default search action
Shigeki Goto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j25]Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names. IEICE Trans. Inf. Syst. 103-D(7): 1493-1511 (2020) - 2019
- [j24]Tomofumi Nakamori, Daiki Chiba, Mitsuaki Akiyama, Shigeki Goto:
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records. J. Inf. Process. 27: 525-535 (2019) - [j23]Yuta Sawabe, Daiki Chiba, Mitsuaki Akiyama, Shigeki Goto:
Detection Method of Homograph Internationalized Domain Names with OCR. J. Inf. Process. 27: 536-544 (2019) - 2018
- [j22]Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Tatsuya Mori, Shigeki Goto:
DomainChroma: Building actionable threat intelligence from malicious domain names. Comput. Secur. 77: 138-161 (2018) - [j21]Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, Shigeki Goto:
Detecting Malware-Infected Devices Using the HTTP Header Patterns. IEICE Trans. Inf. Syst. 101-D(5): 1370-1379 (2018) - [j20]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Kazuhiko Ohkubo, Shigeki Goto:
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences. IEICE Trans. Inf. Syst. 101-D(11): 2600-2611 (2018) - [j19]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. Int. J. Inf. Sec. 17(6): 661-680 (2018) - 2017
- [j18]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces. IEICE Trans. Inf. Syst. 100-D(8): 1714-1728 (2017) - 2016
- [j17]Tatsuya Mori, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Shigeaki Harada, Keisuke Ishibashi, Shigeki Goto:
Statistical estimation of the names of HTTPS servers with domain name graphs. Comput. Commun. 94: 104-113 (2016) - [j16]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks. IEICE Trans. Inf. Syst. 99-D(4): 860-872 (2016) - [j15]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure. IEICE Trans. Commun. 99-B(5): 1012-1023 (2016) - 2015
- [j14]Norihiro Fukumoto, Shigehiro Ano, Shigeki Goto:
Behavior Analysis of Video Application Users on Smart Phones Based on State Transition Diagram. IEICE Trans. Commun. 98-B(1): 42-50 (2015) - 2014
- [j13]Yao Hu, Shigeki Goto:
Introducing Routing Guidance Name in Content-Centric Networking. IEICE Trans. Commun. 97-B(12): 2596-2605 (2014) - 2013
- [j12]Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto:
Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. Inf. Media Technol. 8(3): 855-866 (2013) - [j11]Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto:
Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. J. Inf. Process. 21(3): 539-550 (2013) - 2012
- [j10]Akihiro Shimoda, Tatsuya Mori, Shigeki Goto:
Extended Darknet: Multi-Dimensional Internet Threat Monitoring System. IEICE Trans. Commun. 95-B(6): 1915-1923 (2012) - 2009
- [j9]Makoto Iguchi, Shigeki Goto:
Privacy-conscious P2P data sharing scheme with bogus profile distribution. Web Intell. Agent Syst. 7(2): 209-222 (2009) - 2007
- [j8]Makoto Iguchi, Shigeki Goto:
Anonymous P2P Web Browse History Sharing for Web Page Recommendation. IEICE Trans. Inf. Syst. 90-D(9): 1343-1353 (2007) - [j7]Tatsuya Mori, Tetsuya Takine, Jianping Pan, Ryoichi Kawahara, Masato Uchida, Shigeki Goto:
Identifying Heavy-Hitter Flows from Sampled Flow Statistics. IEICE Trans. Commun. 90-B(11): 3061-3072 (2007) - 2005
- [j6]Susumu Shimizu, Kensuke Fukuda, Ken-ichiro Murakami, Shigeki Goto:
Traffic Matrix Estimation Using Spike Flow Detection. IEICE Trans. Commun. 88-B(4): 1484-1492 (2005) - [j5]Tatsuya Mori, Masato Uchida, Shigeki Goto:
Flow analysis of internet traffic: World Wide Web versus peer-to-peer. Syst. Comput. Jpn. 36(11): 70-81 (2005) - 2004
- [j4]Tatsuya Mori, Ryoichi Kawahara, Shozo Naito, Shigeki Goto:
On the Characteristics of Internet Traffic Variability: Spikes and Elephants. IEICE Trans. Inf. Syst. 87-D(12): 2644-2653 (2004) - 2001
- [j3]Toshiharu Sugawara, Ken-ichiro Murakami, Shigeki Goto:
A multi-agent monitoring and diagnostic system for TCP/IP-based network and its coordination. Knowl. Based Syst. 14(7): 367-383 (2001) - 1995
- [j2]Shigeki Goto, Hisao Nojima:
Equilibrium Analysis of the Distribution of Information in Human Society. Artif. Intell. 75(1): 115-130 (1995) - 1991
- [j1]Shigeki Goto:
Proof Normalization with Nonstandard Objects. Theor. Comput. Sci. 85(2): 333-351 (1991)
Conference and Workshop Papers
- 2019
- [c38]Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. Internet Measurement Conference 2019: 449-462 - [c37]Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Understanding the Risks of Deceptive IDNs. RAID 2019: 413-426 - 2018
- [c36]Chia-ling Chan, Romain Fontugne, Kenjiro Cho, Shigeki Goto:
Monitoring TLS adoption using backbone and edge traffic. INFOCOM Workshops 2018: 208-213 - [c35]Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi:
A Feasibility Study of Radio-frequency Retroreflector Attack. WOOT @ USENIX Security Symposium 2018 - [c34]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Shigeki Goto:
POSTER: Predicting Website Abuse Using Update Histories. WWW (Companion Volume) 2018: 9-10 - 2017
- [c33]Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi:
POSTER: Is Active Electromagnetic Side-channel Attack Practical? CCS 2017: 2587-2589 - [c32]Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names. COMPSAC (1) 2017: 643-648 - [c31]Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, Shigeki Goto:
BotDetector: A robust and scalable approach toward detecting malware-infected devices. ICC 2017: 1-7 - [c30]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations. WISE (2) 2017: 278-294 - 2016
- [c29]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. DSN 2016: 491-502 - [c28]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Website Forensic Investigation to Identify Evidence and Impact of Compromise. SecureComm 2016: 431-453 - 2015
- [c27]Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto:
MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks. COMPSAC 2015: 444-449 - [c26]Yumehisa Haga, Akira Saso, Tatsuya Mori, Shigeki Goto:
Increasing the Darkness of Darknet Traffic. GLOBECOM 2015: 1-7 - [c25]Akihiro Shimoda, Keisuke Ishibashi, Kazumichi Sato, Masayuki Tsujino, Takeru Inoue, Masaki Shimura, Takanori Takebe, Kazuki Takahashi, Tatsuya Mori, Shigeki Goto:
Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics. GLOBECOM 2015: 1-6 - [c24]Tatsuya Mori, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Keisuke Ishibashi, Shigeki Goto:
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs. TMA 2015: 126-139 - [c23]Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts. TrustCom/BigDataSE/ISPA (1) 2015: 758-765 - 2013
- [c22]Norihiro Fukumoto, Shigehiro Ano, Shigeki Goto:
A Practical Behavior Analysis of Video Application Users on Smart Phones. COMPSAC 2013: 288-289 - 2012
- [c21]Hu Yao, Shigeki Goto:
Performance evaluation of file transmission in content-centric network. CCIS 2012: 755-756 - [c20]Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto:
Detecting Malicious Websites by Learning IP Address Features. SAINT 2012: 29-39 - [c19]Dai Mochinaga, Katsushi Kobayashi, Ryo Yamada, Shigeki Goto, Akihiro Shimoda, Ichiro Murase:
i-Path: Improving Path Visibility for the Future Internet. SAINT 2012: 155-160 - 2010
- [c18]Akihiro Shimoda, Tatsuya Mori, Shigeki Goto:
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. SAINT 2010: 22-30 - 2009
- [c17]Trung-Tuan Luong, Bu-Sung Lee, Chai Kiat Yeo, Ming-Shiunn Wong, Shigeki Goto:
Algorithms to minimize channel interference in multiple channels multiple interfaces environments. LCN 2009: 61-68 - 2007
- [c16]Makoto Iguchi, Shigeki Goto:
Filling the P2P Network with White Lies to Make It Anonymous. IAT 2007: 196-202 - [c15]Hongbo Shi, Shigeki Goto:
An Implementation of Multiple Home Agents Mechanism in Mobile IPv6. TRIDENTCOM 2007: 1-9 - 2004
- [c14]Heshmatollah Khosravi, Hiroaki Fukuda, Shigeki Goto:
New Binding Update Method in Mobile IPv6. ICOIN 2004: 267-276 - [c13]Tatsuya Mori, Masato Uchida, Ryoichi Kawahara, Jianping Pan, Shigeki Goto:
Identifying elephant flows through periodically sampled packets. Internet Measurement Conference 2004: 115-120 - [c12]Tatsuya Mori, Ryoichi Kawahara, Shozo Naito, Shigeki Goto:
On the Characteristics of Internet Traffic Variability: Spikes and Elephants. SAINT 2004: 99-106 - [c11]Hongbo Shi, Shigeki Goto:
Utilizing multiple home links in mobile IPv6. WCNC 2004: 149-154 - 2002
- [c10]Masaki Fukushima, Shigeki Goto:
Packet Analysis in Congested Networks. Progress in Discovery Science 2002: 600-615 - [c9]Midori Asaka, Takefumi Onabuta, Tadashi Inoue, Shigeki Goto:
Remote Attack Detection Method in IDA: MLSI-Based Intrusion Detection using Discriminant Analysis. SAINT 2002: 64-73 - [c8]Yoshinori Okazaki, Izuru Sato, Shigeki Goto:
A New Intrusion Detection Method based on Process Profiling. SAINT 2002: 82-91 - 2000
- [c7]Midori Asaka, Takefumi Onabuta, Tadashi Inoue, Shigeki Goto:
The Use of Mobile Agents in Tracing an Intruder in a Local Area Network. PRICAI 2000: 373-382 - 1999
- [c6]Jun-ya Kato, Atsuo Shimizu, Shigeki Goto:
Active Measurement and Analysis of Delay Time in the Internet. ICPP Workshops 1999: 254-259 - 1996
- [c5]Shigeki Goto:
Would Internet Meet Global Acceptance? COMPSAC 1996: 222 - 1985
- [c4]Shigeki Goto:
Concurrency in Proof Normalization and Logic Programming. IJCAI 1985: 726-729 - 1982
- [c3]Shigeki Goto:
DURAL: an Extended Prolog Language. RIMS Symposium on Software Science and Engineering 1982: 73-87 - 1979
- [c2]Shigeki Goto:
Program Synthesis from Natural Deduction Proofs. IJCAI 1979: 339-341 - 1978
- [c1]Shigeki Goto:
Program synthesis through Gödel's interpretation. Mathematical Studies of Information Processing 1978: 302-325
Editorship
- 1990
- [e1]Setsuo Arikawa, Shigeki Goto, Setsuo Ohsuga, Takashi Yokomori:
Algorithmic Learning Theory, First International Workshop, ALT '90, Tokyo, Japan, October 8-10, 1990, Proceedings. Springer/Ohmsha 1990, ISBN 3-540-19661-7 [contents]
Informal and Other Publications
- 2019
- [i1]Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. CoRR abs/1909.07539 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint