default search action
Masataka Nakahara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c11]Norihiro Okui, Masataka Nakahara, Ayumu Kubota:
Survey and Experimentation to Compare IoT Device Model Identification Methods. WoWMoM 2025: 13-17 - 2024
- [c10]Shayan Azizi, Norihiro Okui, Masataka Nakahara, Ayumu Kubota, Gustavo Batista, Hassan Habibi Gharakheili:
Poster: Understanding and Managing Changes in IoT Device Behaviors for Reliable Network Traffic Inference. SIGCOMM (Posters and Demos) 2024: 25-27 - [i2]Naoto Watanabe, Taku Yamazaki, Takumi Miyoshi, Ryo Yamamoto, Masataka Nakahara, Norihiro Okui, Ayumu Kubota:
Self-adaptive Traffic Anomaly Detection System for IoT Smart Home Environments. CoRR abs/2403.02744 (2024) - 2023
- [j3]Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake, Ayumu Kubota:
Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data. Enterp. Inf. Syst. 17(9) (2023) - [j2]Arman Pashamokhtari, Norihiro Okui, Yutaka Miyake, Masataka Nakahara, Hassan Habibi Gharakheili:
Combining Stochastic and Deterministic Modeling of IPFIX Records to Infer Connected IoT Devices in Residential ISP Networks. IEEE Internet Things J. 10(6, March 15): 5128-5145 (2023) - [j1]Arman Pashamokhtari, Norihiro Okui, Masataka Nakahara, Ayumu Kubota, Gustavo Batista, Hassan Habibi Gharakheili:
Dynamic Inference From IoT Traffic Flows Under Concept Drifts in Residential ISP Networks. IEEE Internet Things J. 10(17): 15761-15773 (2023) - [c9]Tomoyuki Ueda, Amgad Saif, Sumiko Miyata, Masataka Nakahara, Ayumu Kubota:
A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load. ICCE-Berlin 2023: 68-69 - [i1]Arman Pashamokhtari, Norihiro Okui, Masataka Nakahara, Ayumu Kubota, Gustavo Batista, Hassan Habibi Gharakheili:
Quantifying and Managing Impacts of Concept Drifts on IoT Traffic Inference in Residential ISP Networks. CoRR abs/2301.06695 (2023) - 2022
- [c8]Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Mizuho Yoshihira, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition. BWCCA 2022: 125-136 - [c7]Norihiro Okui, Masataka Nakahara, Yutaka Miyake, Ayumu Kubota:
Identification of an IoT Device Model in the Home Domain Using IPFIX Records. COMPSAC 2022: 583-592 - [c6]Takayuki Nishio, Masataka Nakahara, Norihiro Okui, Ayumu Kubota, Yasuaki Kobayashi, Keizo Sugiyama, Ryoichi Shinkuma:
Anomaly Traffic Detection with Federated Learning toward Network-based Malware Detection in IoT. GLOBECOM 2022: 299-304 - [c5]Mizuho Yoshihira, Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing. HCI (32) 2022: 78-93 - 2021
- [c4]Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake:
Malware Detection for IoT Devices using Automatically Generated White List and Isolation Forest. IoTBDS 2021: 38-47 - [c3]Arman Pashamokhtari, Norihiro Okui, Yutaka Miyake, Masataka Nakahara, Hassan Habibi Gharakheili:
Inferring Connected IoT Devices from IPFIX Records in Residential ISP Networks. LCN 2021: 57-64 - 2020
- [c2]Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake:
Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data. IoTBDS 2020: 78-87
2010 – 2019
- 2015
- [c1]Masataka Nakahara, Ryoichi Shinkuma, Kohei Yamaguchi, Kazuhiro Yamaguchi:
Tradeoff between privacy protection and network resource in community associated network virtualization. PIMRC 2015: 2143-2148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint