default search action
Takayuki Sasaki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Takayuki Sasaki, Mami Kawaguchi, Takuhiro Kumagai, Katsunari Yoshioka, Tsutomu Matsumoto:
Observation of Human-Operated Accesses Using Remote Management Device Honeypot. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 291-305 (2024) - [j6]Hiroki Yasui, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto:
SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices. J. Inf. Process. 32: 23-34 (2024) - [j5]Takayuki Sasaki, Jia Wang, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto:
EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities. J. Inf. Process. 32: 789-800 (2024) - [c20]Takayuki Sasaki, Yukihiro Bandoh, Masaki Kitahara:
Sparse Regularization Based on Reverse Ordered Weighted L1-Norm and Its Application to Edge-Preserving Smoothing. ICASSP 2024: 9531-9535 - [c19]Takayuki Sasaki, Takaya Noma, Yudai Morii, Toshiya Shimura, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network. SP 2024: 2291-2309 - 2023
- [j4]Koji Nakao, Katsunari Yoshioka, Takayuki Sasaki, Rui Tanabe, Xuping Huang, Takeshi Takahashi, Akira Fujita, Jun'ichi Takeuchi, Noboru Murata, Junji Shikata, Kazuki Iwamoto, Kazuki Takada, Yuki Ishida, Masaru Takeuchi, Naoto Yanai:
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware. IEICE Trans. Inf. Syst. 106(9): 1302-1315 (2023) - [c18]Takayuki Sasaki, Yukihiro Bandoh, Masaki Kitahara:
Complexity Reduction of Graph Signal Denoising Based on Fast Graph Fourier Transform. ICIP 2023: 1910-1914 - [c17]Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto:
Who are youƒ OSINT-based Profiling of Infrastructure Honeypot Visitors. ISDFS 2023: 1-6 - 2022
- [c16]Takahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto:
An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices. ARES 2022: 146:1-146:8 - [c15]Hiroki Yasui, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto:
SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices. AsiaJCIS 2022: 16-23 - [c14]Jia Wang, Takayuki Sasaki, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto:
Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding Activities. CSP 2022: 71-79 - [c13]Takayuki Sasaki, Akira Fujita, Carlos Hernandez Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices. SP 2022: 2379-2396 - 2021
- [c12]Takayuki Sasaki, Ryuichi Tanida, Masaki Kitahara, Hideaki Kimata:
Fast-Parallel Singular Value Thresholding for Many Small Matrices based on Geometric Feature of Singular Values. APSIPA ASC 2021: 1-8 - 2020
- [j3]Takayuki Sasaki, Carlos Hernandez Gañán, Katsunari Yoshioka, Michel van Eeten, Tsutomu Matsumoto:
Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers. IEICE Trans. Commun. 103-B(4): 389-404 (2020) - [c11]Takayuki Sasaki, Koki Tomita, Yuto Hayaki, Seng Pei Liew, Norio Yamagaki:
Secure IoT Device Architecture Using TrustZone. SECON Workshops 2020: 1-6 - [i3]Takayuki Sasaki, Yusuke Shimada:
Towards a Backdoorless Network Architecture Based on Remote Attestation and Backdoor Inspection. CoRR abs/2007.14748 (2020) - [i2]Takayuki Sasaki, Shuichi Karino, Mikiya Tani, Kazuaki Nakajima, Koki Tomita, Norio Yamagaki:
Security Architecture for Trustworthy Systems in 5G Era. CoRR abs/2007.14756 (2020)
2010 – 2019
- 2019
- [c10]Takayuki Sasaki, Yusuke Morita, Astha Jada:
Access Control Architecture for Smart City IoT Platform. TrustCom/BigDataSE 2019: 717-722 - 2018
- [j2]Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto:
Toward Collaborative Defense Across Organizations. J. Inf. Process. 26: 790-803 (2018) - [c9]Daniele Enrico Asoni, Takayuki Sasaki, Adrian Perrig:
Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture. CIC 2018: 176-187 - [c8]Takayuki Sasaki, Tomoyuki Nagase:
Constructing Digital Watermark Based on Orthogonal Functions. CSCloud/EdgeCom 2018: 140-143 - 2016
- [c7]Takayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler, Adrian Perrig:
SDNsec: Forwarding Accountability for the SDN Data Plane. ICCCN 2016: 1-10 - [c6]Takayuki Sasaki, Masahiro Baba:
Optical distortion correction for eyeglasses-type wearable device using multi-mirror array. ICIP 2016: 1309-1313 - [c5]Takayuki Sasaki, Adrian Perrig, Daniele Enrico Asoni:
Control-plane isolation and recovery for a secure SDN architecture. NetSoft 2016: 459-464 - [i1]Takayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler, Adrian Perrig:
SDNsec: Forwarding Accountability for the SDN Data Plane. CoRR abs/1605.01944 (2016) - 2013
- [c4]Takayuki Sasaki, Yoichi Hatano, Kentaro Sonoda, Yoichiro Morita, Hideyuki Shimonishi, Toshihiko Okamura:
Load distribution of an OpenFlow controller for role-based network access control. APNOMS 2013: 1-6 - 2012
- [j1]Takayuki Sasaki:
A Framework for Detecting Insider Threats using Psychological Triggers. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 99-119 (2012) - 2011
- [c3]Takayuki Sasaki:
Towards Detecting Suspicious Insiders by Triggering Digital Data Sealing. INCoS 2011: 637-642 - 2010
- [c2]Takayuki Sasaki, Masayuki Nakae, Ryuichi Ogawa:
Content oriented virtual domains for secure information sharing across organizations. CCSW 2010: 7-12
2000 – 2009
- 2003
- [c1]Osamu Ogawa, Sylvain Bayon de Noyer, Pascal Chauvet, Katsuya Shinohara, Yoshiharu Watanabe, Hiroshi Niizuma, Takayuki Sasaki, Yuji Takai:
A Practical Approach for Bus Architecture Optimization at Transaction Level. DATE 2003: 20176-20181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint