default search action
Masahiko Tomoishi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Yong Jin, Satoshi Matsuura, Masahiko Tomoishi:
How to Survive Private Data Leak Incidents in Campus IT Systems? SIGUCCS 2024: 44-46 - 2023
- [c28]Yong Jin, Masahiko Tomoishi:
A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems. COMPSAC 2023: 985-986 - [c27]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert. ICEIC 2023: 1-6 - [c26]Yong Jin, Satoshi Matsuura, Takao Kondo, Tatsumi Hosokawa, Masahiko Tomoishi:
A Lightweight Abnormality Detection Mechanism by Stray Packets Analysis. SIGUCCS 2023: 9-11 - 2022
- [c25]Yong Jin, Kazuya Iguchi, Nariyoshi Yamai, Masahiko Tomoishi:
Acceleration of a Client Based DNSSEC Validation System in Parallel with Two Full-Service Resolvers. ICACT 2022: 387-392 - 2021
- [c24]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Secure Remote Monitoring and Cipher Data Sharing for IoT Healthcare System with Privacy Preservation. ICCBDC 2021: 46-51 - [c23]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification. ICHMI 2021: 47-56 - 2020
- [c22]Masahiro Ishii, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi:
A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models. ICISSP 2020: 639-646 - [c21]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone. ISNCC 2020: 1-6
2010 – 2019
- 2019
- [c20]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
Detection of Hijacked Authoritative DNS Servers by Name Resolution Traffic Classification. IEEE BigData 2019: 6084-6085 - [c19]Yong Jin, Masahiko Tomoishi, Kenji Fujikawa, Ved P. Kafle:
A Lightweight and Secure IoT Remote Monitoring Mechanism Using DNS with Privacy Preservation. CCNC 2019: 1-2 - [c18]Yong Jin, Masahiko Tomoishi:
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System. COMPSAC (2) 2019: 676-681 - [c17]Yong Jin, Masahiko Tomoishi:
A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes. ITNAC 2019: 1-7 - [c16]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress. NCA 2019: 1-3 - [c15]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Anomaly Detection by Monitoring Unintended DNS Traffic on Wireless Network. PACRIM 2019: 1-6 - 2018
- [j2]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura, Yoshiaki Kitaguchi:
A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices. IEICE Trans. Inf. Syst. 101-D(11): 2612-2621 (2018) - [c14]Yong Jin, Kunitaka Kakoi, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
A Client Based Anomaly Traffic Detection and Blocking Mechanism by Monitoring DNS Name Resolution with User Alerting Feature. CW 2018: 351-356 - [c13]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura, Yoshiaki Kitaguchi:
A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks. ICNC 2018: 1-6 - [c12]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
A Client Based DNSSEC Validation Mechanism with Recursive DNS Server Separation. ICTC 2018: 148-153 - 2017
- [j1]Yong Jin, Kunitaka Kakoi, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
A Client Based DNSSEC Validation System with Adaptive Alert Mechanism Considering Minimal Client Timeout. IEICE Trans. Inf. Syst. 100-D(8): 1751-1761 (2017) - [c11]Kunitaka Kakoi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
Cache Function Activation on a Client Based DNSSEC Validation and Alert System by Multithreading. COMPSAC (2) 2017: 37-42 - [c10]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNS. COMPSAC (2) 2017: 282-283 - [c9]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
An In-depth Concealed File System with GPS Authentication Adaptable for Multiple Locations. COMPSAC (1) 2017: 608-613 - [c8]Shigeki Hagihara, Yoshiharu Fushihara, Masaya Shimakawa, Masahiko Tomoishi, Naoki Yonezaki:
Web server access trend analysis based on the Poisson distribution. ICSCA 2017: 256-261 - [c7]Yong Jin, Kunitaka Kakoi, Masahiko Tomoishi, Nariyoshi Yamai:
Efficient detection of suspicious DNS traffic by resolver separation per application program. ICTC 2017: 87-92 - 2016
- [c6]Kunitaka Kakoi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
Design and Implementation of a Client Based DNSSEC Validation and Alert System. COMPSAC Workshops 2016: 8-13 - [c5]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information. COMPSAC 2016: 459-464 - [c4]Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
Enhancement of VPN Authentication Using GPS Information with Geo-Privacy Protection. ICCCN 2016: 1-6 - [c3]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
An advanced client based DNSSEC validation and preliminary evaluations toward realization. ICTC 2016: 178-183 - 2015
- [c2]Yong Jin, Masahiko Tomoishi:
Web server performance enhancement by suppressing network traffic for high performance client. APNOMS 2015: 448-451
2000 – 2009
- 2001
- [c1]Kenji Masui, Masahiko Tomoishi, Naoki Yonezaki:
Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. ISC 2001: 536-553
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint