top

研究業績

リクエストをいただければコピーをお送りします
English
注意: 最新情報はこちらより。

査読付論文

  1. N. Kamiyama, T. Mori, R. Kawahara, and S. Harada,
    ``Optimally Identifying Worm-Infected Hosts.Optimum Identification of Worm-Infected Hosts,''
    IEICE Transactions on Information Systems Vol. E96-B, No. 8, pp. 2084-2094, August 2013 [IEICE]
  2. D. Chiba, K. Tobe, T. Mori, and S. Goto,
    ``Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites,''
    Journal of Information Processing Vol. 21 (2013) No. 3 pp. 539-550 [PDF][bibtex]
  3. N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
    ``Multicast Pre-Distribution VoD System,''
    IEICE Transactions on Communications Vol. E96-B, No. 6, pp. 1459-1471, June 2013 [IEICE]
  4. R. Kawahara, T. Takine, T. Mori, N. Kamiyama, and K. Ishibashi,
    ``Mean-Variance Relationship of the Number of Flows in Traffic Aggregation and Its Application to Traffic Management,''
    Elsevier Computer Networks, vol. 57, issue 6, Pages 1560-1576, April 2013 [ScienceDirect]
  5. N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa,
    ``Optimally Designing ISP-Operated CDN,''
    IEICE Transactions on Communications Vol. E96-B, No. 3, pp. 790-801, March 2013 [IEICE]
    An earlier version of this paper was presented at IEEE Global Internet Symposium 2009.
  6. Y. Ikeda, R. Kawahara, N. Kamiyama, T. Kimura, and T. Mori,
    ``Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data,''
    IEICE Transactions on Communications Vol. E96-B, No. 02, pp. 533--542, Feb 2013 [IEICE]
  7. N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
    ``Autonomic load balancing of flow monitors,''
    Elsevier Computer Networks, vol. 57, issue 3, Pages 741-761, Feburary 2013 [ScienceDirect]
  8. N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
    ``Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-distribution VoD ,''
    IEICE Transactions on Communications Vol. E96-B, No. 01, pp.143--154 Jan 2013 [IEICE]
    An earlier version of this paper was presnted at IEEE IM 2011.
  9. N. Maki, T. Nishio, R. Shinkuma, T. Mori, N. Kamiyama, R. Kawahara, and T. Takahashi
    ``Traffic Engineering of Peer-assisted Content Delivery Network with Content-oriented Incentive Mechanism,''
    IEICE Transactions on Information Systems Vol. E95-D, No. 12, pp. 2860-2869, Dec. 2012. [IEICE]
  10. R. Kawahara, T. Mori, T. Yada, and N. Kamiyama,
    ``Analyzing and Reducing the Impact of Traffic on Large-Scale NAT,''
    IEICE Transactions on Communications, Vol.E95-B, No. 09,pp. 2815-2827, Sep. 2012. [IEICE]
  11. A. Shimoda, T. Mori, and S. Goto,
    ``Extended Darknet: Multi-Dimensional Internet Threat Monitoring System,''
    IEICE Transactions on Communications Vol. E95-B, No. 06, pp. 1915-1923, June 2012. [PDF] Copyright © IEICE
  12. K. Ishibashi, R. Kawahara, T. Mori, T. Kondoh, and S. Asano,
    ``Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability,''
    IEICE Transactions on Communications Vol. E95-B, No. 02, pp. 466-476, Feburary 2012. [IEICE]
    An earlier version of this paper was presented at IEEE Global Inernet Symposium 2007
  13. R. Kawahara, K. Ishibashi, T. Mori, N. Kamiyama, S. Harada, H. Hasegawa, and S. Asano
    ``Detection accuracy of network anomalies using sampled flow statistics,''
    International Journal of Network Management (IJNM), vol. 21, issue 6, pages 513--535, November/December 2011 [Wiley]
  14. N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa
    ``Analyzing Influence of Network Topology on Designing ISP-Operated CDN,''
    Telecommunication Systems (2 September 2011), pp. 1-9, [Springer]
    An earlier version of this paper was presented at IEEE NETWORKS 2010.
  15. N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
    ``Parallel video streaming optimizing network throughput ,''
    Elsevier Computer Communications, vol. 34, issue 10, July 2011, Pages 1182--1194 [Elsevier] [bibtex]
  16. N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
    ``Optimally designing caches to reduce P2P traffic,''
    Elsevier Computer Communications, vol. 34, Issue 7, 16 May 2011, pages 883--897, [Elsevier] [bibtex]
  17. R. Kawahara, K. Ishibashi, T. Mori, N. Kamiyama, and H. Yoshino
    ``Packet sampling TCP flow rate estimation and performance degradation detection method,''
    IEICE Transactions 91-B(5): 1309-1319 (2008) [IEICE] [bibtex]
    An earlier version of this paper was presented at IEEE GLOBECOM 2006
  18. K. Ishibashi, T. Mori, R. Kawahara, Y. Hirokawa, A. Kobayashi, K. Yamamoto, and H. Sakamoto,
    ``Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection,''
    IEICE Transactions 91-B(5): 1331-1339 (2008) [IEICE] [bibtex]
    An earlier version of this paper was presented at IEEE NetDB 2006
  19. T. Mori, T. Takine, J. Pan, R. Kawahara. M. Uchida, and S. Goto,
    ``Identifying Heavy-Hitter Flows From Sampled Flow Statistics,'' (Best Paper Award)
    IEICE Transactions on Communications, Voll. E90-B, No. 11, pp. 3061--3072, November 2007 [PDF] [IEICE] [bibtex] [Google Scholar]
    An earlier version of this paper was presented at ACM/USENIX IMC 2004. The original work has been cited by these work and sflow's packet sampling theory site.
  20. S. Kamei, M. Uchida, T. Mori, and Y. Takahashi,
    ``Estimating scale of peer-to-peer file sharing applications using multilayer partial measurement,''
    Electronics and Communications in Japan (Part I: Communications) Volume 90, Issue 3, Date: March 2007, Pages: 54-63 [Wiley] [Google Scholar]
  21. R. Kawahara, K. Ishibashi, T. Mori, T. Ozawa and T. Abe,
    ``Method of Bandwidth Dimensioning and Management for Aggregated TCP Flows with Heterogeneous Access Links,''
    IEICE Trans. Commun., vol.E88-B, no.12, pp.4605-4615, Dec. 2005. [IEICE] [bibtex]
  22. T. Mori, M. Uchida and S. Goto,
    ``Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-peer,''
    Systems and Computers in Japan, Volume 36, Issue 11, Pages 70 -- 81, 2005 (DOI: 10.1002/scj.20283) [IEICE] [bibtex] [Google Scholar]
  23. T. Mori, R. Kawahara, S. naito and S. Goto,
    ``On the Characteristics of Internet Traffic Variability: Spikes and Elephants,''
    IEICE Transactions on Information and Systems, Vol. E87-D, No. 12, pp. 2644-2653, Dec. 2004 [IEICE] [wikipedia] [bibtex] [Google Scholar]

査読付論文(和文)

  1. 木佐森幸太,下田晃弘,森達哉, 後藤滋樹,
    TCPフィンガープリントによる悪意のある通信の分析,”
    情報処理学会論文誌, Vol. 52, No.6, pp. 2009-2018, June 2011. [CiNii]
  2. 亀井聡,内田真人,森達哉, 高橋豊,
    複数レイヤでの部分測定を用いたP2Pファイル共有アプリケーションの規模推定,”
    電子情報通信学会和文論文誌, Vol.J88-B, No.11, pp. 2171-2180, Nov. 2005. [CiNii]
  3. 森達哉,内田真人,後藤滋樹,
    ``インターネットトラヒックのフロー分析 : webとP2Pの特性比較,''
    電子情報通信学会和文論文誌, Vol.J87-D-I, No.5, pp. 561-571, May. 2004.[CiNii]

査読付国際会議/ワークショップ

  1. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto
    ``SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs''
    Proc. Traffic Monitoring and Analysis workshop (TMA 2015), Apr. 2015. (to appear)
  2. A. Fujino, J. Murakami, and T. Mori
    ``Discovering Similar Malware Samples Using API Call Topics''
    Proceedings of the 2015 IEEE Consumer Communications and Networking Conference (CCNC 2015). pp. 146--153, Jan 2015 [IEEE Xplore][bibtex][PDF][slide] (Note: paper PDF is the accepted version, not the final published version, see the IEEE web)
  3. N. Kamiyama, R. Kawahara, and T. Mori,
    ``Loss Recovery Method for Content Pre-distribution in VoD Service,''
    Proc. World Telecommunications Congress (WTC 2014), pp.1-6, June 2014 [IEEE Xplore] BEST PAPER AWARD
  4. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto,
    ``Spatio-temporal Factorization of Log Data for Understanding Network Events,''
    Proc. IEEE INFOCOM 2014, May 2014 [bibtex][PDF] (accepted version, not the final published version, see the IEEE web)
  5. N. Maki, R. Shinkuma, T. Mori, N. Kamiyama, and R. Kawahara,
    ``A Periodic Combined-Content Distribution Mechanism in Peer-Assisted Content Delivery Networks,''
    ITU-T Kaleidoscope conference, April 2013 (accepted).
  6. N. Maki, T. Nishio, R. Shinkuma, T. Takahashi, T. Mori, N. Kamiyama, and R. Kawahara,
    ``Expected Traffic Reduction by Content-oriented Incentive in Peer-assisted Content Delivery Networks,''
    Proc. International Conference on Information Networking (ICOIN 2013), Jan. 2013. [IEEE Xplore]
  7. D. Chiba, K. Tobe, T. Mori, and S. Goto,
    ``Detecting Malicious Websites by Learning IP Address Features,''
    Proc. IEEE/IPSJ SAINT 2012, July 2012 [IEEE Xplore][bibtex]
  8. N. Kamiyama, T. Mori, and R. Kawahara,
    ``Autonomic Load Balancing for Flow Monitoring,''
    Proc. IEEE ICC 2012, June 2012 [PDF]
  9. T. Mori, Y. Takahashi, K. Sato, and K. Ishibashi
    ``How is E-mail Sender Authentication Used and Misused?,''
    Proc. 8th Conference on Email and Anti-spam (CEAS 2011), Perth, WA, Australia, Sep. 2011 [PDF] [ACM portal] [bibtex]
  10. Yuta Takata, Shigeki Goto, Tatsuya Mori,
    ``Analysis of Redirection Caused by Web-based Malware,''
    APAN 32nd Meeting, Network Research Workshop 2011, August 2011. (Best Student Paper Award) [PDF]
  11. R. Kawahara, S. Harada, N. Kamiyama, T. Mori, and H. Hasegawa,
    ``Traffic engineering using overlay network,''
    Proc. IEEE ICC 2011, Kyoto, Japan, June 2011. [IEEE Xplore] [PDF] [bibtex]
  12. N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
    ``Limiting pre-distribution and clustering users on multicast pre-distribution VoD,''
    Proc. IEEE IM 2011, 706--709, Dublin, Ireland, May 2011 [IEEE Xplore] [bibtex]
  13. R. Kawahara, N. Kamiyama, T. Mori, and H. Hasegawa,
    ``Performance evaluation of peer-assisted content distribution,''
    Proc. IEEE CCNC 2011, Las Vegas, US, Jan 2011. [IEEE Xplore]
  14. N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa
    ``Analyzing Influence of Network Topology on Designing ISP-Operated CDN,''
    Proc. IEEE NETWORKS 2010, Walsaw, Poland, Sep 2010. [IEEE Xplore]
  15. T Mori,H. Esquivel, A. Akella, A. Shimoda, and S. Goto
    ``Understanding Large-Scale Spamming Botnets From Internet Edge Sites,''
    Proc. Seventh Conference on Email and Anti-spam (CEAS 2010), Redmond, Washington, USA, Jul. 2010 [PDF][slide][poster]
  16. K. Ishibashi, T. Kondoh, S. Harada, T. Mori, and R. Kawahara,
    ``Detecting Anomalous Traffic using Communication Graphs,''
    World Telecommunications Congress 2010 (WTC2010), Vienna, Austria, September 2010. [IEEE Xplore]
  17. A. Shimoda, T. Mori, and S. Goto,
    ``Sensor in the Dark: Building Untraceable Large-scale Honeypots using Virtualization Technologies,''
    Proc. IEEE/IPSJ SAINT 2010, pp. 22--30, Seoul, South Korea, July 2010. (Best Student Paper Award) [pdf] [IEEE Xplore] [bibtex]
  18. N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
    ``Optimally Designing Capacity and Location of Caches to Reduce P2P Traffic,''
    IEEE ICC 2010, Cape Town, South Africa, May 2010. [IEEE Xplore]
  19. T. Mori, R. Kawahara, H. Hasegawa, and S. Shimogawa
    ``Characterizing traffic flows originating from large-scale video sharing services,''
    Proc. COST Traffic Monitoring and Analysis (TMA) workshop 2010, pp. 17-31, Springer-Verlag LNCS 6003, Zurich, Switzerland, Apr. 2010.
    [PDF] [Springer] [Google Book] [slide] [talk] [bibtex] [Google Scholar] (notice: I really don't recommend you to spend your time on watching the movie, though...)
  20. N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
    ``Impact of Topology on Parallel Video Streaming,''
    IEEE/IFIP NOMS 2010, Osaka, Japan, Apr 2010. [IEEE Xplore]
  21. H. Esquivel, T. Mori, and A. Akella
    ``On the Effectiveness of IP reputation for Spam Filtering,''
    Proc. IEEE/ACM COMSNETS 2010, pp. 373--382, Bengalooru, India, Jan. 2010. (Best Paper Award) [paper][slide][CiteSeer][ACM portal][bibtex][Google Scholar]
  22. T. Mori, N. Kamiyama, S. Harada, H. Hasegawa, and R. Kawahara,
    ``Improving deployability of peer-assisted CDN platform with incentive,''
    Proc. IEEE GLOBECOM 2009, pp. 1-7, Honolulu, HI, USA., Dec. 2009 [pdf] [slide] [ACM portal] [bibtex] [Google Scholar]
  23. H. Esquivel, T. Mori, and A. Akella
    ``Router-Level Spam Filtering Using TCP Fingerprints: Architecture and Measurement-Based Evaluation,''
    Sixth Conference on Email and Anti-spam (CEAS 2009), Mountain View, CA, USA, Jul. 2009 [paper] [CiteSeer] [Google Scholar]
  24. R. Kawahara, T. Mori, N. Kamiyama, S. Harada, and H. Hasegawa,
    ``Adaptive bandwidth control to handle long-duration large flows,''
    Proc. IEEE ICC 2009 Next Generation Networking Symposium, pp. 1--6, Dresden, Germany, June 2009. [IEEE Xplore] [bibtex]
  25. N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa
    ``ISP-Operated CDN,''
    IEEE Global Internet Symposium 2009, Apr. 2009. [IEEE Xplore] [Google Scholar]
  26. K. Ishibashi, T. Mori, S. Harada, T. Kondoh, R. Kawahara, and S. Asano,
    ``Detecting Anomalies in Inter-hosts Communication Graph,''
    CERT FloCon 2009, Jan. 2009 [PDF]
  27. S. Harada, R. Kawahara, T. Mori, N. Kamiyama, S. Hasegawa, and H. Yoshino
    ``A method of detecting network anomalies in cyclic traffic',''
    Proc. IEEE GLOBECOM 2008, pp. 2057-2061, New Orleans, LA, USA Dec., 2008. [PDF] [IEEE Xplore] [bibtex] [Google Scholar]
  28. N. Kamiyama, T. Mori, R. Kawahara, and S. Harada,
    ``Optimum Identification of Worm-Infected Hosts,''
    Proc. IEEE IPOM 2008, Samos Island, Greece, Sep., 2008. [ACM portal]
  29. N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Yoshino
    ``Extracting Worm-Infected Hosts Using White List,''
    IEEE/IPSJ SAINT 2008, Turku, FINLAND, Aug., 2008. [IEEE Xplore]
  30. R. Kawahara, K. Ishibashi, T. Mori, N. Kamiyama, and S. Asano
    ``Detection accuracy of network anomalies using sampled flow statistics''
    IEEE GLOBECOM 2007, Washington, D.C., USA, November 2007. [IEEE Xplore]
  31. N. Kamiyama, T. Mori, R. Kawahara, and E. K. Lua
    ``Efficient Timeout Checking Mechanism for Traffic Control,''
    IEEE ICCCN 2007, Honolulu, Hawaii, USA, Aug 2007 [IEEE Xplore]
  32. K. Ishibashi, R. Kawahara, T. Mori, and R. Kawahara
    ``Effect of sampling rate and monitoring granularity on anomaly detectability,''
    IEEE Global Inernet Symposium 2007 Minisymposia, Anchorage, Alaska, USA, May 2007. [PDF] [IEEE Xplore] [Google Scholar]
  33. N. Kamiyama, T. Mori, and R. Kawahara
    ``Simple and Adaptive Identification of Superspreaders by Flow Sampling,''
    Proc. IEEE INFOCOM 2007 Minisymposia, pp. 2481-2485, Anchorage, Alaska, USA, May 2007. [abstract][bibtex][Google Scholar]
  34. T. Mori, R. Kawahara, N. Kamiyama, and S. Harada
    ``Inferring original traffic pattern from sampled flow statistics,''
    IEEE/IPSJ SAINT 2007 Workshop on Internet Measurement Technology, Hiroshima, Japan, January 2007. [abstract][PDF][bibtex]
  35. R. Kawahara, T. Mori, N. Kamiyama, S. Harada, and S. Asano
    ``A study on detecting network anomalies using sampled flow statistics,''
    IEEE/IPSJ SAINT 2007 Workshop on Internet Measurement Technology, Hiroshima, Japan, January 2007. [abstract] [Google Scholar]
  36. K. Ishibashi, T. Mori, R. Kawahara, K. Toyama, S. Osawa, and S. Asano,
    ``2-D Bitmap for Summarizing Inter-Host Communication Pattern,''
    IEEE/IPSJ SAINT 2007 Workshop on Internet Measurement Technology, Hiroshima, Japan, January 2007. [IEEE Xplore]
  37. R. Kawahara, T. Mori, Keisuke Ishibashi, Noriaki Kamiyama and Takeo Abe,
    ``Estimating flow rate from sampled packet streams for detection of performance degradation at TCP flow leveL,''
    IEEE GLOBECOM 2006, San Francisco, USA, December 2006. [IEEE Xplore]
  38. R. Kawahara, T. Mori, and T. Abe,
    ``QoS control to handle long-duration large flows and its performance evaluation,''
    IEEE ICC 2006, Istanbul, Turkey, June 2006. [IEEE Xplore]
  39. K. Ishibashi, T. Mori, R. Kawahara, Y. Hirokawa, A. Kobayashi, K. Yamamoto, and H. Sakamoto,
    ``Estimating Top-N Hosts in Cardinality,''
    Proc. IEEE NetDB'06, Atlanta, GA, USA, April 2006. [IEEE Xplore] [Google Scholar]
  40. N. Kamiyama and T. Mori,
    ``Simple and Accurate Identification of High-Rate Flows by Packet Sampling,''
    Proc. IEEE INFOCOM 2006, pp. 2836-2848, Barcelona, Spain, April 2006. [PDF] [IEEE Xplore] [bibtex] [Google Scholar]
  41. R. Kawahara, K. Ishibashi, T. Mori, and T. Abe,
    ``A Method of Detecting Performance Degradation at TCP Flow Level from Sampled Packet Streams,''
    IEEE HPSR 2005, HongKong, China, May 2005. [IEEE Xplore] [Google Scholar]
  42. T. Mori, M. Uchida, R. Kawahara, J. Pan and S. Goto,
    ``Identifying elephant flows through periodically sampled packets,''
    Proc. ACM/USENIX IMC 2004, pp. 115-120, Taormina, Italiy, October 2004. [PDF] [ACM portal] [bibtex] [Google Scholar]
  43. R. Kawahara, T. Mori, S. Sumita, and T. Abe,
    ``A scalable form of QoS control that handles long-duration P2P flows,''
    XIX World Telecommunications Congress (WTC/ISS 2004), 2004.
  44. R. Kawahara, K. Ishibashi, T. Mori, T. Ozawa, S. Sumita, and T. Abe,
    ``A method of bandwidth dimensioning and management for aggregated TCP flows with heterogeneous access links,''
    Proc. 11th International Telecommunications Network Strategy and Planning Symposium, pp.15-20, June, 2004. [IEEE Xplore] [Google Books]
  45. T. Mori, R. Kawahara, S. Naito and S. Goto,
    ``On the Characteristics of Internet Traffic Variability: Spikes and Elephants,''
    IEEE/IPSJ SAINT 2004, pp. 99-106, Tokyo, Japan, 2004 [PDF] [IEEE Xplore] [slide] [wikipedia] [bibtex] [Google Scholar]
    The conference paper was developed into a full journal article.

解説記事

  1. 森,木村,池田,上山,川原,
    ``MapReduceシステムのネットワーク負荷分析,''
    オペレーションズ・リサーチ,vol. 56, no. 6, pp.331-338,June 2011. [CiNii]
  2. 川原,上山,森,長谷川,
    ``オーバレイネットワークによるトラヒック可制御化技術,’’
    NTT技術ジャーナル (発行:社団法人電気通信協会) 2010年6月号 [PDF]
  3. 川原,森,上山,
    ``IPフロー計測技術の応用,’’
    信学会会誌小特集 「IP網トラヒック計測」,2010年4月号 [CiNii]
  4. 川原,森,滝根,浅野,
    ``サンプルパケット情報を用いたトラヒック測定分析手法,''
    オペレーションズ・リサーチ, vol.53、no.6, pp.328--333, June 2008. [PDF]
  5. 川原,森,原田,上山,近藤,石橋,
    ``異常トラヒック測定分析手法,''
    NTT技術ジャーナル (発行:社団法人電気通信協会) 2008年3月号 [PDF]
  6. 川原,森,石橋,阿部,
    ``超高速ネットワークにおけるトラヒック測定分析技術,''
    オペレーションズ・リサーチ, vol.50, no.3, pp.163--168, March 2005. [PDF]
  7. K. Ooi, S. Kamei, and T. Mori, ``Survey of the State of P2P File Sharing Applications,''
    NTT Technical Review, Vol.2 No.5, pp. 24-28, May 2004. [PDF]

テクニカルレポート

  1. Tatsuya Mori, Holly Esquivel, Aditya Akella, Akihiro Shimoda, and Shigeki Goto,
    ``Understanding the World's Worst Spamming Botnet,''
    The University of Wisconsin-Madison Computer Sciences Tech Reports TR1660, June 2009 [PDF|abstract]
  2. Tatsuya Mori, Holly Esquivel, Aditya Akella, Z. Morley Mao, Yinglian Xie, and Fang Yu,
    ``On the Effectiveness of Pre-Acceptance Spam Filtering,''
    The University of Wisconsin-Madison Computer Sciences Tech Reports TR1650, Feb. 2009 [PDF|abstract]

招待講演/講義

  1. 森 達哉,
    ``ネットワークセキュリティと”不”自然科学,''
    NetSci 研究会,2014年5月 [PDF]
  2. 森 達哉,
    ``ネットワークから見たスパム・マルウェアの研究とその舞台裏,''
    先導的ITスペシャリスト育成推進プログラム ISSスクエア・ネットワーク分科会,2010年11月 [講義スライド]
  3. 森 達哉,
    ``国内外のスパム脅威と対策の動向,''
    マルチメディア推進フォーラム PART 501 「サイバー攻撃の脅威とその対策の動向」,2010年4月 [slide]
  4. T. Mori,
    ``A robust approach of detecting anomalous hosts,''
    Intimate 2006, Network Anomaly Diagnosis Workshop, Paris, France, July 2006. (invited) [slide]
  5. T. Mori, R. Kawahara, and N. Kamiyama,
    ``A simple and scalable detector of heavy-hitter flows,''
    Sampling Workshop 2005, Paris, France, July 2005. (invited)
  6. 森 達哉,
    ``インターネットトラフィックの統計分析〜傾向と対策〜,''
    テレコムサービス協会 技術委員会 最新技術動向セミナー 2002年3月 [slide]

その他口頭発表(筆頭分のみ)

  1. T. Mori, K. Sato, Y. Takahashi, T. Kimura, and K. Ishibashi
    ``Combining IP reputation services,''
    IEICE Society Conference 2011, BS-6-42, September 2011. [CiNii]
  2. 森達哉,佐藤一道,高橋洋介,木村達明,石橋圭介
    ``IPレピュテーションの統合方法,''
    IA/ICSS研究会, 2011年6月 [abstract][slide] 2011年度 IA研究会研究賞受賞
  3. 森達哉,木村達明,池田泰弘,上山憲昭,川原亮一
    ``MapReduceのネットワーク負荷分析,''
    CQ/NS/ICM/NwGN研究会, 2010年11月 [abstract][slide]
  4. 森達哉
    ``電子メール送信元認証技術の正しい利用および誤用の分析,''
    ICSS研究会, 2010年7月 [abstract][slide]
  5. 森達哉, 川原亮一,長谷川治久,下川信祐
    ``大規模映像共有サービスのワークロード分析,''
    NS研究会, 2009年11月 [abstract][slide]
  6. T. Mori, A. Nakao, N. Kamiyama, H. Hasegawa, and R. Kawahara
    ``Toward scalable byte caching on high-speer routers,''
    IEICE Society Conference 2009, BS-5-6, September 2009. [slide][CiNii]
  7. 森達哉,ホリー・エスキベル,アキラ アディティヤ,下田晃弘,後藤滋樹
    ``[特別講演]大規模スパムボットの計測と全体像解明,''
    IA/JANOG 研究会, 2009年7月 [abstract] 2009年度 IA研究会研究賞受賞
  8. 森達哉, 上山憲昭, 原田薫明, 長谷川治久, 川原亮一
    ``[奨励講演]インセンティブによるピア協力型CDNの運用実現性向上,''
    NS研究会, 2009年6月 [abstract|slide]
  9. 森達哉
    ``PrBL:スパムメールのための確率的なブラックリストの提案,''
    NS研究会, 信学技報, vol. 108, no. 457, NS2008-146, pp. 15-20, 2009年3月 [abstract]
  10. T. Mori, N. Kamiyama, S. Harada, H. Hasegawa, and R. Kawahara,
    ``How Incentive Helps In Making Peer-assisted CDN Deployable?,''
    IEICE General Conference BS-4-14, March 2009 [CiNii]
  11. 森達哉
    ``ここまで捨てられる!スパムメール対策術 〜技術の現状と展望〜''
    JANOG 23 2009年1月 [ 事後公開資料]
  12. 森達哉, 上山憲昭, 原田薫明, 長谷川治久, 川原亮一,
    ``ユーザへの直接的なインセンティブに基づくP2P CDNアーキテクチャ,''
    信学技報, vol. 108, no. 286, NS2008-102, pp. 81-86, 2008年11月.
  13. 森達哉
    ``ネットワークフロー情報解析〜最新技術と運用の実際〜,'', INTEROP TOKYO ワークショップW12, 2008年6月
  14. 森達哉
    ``To Sample or Not To Sample?''
    JANOG 19 2007年1月 [ 事後公開資料]
  15. 森達哉
    "パケットサンプリングで失われる情報は何か?,"
    Internet Week 2006 xFlow Operator's BoF 2006年12月.[slide]
  16. 森達哉, 川原亮一,上山憲昭, 石橋圭介, 原田薫明,
    "サンプルフロー統計から元のトラヒックパターンを推定する方法,"
    信学技報NS2006-125, pp. 13-18, 2006年11月. [slide]
  17. 森達哉
    "パケットサンプリングとフロー分析〜サンプリングで統計はどう変わるか?〜"
    IRS 10 [slide]
  18. 森達哉, 石橋圭介, 上山憲昭, 川原亮一, 浅野正一郎,
    "[奨励講演]NetDelta: 大規模トラヒックデータの長時間・詳細分析方法,"
    信学技報NS2006-94, pp. 133-138, 2006年9月. [slide]
  19. 森達哉,石橋圭介,上山憲昭,川原亮一,
    "NetHost: ホスト毎トラヒックサマリ集約方法の提案,"
    電子情報通信学会技術研究報告,NS2005-159,pp. 5-8,(2006-3)
  20. 森達哉,石橋圭介,上山憲昭,川原亮一,
    "NetHost: ホスト毎トラヒックサマリ集約方法の提案,"
    2006年電子情報通信学会総合大会,BS-5-2,(2006-03)
  21. 森達哉, 川原亮一,上山憲昭,石橋圭介,阿部威郎,
    "通信パターン分析に基づくワーム感染ホスト検出方法,"
    電子情報通信学会技術研究報告,CQ2005-67, vol. 105, no. 406, pp.1-6, (2005-11)
  22. 森達哉, 川原亮一,上山憲昭,
    "ナイーブベイズ分類器のネットワーク管理への応用,"
    電子情報通信学会技術研究報告,NS2005-103, pp.17-20, (奨励講演),(2005-10)
  23. 森達哉, 川原亮一,上山憲昭,
    "通信パターンに基づくホスト分類方法,"
    2005年電子情報通信学会ソサイエティ大会,B-7-4 (2005-09)
  24. 森達哉, 川原亮一,上山憲昭,
    "ナイーブベイズ分類器を用いたフロー特性分類方法,"
    電子情報通信学会技術研究報告,NS2005-3, pp.9-12, (2005-04) 2005年度 NS研究会研究賞受賞
  25. 森達哉,川原亮一,上山憲昭,石橋圭介,阿部威郎,
    "IPフロー統計の時間的特性,"
    2005年電子情報通信学会総合大会,B-7-26,(2005-03).
  26. 森達哉,内田真人,川原亮一,後藤滋樹,
    "サンプルパケットによって構成されるフロー統計の評価,"
    2004年電子情報通信学会ソサイエティ大会,BS-3-1,(2004-09).
  27. T. Mori,
    ``Detecting Abusive Traffic Flows in Very High-Speed Networks,''
    Joint Workshop of the Core University Program and JSPS 163rd Committee on Next Generation Internet Technology, Daejong, Korea, Nov. 2004.
  28. T. Mori, M. Uchida, R. Kawahara, J. Pan and S. Goto,
    "Identifying elephant flows through periodically sampled packets,"
    IEICE Technical Report, IN2004-32, pp. 31-38, (2004-07)
  29. 森達哉,内田真人,川原亮一,後藤滋樹,
    "サンプルしたパケットからエレファントフローを特定する手法,"
    電子情報通信学会技術研究報告,NS2004-13, pp. 17-20 (2004-04).
  30. 森達哉,内田真人,川原亮一,後藤滋樹,
    "パケットサンプリングを用いたエレファントフローの特定手法,"
    2004年電子情報通信学会総合大会,B-7-117,(2004-03).
  31. 森達哉, 亀井聡,大井恵太,
    "P2Pトラヒックの測定と特性評価,"
    2003年電子情報通信学会ソサイエティ大会,SB-3-1,(2003-09) [slide]
  32. 森達哉,川原亮一,内藤昭三,
    "フローレート分布のパレート則とトラフィック流量変動の関係について,"
    2003年電子情報通信学会総合大会,SB-4-2 (2003-03).
  33. T. Mori, R. Kawahara and S. Naito,
    "Analysis of Non-Gaussian Nature of Network Traffic," [preprint]
    IEICE General Conference 2002, SB-13-5, (2002-03)
  34. 森達哉,川原亮一,内藤昭三,
    "Per-time-blockフロー統計に着目したネットワークトラフィック解析,"
    電子情報通信学会技術研究報告,IN2001-180,pp.1-8 (2002-03).
  35. T. Mori and R. Kawahara,
    "A study on the marginal distribution of network traffic,"
    IEICE Technical Report, IN2001-107, pp. 1-7, (2001-11)[slide]
  36. T. Mori and R. Kawahara,
    "Is Hurst parameter sufficient for evaluating the performance of bursty traffic?,"
    IEICE Society Conference 2001, SB-13-5, (2001-09) [Science Links Japan] [Google Scholar]
  37. 森達哉,
    "同様なハースト指数を持つ自己相似トラフィックの特性の差位に関する一考察,"
    2001年電子情報通信学会総合大会,B-7-73 (2001-03).

Tatsuya Mori
E-mail: click here to reveal my e-mail address (reCAPTCHA)