Identifying elephant flows through periodically sampled packets T Mori, M Uchida, R Kawahara, J Pan, S Goto Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 115-120, 2004 | 239 | 2004 |
A method of tracing intruders by use of mobile agents M Asaka, S Okazawa, A Taguchi, S Goto INET'99, 1999 | 175 | 1999 |
Detecting android malware by analyzing manifest files R Sato, D Chiba, S Goto Proceedings of the Asia-Pacific Advanced Network 36 (23-31), 17, 2013 | 93 | 2013 |
The implementation of IDA: An intrusion detection agent system M Asaka, A Taguchi, S Goto Proceedings of the 11th FIRST Conference 6, 1999 | 93 | 1999 |
On the characteristics of Internet traffic variability: Spikes and elephants T Mori, R Kawahara, S Naito, S Goto IEICE TRANSACTIONS on Information and Systems 87 (12), 2644-2653, 2004 | 79 | 2004 |
A new intrusion detection method based on discriminant analysis M Asaka, T Onabuta, T Inoue, S Okazawa, S Goto IEICE TRANSACTIONS on Information and Systems 84 (5), 570-577, 2001 | 75 | 2001 |
A new intrusion detection method based on process profiling Y Okazaki, I Sato, S Goto Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002), 82-90, 2002 | 65 | 2002 |
An improved intrusion detection method based on process profiling I Sato, Y Okazaki, S Goto IPSJ Journal 43 (11), 3316-3326, 2002 | 56 | 2002 |
Identifying heavy-hitter flows from sampled flow statistics T Mori, T Takine, J Pan, R Kawahara, M Uchida, S Goto IEICE Transactions on Communications 90 (11), 3061-3072, 2007 | 48 | 2007 |
Fingerprinting attack on Tor anonymity using deep learning K Abe, S Goto Proceedings of the Asia-Pacific Advanced Network 42, 15-20, 2016 | 42 | 2016 |
Detecting malicious websites by learning IP address features D Chiba, K Tobe, T Mori, S Goto 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012 | 40 | 2012 |
Flow analysis of internet traffic: World Wide Web versus peer‐to‐peer T Mori, M Uchida, S Goto Systems and Computers in Japan 36 (11), 70-81, 2005 | 39 | 2005 |
Program synthesis from natural deduction proofs S Goto Proceedings of the 6th international joint conference on Artificial …, 1979 | 32 | 1979 |
DomainProfiler: Discovering domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 23 | 2016 |
SFMap: Inferring services over encrypted web flows using dynamical domain name graphs T Mori, T Inoue, A Shimoda, K Sato, K Ishibashi, S Goto International Workshop on Traffic Monitoring and Analysis, 126-139, 2015 | 22 | 2015 |
Local attack detection and intrusion route tracing M Asaka, M Tsuchiya, T Onabuta, S Okazawa, S Goto IEICE transactions on communications 82 (11), 1826-1833, 1999 | 20 | 1999 |
A new method for symmetric NAT traversal in UDP and TCP Y Wei, D Yamada, S Yoshida, S Goto Network 4 (8), 2008 | 18 | 2008 |
Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis M Asaka, T Onabura, T Inoue, S Goto Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002), 64-73, 2002 | 18 | 2002 |
Detecting malicious activities through port profiling M Iguchi, S Goto IEICE TRANSACTIONS on Information and Systems 82 (4), 784-792, 1999 | 18 | 1999 |
Using abnormal TTL values to detect malicious IP packets R Yamada, S Goto Proceedings of the Asia-Pacific Advanced Network 34, 27-34, 2013 | 16 | 2013 |