default search action
Akihiro Satoh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j9]Akihiro Satoh, Yutaka Nakamura, Yutaka Fukuda, Daiki Nobayashi, Takeshi Ikenaga:
An Approach for Identifying Malicious Domain Names Generated by Dictionary-Based DGA Bots. IEICE Trans. Inf. Syst. 104-D(5): 669-672 (2021) - 2020
- [j8]Akihiro Satoh, Yutaka Fukuda, Toyohiro Hayashi, Gen Kitagata:
A Superficial Analysis Approach for Identifying Malicious Domain Names Generated by DGA Malware. IEEE Open J. Commun. Soc. 1: 1837-1849 (2020) - 2019
- [j7]Akihiro Satoh, Yutaka Nakamura, Yutaka Fukuda, Kazuto Sasai, Gen Kitagata:
A Cause-Based Classification Approach for Malicious DNS Queries Detected Through Blacklists. IEEE Access 7: 142991-143001 (2019) - [j6]Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Kazuto Sasai, Gen Kitagata, Takeshi Ikenaga:
Clustering Malicious DNS Queries for Blacklist-Based Detection. IEICE Trans. Inf. Syst. 102-D(7): 1404-1407 (2019) - 2018
- [j5]Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Takeshi Ikenaga:
Estimating the Randomness of Domain Names for DGA Bot Callbacks. IEEE Commun. Lett. 22(7): 1378-1381 (2018) - 2015
- [j4]Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga:
A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack Detection. IEICE Trans. Inf. Syst. 98-D(4): 760-768 (2015) - [j3]Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga:
A flow-based detection method for stealthy dictionary attacks against Secure Shell. J. Inf. Secur. Appl. 21: 31-41 (2015) - 2010
- [j2]Masahiro Nagao, Kazuhide Koide, Akihiro Satoh, Glenn Mansfield Keeni, Norio Shiratori:
Sharing information for event analysis over the wide Internet. J. Commun. Networks 12(4): 382-394 (2010) - [j1]Akihiro Satoh, Toshiaki Osada, Toru Abe, Gen Kitagata, Norio Shiratori, Tetsuo Kinoshita:
A Classifiable Sub-Flow Selection Method for Traffic Classification in Mobile IP Networks. J. Inf. Process. Syst. 6(3): 307-322 (2010)
Conference and Workshop Papers
- 2022
- [c8]Hiroto Yamada, Daiki Nobayashi, Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga:
Unknown Malicious Domain Detection based on DNS Query Analysis using Word2Vec. CSCI 2022: 1096-1097 - [c7]Yutaka Fukuda, Takuji Hatase, Akihiro Satoh, Yutaka Nakamura, Sujiro Wada:
Characterizing the basic performance of IEEE 802.11ax using actual hardware measurements. NOMS 2022: 1-4 - 2021
- [c6]Rikima Mitsuhashi, Akihiro Satoh, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai:
Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification. ISC 2021: 238-256 - 2014
- [c5]Yasutaka Shindo, Akihiro Satoh, Yutaka Nakamura, Katsuyoshi Iida:
Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition. CoNEXT Student Workshop 2014: 28-30 - 2013
- [c4]Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga:
Identifying User Authentication Methods on Connections for SSH Dictionary Attack Detection. COMPSAC Workshops 2013: 593-598 - 2012
- [c3]Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga:
SSH Dictionary Attack Detection Based on Flow Analysis. SAINT 2012: 51-59 - 2010
- [c2]Yusuke Takahashi, Daisuke Misugi, Akira Sakatoku, Akihiro Satoh, Akiko Takahashi, Kazuto Sasai, Gen Kitagata, Toru Abe, Tetsuo Kinoshita:
Knowledge Oriented Network Fault Resolution Method Based on Active Information Resource. IAT 2010: 361-364 - 2001
- [c1]Akihiro Satoh, Hisanori Nakahama, Rieko Yamato, Yasuhiko Okumura:
Analysis of image quality of digital panoramic tomography using "PANOURA 15 DIGIPAN". CARS 2001: 1289-1290
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint