| Identifying elephant flows through periodically sampled packets T Mori, M Uchida, R Kawahara, J Pan, S Goto Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 115-120, 2004 | 273 | 2004 |
| Fingerprinting attack on Tor anonymity using deep learning K Abe, S Goto Proceedings of the Asia-Pacific Advanced Network 42 (0), 15-20, 2016 | 190 | 2016 |
| A method of tracing intruders by use of mobile agents M Asaka Proc. INET'99, 1999 | 178 | 1999 |
| Detecting android malware by analyzing manifest files R Sato, D Chiba, S Goto Proceedings of the Asia-Pacific advanced network 36 (23-31), 17, 2013 | 154 | 2013 |
| The implementation of IDA: An intrusion detection agent system M Asaka Proc. 11th FIRST'99, 1999 | 95 | 1999 |
| On the characteristics of Internet traffic variability: Spikes and elephants T Mori, R Kawahara, S Naito, S Goto IEICE TRANSACTIONS on Information and Systems 87 (12), 2644-2653, 2004 | 88 | 2004 |
| Detecting malicious websites by learning IP address features D Chiba, K Tobe, T Mori, S Goto 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012 | 87 | 2012 |
| A new intrusion detection method based on discriminant analysis M Asaka, T Onabuta, T Inoue, S Okazawa, S Goto IEICE TRANSACTIONS on Information and Systems 84 (5), 570-577, 2001 | 76 | 2001 |
| A new intrusion detection method based on process profiling Y Okazaki, I Sato, S Goto Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002), 82-90, 2002 | 65 | 2002 |
| ShamFinder: An automated framework for detecting IDN homographs H Suzuki, D Chiba, Y Yoneya, T Mori, S Goto Proceedings of the Internet Measurement Conference, 449-462, 2019 | 64 | 2019 |
| DomainProfiler: Discovering domain names abused in future D Chiba, T Yagi, M Akiyama, T Shibahara, T Yada, T Mori, S Goto 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 62 | 2016 |
| An improved intrusion detection method based on process profiling I Sato, Y Okazaki, S Goto IPSJ Journal 43 (11), 3316-3326, 2002 | 57 | 2002 |
| Autonomous traveling control of the" TAO Aicle" intelligent wheelchair O Matsumoto, K Komoriya, K Toda, S Goto, T Hatase, H Nishimura 2006 IEEE/RSJ international conference on intelligent robots and systems …, 2006 | 55 | 2006 |
| Identifying heavy-hitter flows from sampled flow statistics T Mori, T Takine, J Pan, R Kawahara, M Uchida, S Goto IEICE Transactions on Communications 90 (11), 3061-3072, 2007 | 52 | 2007 |
| Flow analysis of internet traffic: World Wide Web versus peer‐to‐peer T Mori, M Uchida, S Goto Systems and Computers in Japan 36 (11), 70-81, 2005 | 43 | 2005 |
| Monitoring TLS adoption using backbone and edge traffic C Chan, R Fontugne, K Cho, S Goto IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops …, 2018 | 40 | 2018 |
| DomainChroma: Building actionable threat intelligence from malicious domain names D Chiba, M Akiyama, T Yagi, K Hato, T Mori, S Goto Computers & Security 77, 138-161, 2018 | 37 | 2018 |
| {DomainScouter}: Understanding the risks of deceptive {IDNs} D Chiba, AA Hasegawa, T Koide, Y Sawabe, S Goto, M Akiyama 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 32 | 2019 |
| Program synthesis from natural deduction proofs S Goto Proceedings of the 6th international joint conference on Artificial …, 1979 | 32 | 1979 |
| A feasibility study of radio-frequency retroreflector attack S Wakabayashi, S Maruyama, T Mori, S Goto, M Kinugawa, Y Hayashi, ... 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018 | 26 | 2018 |