Takuo Nakashima

According to our database1, Takuo Nakashima authored at least 39 papers between 2001 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
A Study of Malicious PDF Detection Technique.
Proceedings of the 10th International Conference on Complex, 2016

2014
Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2012
Queue management for the heavy-tailed traffics.
Int. J. Space Based Situated Comput., 2012

Computational Complexity of Anomaly Detection Methods.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Multiple Active Queue Management within Input/Output Buffers.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Token-based Code Clone Detection Technique in a Student's Programming Exercise.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

The Evaluation of an Anomaly Detection System Based on Chi-square Method.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Performance of a Stable Unit Active Queue Management.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Performance of the MPI Based File Share System.
Proceedings of the 2011 International Conference on Broadband, 2011

An Anomaly Detection System Based on Chi-Square Method with Dynamic BIN Algorithm.
Proceedings of the 2011 International Conference on Broadband, 2011

Active Queue Management with the Stable Unit Average Calculation.
Proceedings of the 2011 International Conference on Broadband, 2011

Anomaly Detection Using Chi-square Values Based on the Typical Features and the Time Deviation.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Early DoS/DDoS Detection Method using Short-term Statistics.
Proceedings of the CISIS 2010, 2010

Implementation and Evaluation of Distributed Hash Table Using MPI.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

DDoS Detection Technique Using Statistical Analysis to Generate Quick Response Time.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Flooding Features for the AODV Protocol.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

Extraction of Characteristics of Anomaly Accessed IP Packets Using Chi-square Method.
Proceedings of the 2009 International Conference on Complex, 2009

Queue Length Behavior on Restricted Link Under Bursty Self-similar TCP Traffic.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Queueing Property for Different Type of Self-Similar Traffics.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Performance Framework for P2P Overlay Network.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Extraction of Characteristics of Anomaly Accessed IP Packets by the Entropy-Based Analysis.
Proceedings of the Second International Conference on Complex, 2008

Analysis of Queueing Property for Self-Similar Traffic.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical Analysis.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Queueing Analysis for Self-similar Traffic by Simulator.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Performance Estimation of TCP under SYN Flood Attacks.
Proceedings of the First International Conference on Complex, 2007

Self-Similar Property for TCP Traffic under the Bottleneck Restrainment.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Detective Method for SYN Flood Attacks.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Property Analysis of Heavy-tailed Traffic by Simulator.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Time Scaling Property on Edge Routers.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Time Scaling Analysis of Jitter Propagation Property.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Stability in Web Server Performance with Heavy-Tailed Distribution.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Delay Propagation Properties with Self-similarity.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Statistical Analysis of Propagation Properties with Heavy-Tailedness.
Proceedings of the International Conference on Internet Computing, 2004

Experimental Analysis of Propagation Properties Implementing the Path-Based Measurement.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2001
An Experimental Evaluation of the Total Cost of NTP Topology.
Proceedings of the 15th International Conference on Information Networking, 2001


  Loading...