Shunsuke Oshima

According to our database1, Shunsuke Oshima authored at least 16 papers between 2006 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
A Study of Malicious PDF Detection Technique.
Proceedings of the 10th International Conference on Complex, 2016

2014
Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2012
Computational Complexity of Anomaly Detection Methods.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Token-based Code Clone Detection Technique in a Student's Programming Exercise.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

The Evaluation of an Anomaly Detection System Based on Chi-square Method.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

An Anomaly Detection System Based on Chi-Square Method with Dynamic BIN Algorithm.
Proceedings of the 2011 International Conference on Broadband, 2011

Anomaly Detection Using Chi-square Values Based on the Typical Features and the Time Deviation.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Early DoS/DDoS Detection Method using Short-term Statistics.
Proceedings of the CISIS 2010, 2010

DDoS Detection Technique Using Statistical Analysis to Generate Quick Response Time.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Extraction of Characteristics of Anomaly Accessed IP Packets Using Chi-square Method.
Proceedings of the 2009 International Conference on Complex, 2009

2008
Extraction of Characteristics of Anomaly Accessed IP Packets by the Entropy-Based Analysis.
Proceedings of the Second International Conference on Complex, 2008

2007
Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical Analysis.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A Detective Method for SYN Flood Attacks.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006


  Loading...