Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, IA (Joint) |
2019-12-20 10:10 |
Hiroshima |
Satellite Campus Hiroshima |
An Approach for Identifying Dictionary-based DGA Bots by Word Relations in Domain Names Akihiro Satoh, Yutaka Fukuda, Sujiro Wada, Yutaka Nakamura (KIT) IA2019-55 |
[more] |
IA2019-55 pp.39-44 |
IA, IN (Joint) |
2018-12-13 15:35 |
Hiroshima |
Hiroshima Univ. |
Clustering Malicious DNS Queries Detected by Using Blacklists Akihiro Satoh, Yutaka Nakamura, Mitsutaka Ogura, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2018-42 |
(To be available after the conference date) [more] |
IA2018-42 pp.17-22 |
IA, SITE, IPSJ-IOT [detail] |
2017-03-03 15:15 |
Okinawa |
Culture Resort Festone (Okinawa) |
Analyzing and Detecting Domain-Flux Botnets Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Takeshi Ikenaga (KIT) SITE2016-69 IA2016-99 |
[more] |
SITE2016-69 IA2016-99 pp.47-50 |
IA |
2016-10-14 14:50 |
Tokyo |
Univ. of Tokyo, Koshiba Hall |
Domain-Flux Botnet Detection based on DNS Traffic Analysis Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2016-24 |
[more] |
IA2016-24 pp.13-16 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 10:00 |
Nara |
Todaiji Total Cultural Center |
Identifying User Authentication Methods on SSH Sessions Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-61 IA2012-99 |
A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on... [more] |
SITE2012-61 IA2012-99 pp.151-156 |
NLP |
2013-03-15 16:50 |
Chiba |
Nishi-Chiba campus, Chiba Univ. |
Chaotic Method for Generating q-Gaussian Random Variables Ken Umeno, Aki-Hiro Sato (Kyoto Univ.) NLP2012-176 |
This study proposes a pseudo random number generator of $q$-Gaussian
random variables for a range of $q$ values, $-\inf... [more] |
NLP2012-176 pp.171-176 |
IN, NS, CS (Joint) |
2012-09-20 09:50 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Proposal of Damage Estimation of Dos Attack by the Characteristics of Flows Monitored at the Upper Router Hiroaki Izu (Tohoku Univ), Akihiro Satoh (Kyutech), Kazuto Sasai, Hideyuki Takahashi, Gen Kitagata, Tetsuo Kinoshita (Tohoku Univ) IN2012-51 |
[more] |
IN2012-51 pp.13-16 |
IN, IA (Joint) |
2011-12-16 15:10 |
Hiroshima |
Hiroshima City University |
SSH Brute Force Attack Detection based on Flow Features Analysis Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (KIT) IN2011-119 |
SSH brute force attack has become more seriously, so administrators are desired to implement its countermeasures. In the... [more] |
IN2011-119 pp.73-78 |
NS, CS, IN (Joint) |
2010-09-02 10:25 |
Miyagi |
Tohoku University |
Knowledge Based Network Monitoring and Analysis Method Ryo Arima, Akihiro Sato, Kazuto Sasai, Gen Kitagata, Tetsuo Kinoshita (Tohoku Univ.) IN2010-47 |
[more] |
IN2010-47 pp.21-24 |
IN, NS, CS (Joint) |
2009-09-11 14:55 |
Miyagi |
Tohoku University (Miyagi) |
Efficient Traffic Data Utilization System for Long-term Network Measurement Ryo Arima, Akihiro Satoh, Kazuto Sasai, Gen Kitagata, Tetsuo Kinoshita (Tohoku Univ.) IN2009-59 |
[more] |
IN2009-59 pp.117-120 |
IA |
2009-01-29 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Connection termination by clients in web service Akihiro Sato, Shinsuke Satake, Hiroshi Inai (Okayama Pref. Univ.) IA2008-66 |
In this study, to improve quality of Web service, we propose two methods in which a client closes the connection, and ev... [more] |
IA2008-66 pp.107-112 |
IN |
2008-01-18 16:25 |
Aichi |
Nagoya Institute of Technology |
A consideration of the keep-alive timeout in web servers Akihiro Sato, Shinsuke Satake, Hiroshi Inai (Okayama Pre Univ) IN2007-141 |
Web server's parameters must be set up properly in order to get a target performance.Via simulation, this paper evaluate... [more] |
IN2007-141 pp.125-130 |
PRMU, NLC, TL |
2006-10-19 15:10 |
Tokyo |
|
Developmental Word Acquisition And Grammar Learning by Humanoid Robots through A Self-Organizing Incremental Neural Network Tomotaka Ogura, Xiaoyuan He, Akihiro Satou, Osamu Hasegawa (TIT) |
We present a new approach for on-line incremental word acquisition and grammar learning by humanoid robots. Without any ... [more] |
TL2006-23 NLC2006-19 PRMU2006-100 pp.33-38(TL), pp.33-38(NLC), pp.51-56(PRMU) |
NLP |
2005-11-18 14:15 |
Fukuoka |
Kyushu Institute of Technology |
Stochastic processes generating power law fluctuations and information theory Aki-Hiro Sato (Kyoto Univ.) |
The Langevin equations with both multiplicative and additive noises, of which steady-state probability density functions... [more] |
NLP2005-65 pp.19-23 |