Hiroshi Tsunoda

According to our database1, Hiroshi Tsunoda authored at least 25 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Security and Privacy Awareness: for Software Creators and Users.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

2018
BGP/MPLS Layer 3 VPN Multicast Management Information Base.
RFC, December, 2018

L2L3 VPN Multicast MIB.
RFC, December, 2018

Feasibility of Societal Model for Securing Internet of Things.
KSII Trans. Internet Inf. Syst., 2018

Analyzing darknet TCP traffic stability at different timescales.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
Feasibility of societal model for securing Internet of Things.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2014
Focus on accuracy and consistency of advanced applications for monitoring the future Internet.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Managing syslog.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2013
G-MIB: Green-oriented Management Information Base and its standardization in IETF.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

2012
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy.
J. Information Security, 2012

Security by simple network traffic monitoring.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

2011
Development of a WLAN based monitoring system for group activity measurement in real-time.
J. Commun. Networks, 2011

2010
Wireless telemedicine services over integrated IEEE 802.11/WLAN and IEEE 802.16/WiMAX networks.
IEEE Wirel. Commun., 2010

2009
A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

2008
Detecting DRDoS attacks by a simple response packet confirmation mechanism.
Comput. Commun., 2008

Network Application Identification Using Transition Pattern of Payload Length.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition.
Proceedings of IEEE International Conference on Communications, 2008

A Reliable Network Identification Method Based on Transition Pattern of Payload Length.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Ultra-Mobile Echo Network in Health Care System.
Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, 2008

2007
A Low Cost Worm Detection Technique based on Flow Payload Similarity.
Proceedings of the WEBIST 2007, 2007

Distributed Early Worm Detection Based on Payload Histograms.
Proceedings of IEEE International Conference on Communications, 2007

2006
Geographical and Orbital Information Based Mobility Management to Overcome Last-Hop Ambiguity over IP/LEO Satellite Networks.
Proceedings of IEEE International Conference on Communications, 2006

Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

2004
Supporting IP/LEO satellite networks by handover-independent IP mobility management.
IEEE J. Sel. Areas Commun., 2004


  Loading...