic system for TCP/IP-based network and its coordination.
Knowl. Based Syst., 2001

The Use of Mobile Agents in Tracing an Intruder in a Local Area Network.
Proceedings of the PRICAI 2000, Topics in Artificial Intelligence, 6th Pacific Rim International Conference on Artificial Intelligence, Melbourne, Australia, August 28, 2000

Active Measurement and Analysis of Delay Time in the Internet.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Would Internet Meet Global Acceptance?
Proceedings of the COMPSAC '96, 1996

Equilibrium Analysis of the Distribution of Information in Human Society.
Artif. Intell., 1995

Proof Normalization with Nonstandard Objects.
Theor. Comput. Sci., 1991

Concurrency in Proof Normalization and Logic Programming.
Proceedings of the 9th International Joint Conference on Artificial Intelligence. Los Angeles, 1985

DURAL: an Extended Prolog Language.
Proceedings of the RIMS Symposium on Software Science and Engineering, 1982

Program Synthesis from Natural Deduction Proofs.
Proceedings of the Sixth International Joint Conference on Artificial Intelligence, 1979

Program synthesis through Gödel's interpretation.
Proceedings of the Mathematical Studies of Information Processing, 1978