default search action
Shotaro Usuzaki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Naonobu Okazaki, Shotaro Usuzaki, Tsubasa Waki, Hyoga Kawagoe, Mirang Park, Hisaaki Yamaba, Kentaro Aburada:
Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar. Future Internet 16(8): 259 (2024) - [c10]Shotaro Usuzaki, Ryo Saito:
An Architecture of Network Intrusion Detection and Prevention Systems for More Seamless Deployments. GCCE 2024: 396-397 - 2023
- [j6]Keita Nabeyama, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki:
Tsunami evacuation simulation considering road width in Aoshima district. Artif. Life Robotics 28(4): 779-788 (2023) - 2022
- [j5]Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Correction to: Proposal and evaluation for color constancy CAPTCHA. Artif. Life Robotics 27(1): 179 (2022) - 2021
- [j4]Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Proposal and evaluation for color constancy CAPTCHA. Artif. Life Robotics 26(3): 291-296 (2021) - [c9]Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language. IWSEC 2021: 119-133 - 2020
- [j3]Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
On a user authentication method to realise an authentication system using s-EMG. Int. J. Grid Util. Comput. 11(5): 725-734 (2020) - [c8]Hisaaki Yamaba, Yuki Nagatomo, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG. AINA Workshops 2020: 834-844 - [c7]Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication. EIDWT 2020: 323-333
2010 – 2019
- 2019
- [j2]Kentaro Aburada, Yuki Arikawa, Shotaro Usuzaki, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic. Artif. Life Robotics 24(3): 318-323 (2019) - [c6]Hisaaki Yamaba, Shimpei Inotani, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG. AINA Workshops 2019: 693-701 - [c5]Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki:
Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files. NBiS 2019: 305-316 - [c4]Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Manual Alphabets Based Gestures for a User Authentication Method Using s-EMG. NBiS 2019: 570-580 - 2018
- [j1]Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki:
A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method. J. Inf. Process. 26: 257-266 (2018) - [c3]Hisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
A Proposal of New Reading Text CAPTCHA using Random Dot Patterns. CANDAR 2018: 207-212 - [c2]Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Interactive Video CAPTCHA for Better Resistance to Automated Attack. ICMU 2018: 1-2 - 2017
- [c1]Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki:
Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method. NBiS 2017: 914-923
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint