Shigeki Goto
Shigeki Goto
Verified email at goto.info.waseda.ac.jp - Homepage
Title
Cited by
Cited by
Year
Identifying elephant flows through periodically sampled packets
T Mori, M Uchida, R Kawahara, J Pan, S Goto
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 115-120, 2004
2392004
A method of tracing intruders by use of mobile agents
M Asaka, S Okazawa, A Taguchi, S Goto
INET'99, 1999
1751999
Detecting android malware by analyzing manifest files
R Sato, D Chiba, S Goto
Proceedings of the Asia-Pacific Advanced Network 36 (23-31), 17, 2013
932013
The implementation of IDA: An intrusion detection agent system
M Asaka, A Taguchi, S Goto
Proceedings of the 11th FIRST Conference 6, 1999
931999
On the characteristics of Internet traffic variability: Spikes and elephants
T Mori, R Kawahara, S Naito, S Goto
IEICE TRANSACTIONS on Information and Systems 87 (12), 2644-2653, 2004
792004
A new intrusion detection method based on discriminant analysis
M Asaka, T Onabuta, T Inoue, S Okazawa, S Goto
IEICE TRANSACTIONS on Information and Systems 84 (5), 570-577, 2001
752001
A new intrusion detection method based on process profiling
Y Okazaki, I Sato, S Goto
Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002), 82-90, 2002
652002
An improved intrusion detection method based on process profiling
I Sato, Y Okazaki, S Goto
IPSJ Journal 43 (11), 3316-3326, 2002
562002
Identifying heavy-hitter flows from sampled flow statistics
T Mori, T Takine, J Pan, R Kawahara, M Uchida, S Goto
IEICE Transactions on Communications 90 (11), 3061-3072, 2007
482007
Fingerprinting attack on Tor anonymity using deep learning
K Abe, S Goto
Proceedings of the Asia-Pacific Advanced Network 42, 15-20, 2016
422016
Detecting malicious websites by learning IP address features
D Chiba, K Tobe, T Mori, S Goto
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012
402012
Flow analysis of internet traffic: World Wide Web versus peer‐to‐peer
T Mori, M Uchida, S Goto
Systems and Computers in Japan 36 (11), 70-81, 2005
392005
Program synthesis from natural deduction proofs
S Goto
Proceedings of the 6th international joint conference on Artificial …, 1979
321979
DomainProfiler: Discovering domain names abused in future
D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
232016
SFMap: Inferring services over encrypted web flows using dynamical domain name graphs
T Mori, T Inoue, A Shimoda, K Sato, K Ishibashi, S Goto
International Workshop on Traffic Monitoring and Analysis, 126-139, 2015
222015
Local attack detection and intrusion route tracing
M Asaka, M Tsuchiya, T Onabuta, S Okazawa, S Goto
IEICE transactions on communications 82 (11), 1826-1833, 1999
201999
A new method for symmetric NAT traversal in UDP and TCP
Y Wei, D Yamada, S Yoshida, S Goto
Network 4 (8), 2008
182008
Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis
M Asaka, T Onabura, T Inoue, S Goto
Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002), 64-73, 2002
182002
Detecting malicious activities through port profiling
M Iguchi, S Goto
IEICE TRANSACTIONS on Information and Systems 82 (4), 784-792, 1999
181999
Using abnormal TTL values to detect malicious IP packets
R Yamada, S Goto
Proceedings of the Asia-Pacific Advanced Network 34, 27-34, 2013
162013
The system can't perform the operation now. Try again later.
Articles 1–20