2010 - 2013 Study of the autonomous path control method for the purpose of the effectiveness performance enhancement of the data transmission
2000 - 2003 Verification methods of secure systems based on logical specifications
2000 - 2001 実現不能な仕様の欠陥情報を用いて部分プログラムを合成する方法に関する研究
1998 - 1998 計算機ネットワークの発展支援機構に関する研究
1995 - 1997 Research on Specification and Verification of real-time software
Show all
Papers (21):
Yong Jin, Satoshi Matsuura, Takao Kondo, Tatsumi Hosokawa, Masahiko Tomoishi. A Lightweight Abnormality Detection Mechanism by Stray Packets Analysis. Proceedings of the 2023 ACM SIGUCCS Annual Conference(SIGUCCS). 2023. 9-11
Masahiro Ishii, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi. A study of classification of texts into categories of cybersecurity incident and attack with topic models. ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy. 2020. 639-646
Masahiro Ishii 0002, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi. A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models. Proceedings of the 6th International Conference on Information Systems Security and Privacy(ICISSP). 2020. 639-646
Yong Jin, Masahiko Tomoishi, Satoshi Matsuura. Detection of Hijacked Authoritative DNS Servers by Name Resolution Traffic Classification. Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019. 2019. 6084-6085
Yong Jin, Masahiko Tomoishi, Satoshi Matsuura. A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress. 2019 IEEE 18th International Symposium on Network Computing and Applications, NCA 2019. 2019
Shigeki Hagihara, Yoshiharu Fushihara, Masaya Shimakawa, Masahiko Tomoishi, Naoki Yonezaki. Web server access trend analysis based on the Poisson distribution. ACM International Conference Proceeding Series. 2017. 256-261