SATOH, Akihiro
401  results:
Search for persons X
?
2

Unknown Malicious Domain Detection based on DNS Query Analy..:

, In: 2022 International Conference on Computational Science and Computational Intelligence (CSCI),
Yamada, Hiroto ; Nobayashi, Daiki ; Satoh, Akihiro.. - p. 1096-1097 , 2022
 
?
3

Characterizing the basic performance of IEEE 802.11ax using..:

, In: NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium,
 
?
4

Identifying Malicious DNS Tunnel Tools from DoH Traffic Usi..:

, In: Lecture Notes in Computer Science; Information Security,
Mitsuhashi, Rikima ; Satoh, Akihiro ; Jin, Yong... - p. 238-256 , 2021
 
?
6

An Approach for Identifying Malicious Domain Names Generate..:

SATOH, Akihiro ; NAKAMURA, Yutaka ; FUKUDA, Yutaka..
IEICE Transactions on Information and Systems.  E104.D (2021)  5 - p. 669-672 , 2021
 
?
 
?
8

A Superficial Analysis Approach for Identifying Malicious D..:

Satoh, Akihiro ; Fukuda, Yutaka ; Hayashi, Toyohiro.
IEEE Open Journal of the Communications Society.  1 (2020)  - p. 1837-1849 , 2020
 
?
9

Clustering Malicious DNS Queries for Blacklist-Based Detect..:

SATOH, Akihiro ; NAKAMURA, Yutaka ; NOBAYASHI, Daiki...
IEICE Transactions on Information and Systems.  E102.D (2019)  7 - p. 1404-1407 , 2019
 
?
11

A flow-based detection method for stealthy dictionary attac..:

Satoh, Akihiro ; Nakamura, Yutaka ; Ikenaga, Takeshi
Journal of Information Security and Applications.  21 (2015)  - p. 31-41 , 2015
 
?
12

A New Approach to Identify User Authentication Methods towa..:

SATOH, Akihiro ; NAKAMURA, Yutaka ; IKENAGA, Takeshi
IEICE Transactions on Information and Systems.  E98.D (2015)  4 - p. 760-768 , 2015
 
?
13

Lightweight Approach to Detect Drive-by Download Attacks Ba..:

, In: Proceedings of the 2014 CoNEXT on Student Workshop,
 
?
14

Knowledge Oriented Network Fault Resolution Method Based on..:

, In: Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02,
 
?
 
1-15