2010 - 2013 Study of the autonomous path control method for the purpose of the effectiveness performance enhancement of the data transmission
2000 - 2003 Verification methods of secure systems based on logical specifications
2000 - 2001 実現不能な仕様の欠陥情報を用いて部分プログラムを合成する方法に関する研究
1998 - 1998 計算機ネットワークの発展支援機構に関する研究
1995 - 1997 Research on Specification and Verification of real-time software
Show all
Papers (23):
Yong Jin, Satoshi Matsuura, Takao Kondo, Tatsumi Hosokawa, Masahiko Tomoishi. A Lightweight Abnormality Detection Mechanism by Stray Packets Analysis. Proceedings of the 2023 ACM SIGUCCS Annual Conference(SIGUCCS). 2023. 9-11
Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai. Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification. ACM International Conference Proceeding Series. 2021. 47-56
Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai. A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone. 2020 International Symposium on Networks, Computers and Communications, ISNCC 2020. 2020
Masahiro Ishii, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi. A study of classification of texts into categories of cybersecurity incident and attack with topic models. ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy. 2020. 639-646
Masahiro Ishii 0002, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi. A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models. Proceedings of the 6th International Conference on Information Systems Security and Privacy(ICISSP). 2020. 639-646
Shigeki Hagihara, Yoshiharu Fushihara, Masaya Shimakawa, Masahiko Tomoishi, Naoki Yonezaki. Web server access trend analysis based on the Poisson distribution. ACM International Conference Proceeding Series. 2017. 256-261