Masato Terada

According to our database1, Masato Terada authored at least 28 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Stargazer: Long-Term and Multiregional Measurement of Timing/ Geolocation-Based Cloaking.
IEEE Access, 2023

2020
Continuous and Multiregional Monitoring of Malicious Hosts.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2017
A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study.
Int. J. Inf. Sec., 2017

2014
POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm.
J. Inf. Process., 2013

Mining Botnet Coordinated Attacks using <i>Apriori-PrefixSpan</i> Hybrid Algorithm.
Inf. Media Technol., 2013

Time Zone Correlation Analysis of Malware/Bot Downloads.
IEICE Trans. Commun., 2013

2011
Principal Component Analysis of Botnet Takeover.
J. Inf. Process., 2011

Analysis on the Sequential Behavior of Malware Attacks.
IEICE Trans. Inf. Syst., 2011

Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

2010
Principal Component Analysis of Port-scans for Reduction of Distributed Sensors.
J. Inf. Process., 2010

A discovery of sequential attack patterns of malware in botnets.
Proceedings of the IEEE International Conference on Systems, 2010

Enhancing Network Based Bot Detection with Contextual Information.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

Heuristics for Detecting Botnet Coordinated Attacks.
Proceedings of the ARES 2010, 2010

2009
Orthogonal Expansion of Port-scanning Packets.
Proceedings of the NBiS 2009, 2009

A comparative study on structure of the motivation for information security by security incident experiences.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
Estimation of Increase of Scanners Based on ISDAS Distributed Sensors.
J. Inf. Process., 2008

Automated Port-scan Classification with Decision Tree and Distributed Sensors.
J. Inf. Process., 2008

Principal Components of Port-Address Matrices in Port-Scan Analysis.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Automated Classification of Port-Scans from Distributed Sensors.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Internet Observation with ISDAS: How Long Does a Worm Perform Scanning?
Proceedings of the The Third International Conference on Availability, 2008

2007
Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

2006
How Many Malicious Scanners Are in the Internet?
Proceedings of the Information Security Applications, 7th International Workshop, 2006

2001
Spatial Information Sharing for Mobile Phones.
Proceedings of the Digital Cities II, 2001

2000
VPN construction method for multiple firewall environment.
Syst. Comput. Jpn., 2000

1997
Access Control for Inter-Organizational Computer Network Environment.
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1997

User Access Domain Management Systems - ADAMS.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997


  Loading...