Hiroaki Hazeyama

According to our database1, Hiroaki Hazeyama authored at least 28 papers between 2004 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015

Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies.
IEICE Trans. Inf. Syst., 2015

Benchmarking the load scalability of IPv6 transition technologies: A black-box analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

2014
Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks.
Proceedings of the International Conference on Information Networking 2014, 2014

Detecting anomalies in massive traffic with sketches.
Proceedings of the International Conference of Future Internet 2014, 2014

Oblivious DDoS mitigation with locator/ID separation protocol.
Proceedings of the International Conference of Future Internet 2014, 2014

2013
PhishCage: reproduction of fraudulent websites in the emulated internet.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

EtherPIPE: an ethernet character device for network scripting.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

Building Better Unsupervised Anomaly Detector with S-Transform.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
Enabling secure multitenancy in cloud computing: Challenges and approaches.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012

2011
How much can we survive on an IPv6 network?: experience on the IPv6 only connectivity with NAT64/DNS64 at WIDE camp 2011 Autumn.
Proceedings of the AINTEC '11, Asian Internet Engineering Conference, Bangkok, Thailand, November 09, 2011

2010
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites.
J. Intell. Learn. Syst. Appl., 2010

Demonstration Experiments Towards Practical IP Traceback on the Internet.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Large Scale Demonstration Experiments Towards Acheiving Practical Traceback on the Internet.
Proceedings of the ARES 2010, 2010

2009
Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set.
IEICE Trans. Inf. Syst., 2009

Experiences in emulating 10K AS topology with massive VM multiplexing.
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, 2009

2008
Adaptive Bloom Filter: A Space-Efficient Counting Algorithm for Unpredictable Network Traffic.
IEICE Trans. Inf. Syst., 2008

Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures.
Proceedings of the Workshop on Cyber Security and Test, 2008

Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

An Independent Evaluation of Web Timing Attack and its Countermeasure.
Proceedings of the The Third International Conference on Availability, 2008

Design of an FDB based Intra-domain Packet Traceback System.
Proceedings of the The Third International Conference on Availability, 2008

2007
Proposal of Constructing PKI on Overlay Network.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

2006
Expediting experiments across testbeds with AnyBed: A testbed-independent topology configuration tool.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks.
Proceedings of the Technologies for Advanced Heterogeneous Networks, 2005

2004
Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games.
Proceedings of the 3rd Workshop on Network and System Support for Games, 2004


  Loading...