Akihiro Satoh

Orcid: 0000-0003-3178-1041

According to our database1, Akihiro Satoh authored at least 17 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Characterizing the basic performance of IEEE 802.11ax using actual hardware measurements.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Unknown Malicious Domain Detection based on DNS Query Analysis using Word2Vec.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
An Approach for Identifying Malicious Domain Names Generated by Dictionary-Based DGA Bots.
IEICE Trans. Inf. Syst., 2021

Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification.
Proceedings of the Information Security - 24th International Conference, 2021

2020
A Superficial Analysis Approach for Identifying Malicious Domain Names Generated by DGA Malware.
IEEE Open J. Commun. Soc., 2020

2019
Clustering Malicious DNS Queries for Blacklist-Based Detection.
IEICE Trans. Inf. Syst., 2019

A Cause-Based Classification Approach for Malicious DNS Queries Detected Through Blacklists.
IEEE Access, 2019

2018
Estimating the Randomness of Domain Names for DGA Bot Callbacks.
IEEE Commun. Lett., 2018

2015
A flow-based detection method for stealthy dictionary attacks against Secure Shell.
J. Inf. Secur. Appl., 2015

A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack Detection.
IEICE Trans. Inf. Syst., 2015

2014
Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

2013
Identifying User Authentication Methods on Connections for SSH Dictionary Attack Detection.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
SSH Dictionary Attack Detection Based on Flow Analysis.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

2010
A Classifiable Sub-Flow Selection Method for Traffic Classification in Mobile IP Networks.
J. Inf. Process. Syst., 2010

Sharing information for event analysis over the wide Internet.
J. Commun. Networks, 2010

Knowledge Oriented Network Fault Resolution Method Based on Active Information Resource.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2010

2001
Analysis of image quality of digital panoramic tomography using "PANOURA 15 DIGIPAN".
Proceedings of the CARS 2001. Computer Assisted Radiology and Surgery. Proceedings of the 15th International Congress and Exhibition, 2001


  Loading...