Shota Fujii

Orcid: 0000-0002-1250-7488

According to our database1, Shota Fujii authored at least 14 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Analysis of Susceptibility to Phishing via Business Chat through Online Survey.
J. Inf. Process., 2023

Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of CTI Sources.
J. Inf. Process., 2023

Stargazer: Long-Term and Multiregional Measurement of Timing/ Geolocation-Based Cloaking.
IEEE Access, 2023

2022
Survey and Analysis on ATT&CK Mapping Function of Online Sandbox for Understanding and Efficient Using.
J. Inf. Process., 2022

CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs.
Proceedings of the Advances in Information and Computer Security, 2022

Design and Implementation of System for URL Signature Construction and Impact Assessment.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

2020
Current Status and Enhancement of Collaborative Research in the World: A Case Study of Osaka University.
J. Data Inf. Sci., 2020

Continuous and Multiregional Monitoring of Malicious Hosts.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Current Status and Enhancement of Collaborative Research with ASEAN Countries: A Case Study of Osaka University.
Proceedings of the 17th International Conference on Scientometrics and Informetrics, 2019

2018
Development of White List Based Autonomous Evolution of Defense System for RAT Malware.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2016
Evaluation and design of function for tracing diffusion of classified information for file operations with KVM.
J. Supercomput., 2016

Design of Function for Tracing Diffusion of Classified Information for IPC on KVM.
J. Inf. Process., 2016

2010
Ladder Climbing Method for the Limb Mechanism Robot ASTERISK.
Adv. Robotics, 2010

2008
Ladder climbing control for limb mechanism robot "ASTERISK".
Proceedings of the 2008 IEEE International Conference on Robotics and Automation, 2008


  Loading...