SATOH, Akihiro
267  results:
Search for persons X
?
3

An Approach for Identifying Malicious Domain Names Generate..:

SATOH, Akihiro ; NAKAMURA, Yutaka ; FUKUDA, Yutaka..
IEICE Transactions on Information and Systems.  E104.D (2021)  5 - p. 669-672 , 2021
 
?
 
?
5

A Superficial Analysis Approach for Identifying Malicious D..:

Satoh, Akihiro ; Fukuda, Yutaka ; Hayashi, Toyohiro.
IEEE Open Journal of the Communications Society.  1 (2020)  - p. 1837-1849 , 2020
 
?
6

Clustering Malicious DNS Queries for Blacklist-Based Detect..:

SATOH, Akihiro ; NAKAMURA, Yutaka ; NOBAYASHI, Daiki...
IEICE Transactions on Information and Systems.  E102.D (2019)  7 - p. 1404-1407 , 2019
 
?
8

A flow-based detection method for stealthy dictionary attac..:

Satoh, Akihiro ; Nakamura, Yutaka ; Ikenaga, Takeshi
Journal of Information Security and Applications.  21 (2015)  - p. 31-41 , 2015
 
?
9

A New Approach to Identify User Authentication Methods towa..:

SATOH, Akihiro ; NAKAMURA, Yutaka ; IKENAGA, Takeshi
IEICE Transactions on Information and Systems.  E98.D (2015)  4 - p. 760-768 , 2015
 
?
 
?
11

A Simple Maneuver in Follow-Up Digital Subtraction Angiogra..:

MITSUI, HIDEAKI ; ZUGUCHI, MASAYUKI ; TAKAHASHI, SHOKI...
The Tohoku Journal of Experimental Medicine.  175 (1995)  4 - p. 219-223 , 1995
 
?
 
?
13

Copolymerization of styrene with maleic anhydride initiated..:

Kuramoto, Noriyuki ; Iwaki, Takeshi ; Satoh, Akihiro.
Journal of Polymer Science Part A: Polymer Chemistry.  27 (1989)  1 - p. 367-374 , 1989
 
?
 
1-15