default search action
Shinichi Matsumoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j3]Seiji Aoyagi, Junya Sato, Tomokazu Takahashi, Masato Suzuki, Shinichi Matsumoto:
Fabrication of Microneedle from Stretched Biodegradable Polymer Sheet by 3D Laser Machining. J. Robotics Mechatronics 32(2): 390-400 (2020)
2010 – 2019
- 2017
- [c9]Ryosuke Miyazaki, Junpei Kawamoto, Shinichi Matsumoto, Kouichi Sakurai:
Host independent and distributed detection system of the network attack by using OpenFlow. ICOIN 2017: 236-241 - 2016
- [c8]Linghuan Xiao, Shinichi Matsumoto, Tomohisa Ishikawa, Kouichi Sakurai:
SQL Injection Attack Detection Method Using Expectation Criterion. CANDAR 2016: 649-654 - 2015
- [c7]Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Android ad library focusing on HTTP connections and view object redraw behaviors. ICOIN 2015: 104-109 - 2014
- [j2]Naoya Kajiwara, Shinichi Matsumoto, Yuuki Nishimoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework. J. Networks 9(11): 2905-2913 (2014) - [c6]Shinichi Matsumoto, Kouichi Sakurai:
Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image. AsiaJCIS 2014: 148-155 - [c5]Shinichi Matsumoto, Yuya Onitsuka, Junpei Kawamoto, Kouichi Sakurai:
Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage. WISA 2014: 83-94 - 2013
- [c4]Shinichi Matsumoto, Kouichi Sakurai:
A proposal for the privacy leakage verification tool for Android application developers. ICUIMC 2013: 54 - [c3]Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Android API Call Using Logging Mechanism within Android Framework. SecureComm 2013: 393-404 - 2010
- [j1]Kazuo Nakamoto, Shinichi Matsumoto, Masahiro Anzai:
Development of High-Acceleration and Ultra-Precision Linear Motor Driven Machining Center and its Characteristics. Int. J. Autom. Technol. 4(5): 454-459 (2010)
2000 – 2009
- 2006
- [c2]Hiroshi Yajima, Shinichi Matsumoto, Ryôichi Sasaki:
Proposal of Risk Communications Supporting Method in Multiplex Risk Communicator. ETFA 2006: 255-260 - 2000
- [c1]Shinichi Matsumoto, Makoto Amamiya:
Network Management with Intelligent Trader. COMPSAC 2000: 161-163
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint