Noriaki Yoshiura

Orcid: 0000-0001-8831-1871

According to our database1, Noriaki Yoshiura authored at least 47 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Obfuscating LLVM IR with the Application of Lambda Calculus.
Proceedings of the Intelligent Information and Database Systems - 15th Asian Conference, 2023

2022
Modeling and Verification of a Hybrid Model of Mobile Banking Based Branchless Banking System in E-Banking Using SPIN.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Smart Help Desk to support user's PC settings.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

AntiPhiMBS-TRN: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Transaction Level.
Proceedings of the Intelligent Information and Database Systems - 14th Asian Conference, 2022

2021
Modeling and Verification of Contactless Mobile Banking System in E-Banking Using SPIN.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

AntiPhiMBS-Auth: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Authentication Level.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2021 International Workshops, 2021

AntiPhiMBS: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Application Level.
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021

2020
IP Traceback method by OpenFlow.
Proceedings of the ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, 2020

Identification of Writing on Bulletin Board via Tor.
Proceedings of the ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, 2020

Packet Reachability Verification in OpenFlow Networks.
Proceedings of the 9th International Conference on Software and Computer Applications, 2020

A Method of Collecting the IP Addresses of Hidden Server in Tor Networks.
Proceedings of the 9th International Conference on Software and Computer Applications, 2020

Privacy Protection in Location Based Service by Secure Computation.
Proceedings of the Intelligent Information and Database Systems - 12th Asian Conference, 2020

2018
Development of a Support System to Resolve Network Troubles by Mobile Robots.
Proceedings of the Internet and Distributed Computing Systems, 2018

Model Checking of TTCAN Protocol Using UPPAAL.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

A Browser Application for Keyword Recommendation Based on User Web Search.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

2017
The Relation Between Syntax Restriction of Temporal Logic and Properties of Reactive System Specification.
Proceedings of the Intelligent Information and Database Systems - 9th Asian Conference, 2017

2016
Abuse Prevention of Street Camera Network by Browsing-History Disclosure.
J. Community Informatics, 2016

Computational Verification of Network Programs for Several OpenFlow Switches in Coq.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

2015
Implementation of Theorem Prover of Relevant Logic.
Proceedings of the Current Approaches in Applied Artificial Intelligence, 2015

Implementation of Decision Procedure of Stepwise Satisfiability of Reactive System Specifications.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

Extracting Environmental Constraints in Reactive System Specifications.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

2014
Static Data Race Detection for Java Programs with Dynamic Class Loading.
Proceedings of the Internet and Distributed Computing Systems, 2014

Resolving Fallback and Path MTU Problems Caused by Denying ICMP Packets in IPv6.
Proceedings of the Internet and Distributed Computing Systems, 2014

Network operational method by using software-defined networking for improvement of communication quality at disasters.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2013
Indicating Important Parts in Searched Web Pages by Retrieval Keywords.
Proceedings of the Behavior and Social Computing, 2013

Smart street light system with energy saving function based on the sensor network.
Proceedings of the Fourth International Conference on Future Energy Systems, 2013

Construction and Verification of Mobile Ad Hoc Network Protocols.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Operational experiences from the viewpoint of university IT system administrators in the metropolitan area on east Japan great earthquake.
Proceedings of the ACM Proceedings of the SIGUCCS Annual Conference, 2012

Stepwise Satisfiability Checking Procedure for Reactive System Specifications by Tableau Method and Proof System.
Proceedings of the Formal Methods and Software Engineering, 2012

Applying Tesseract-OCR to detection of image spam mails.
Proceedings of the 14th Asia-Pacific Network Operations and Management Symposium, 2012

Test tool for equivalence of access control list.
Proceedings of the 14th Asia-Pacific Network Operations and Management Symposium, 2012

2010
Analysis of spam mail sent to Japanese mail addresses in the long term.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

2009
OTag: Architecture to Represent Real World Objects in RF Tags to Improve Future Intelligent Transportation Systems.
J. Convergence Inf. Technol., 2009

iPark: A Universal Solution for Vehicle Parking.
Proceedings of the Visioning and Engineering the Knowledge Society. A Web Science Perspective, 2009

iRail: A novel architecture towards autonomous locomotives and intelligent infrastructures for developing countries.
Proceedings of the 12th International IEEE Conference on Intelligent Transportation Systems, 2009

uCard: A Novel Privacy Friendly Radio Frequency Tag Architecture for Universal Loyalty Card.
Proceedings of the Digital Business - First Iternational ICST Conference, 2009

Decreasing Access Control List Processed in Hardware.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

Object Tag Architecture for Innovative Intelligent Transportation Systems.
Proceedings of the Advances in Databases and Information Systems, 2009

2008
Formal Definition of Relevant Logical Symbol Occurrence.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Discovering Web Pages Censored by Search Engines in Japan.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

Statistical Analysis of Slow Portsweep.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2005
Community Security By Widely Available Information Technology.
J. Community Informatics, 2005

Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks.
Proceedings of the Distributed Computing and Internet Technology, 2005

2004
Finding the Causes of Unrealizability of Reactive System Formal Specifications.
Proceedings of the 2nd International Conference on Software Engineering and Formal Methods (SEFM 2004), 2004

2003
Decision Procedures for Several Properties of Reactive System Specifications.
Proceedings of the Software Security, 2003

2001
Evolution Mechanism of Reactive System Programs.
Proceedings of the 4th International Workshop on Principles of Software Evolution, 2001

1993
More Expressive Temporal Logic for Specifications.
Proceedings of the SEKE'93, 1993


  Loading...