Yoshiaki Hori

According to our database1, Yoshiaki Hori authored at least 89 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Message from the NETSAP 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

A Comprehensive Security Analysis Checksheet for OpenFlow Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Detection of Android ad library focusing on HTTP connections and view object redraw behaviors.
Proceedings of the 2015 International Conference on Information Networking, 2015

Message from the NETSAP 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
An effective SVD-based image tampering detection and self-recovery using active watermarking.
Signal Process. Image Commun., 2014

Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework.
J. Networks, 2014

An NMF-Based Traffic Classification Approach towards Anomaly Detection for Massive Sensors.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

A Parameterless Learning Algorithm for Behavior-Based Detection.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets.
J. Inf. Process., 2013

Detection of Android API Call Using Logging Mechanism within Android Framework.
Proceedings of the Security and Privacy in Communication Networks, 2013

Development of Network User Authentication System Using OpenFlow.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Development of Lecture Videos Delivery System using HTML5 Video Element.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Frontiers in Insider Threats and Data Leakage Prevention.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
J. Networks, 2012

Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2).
J. Internet Serv. Inf. Secur., 2012

Detecting Information Leakage via a HTTP Request Based on the Edit Distance.
J. Internet Serv. Inf. Secur., 2012

Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs.
J. Inf. Process., 2012

A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Analysis of Methods for Detecting Compromised Nodes and its Countermeasures.
Proceedings of the International Conference on IT Convergence and Security, 2012

Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Enhancing MISP with Fast Mobile IPv6 Security.
Mob. Inf. Syst., 2011

Enhancing SVO Logic for Mobile IPv6 Security Protocols.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Towards formal analysis of wireless LAN security with MIS protocol.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Precondition of a Routing Algorithm Dealing with Multiple Security Metrics.
IEICE Trans. Commun., 2011

Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Study of Communication Route Selection Considering Route Security.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Towards Countermeasure of Insider Threat in Network Security.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Study on Energy-Efficient Routing Protocol Based on Experimental Evaluation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Traceback Framework against Botmaster by Sharing Network Communication Pattern Information.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Design and Implementation of a Forced Encryption Kernel Module.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A generic evaluation method for key management schemes in wireless sensor network.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Integrity for the <i>In-flight</i> web page based on a fragile watermarking chain scheme.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

2010
Analysis of Existing Privacy-Preserving Protocols in Domain Name System.
IEICE Trans. Inf. Syst., 2010

ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
IEICE Trans. Inf. Syst., 2010

Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol.
IEICE Trans. Inf. Syst., 2010

Behavior Control Based on Dynamic Code Translation.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Study of Log File Dispersion Management Method.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A network reconfiguration scheme against misbehaving nodes.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Darknet Monitoring on Real-Operated Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
An Enhanced Security Protocol for Fast Mobile IPv6.
IEICE Trans. Inf. Syst., 2009

A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6.
IEICE Trans. Commun., 2009

Development of Single Sign-On System with Hardware Token and Key Management Server.
IEICE Trans. Inf. Syst., 2009

Grouping Provenance Information to Improve Efficiency of Access Control.
Proceedings of the Advances in Information Security and Assurance, 2009

Formal Verification for Access Control in Web Information Sharing System.
Proceedings of the Advances in Information Security and Assurance, 2009

Access point evaluation using packet transfer ratio in multihop wireless networks.
Proceedings of the 2009 International Conference on Information Networking, 2009

Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets.
Proceedings of the The Forth International Conference on Availability, 2009

Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide.
Proceedings of the The Forth International Conference on Availability, 2009

Secrecy Capacity of Wireless LAN.
Proceedings of the The Forth International Conference on Availability, 2009

Security Analysis for P2P Routing Protocols.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment.
J. Comput. Sci. Technol., 2008

Reliable Key Distribution Scheme for Lossy Channels.
IEICE Trans. Inf. Syst., 2008

Toward a Scalable Visualization System for Network Traffic Monitoring.
IEICE Trans. Inf. Syst., 2008

Monitoring Unused IP Addresses on Segments Managed by DHCP.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Intrusion Detection Using Third-Parties Support.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Key Distribution Scheme Using Matched Filter Resistant against DoS Attack.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Transport Layer Mobility Management across Heterogeneous Wireless Access Networks.
IEICE Trans. Commun., 2007

On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network.
Proceedings of the Theory and Applications of Models of Computation, 2007

Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Analysis of Privacy Disclosure in DNS Query.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Bot Detection Based on Traffic Analysis.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Economic-Inspired Truthful Reputation Feedback Mechanism in P2P Networks.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
New TCP Congestion Control Schemes for Multimodal Mobile Hosts.
IEICE Trans. Commun., 2006

Interactively combining 2D and 3D visualization for network traffic monitoring.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i.
Proceedings of the 3rd international conference on Mobile technology, 2006

Application and Evaluation of Bayesian Filter for Chinese Spam.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Transport Protocols for Fast Long-Distance Networks: Comparison of Their Performances in JGN.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004

Mobility management of transport protocol supporting multiple connections.
Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004

A new reconfigurable architecture with smart data-transfer subsystems for the intelligent image processing.
Proceedings of the 2004 IEEE International Conference on Field-Programmable Technology, 2004

2003
Out-of-Sequence in Packet Arrivals due to Layer 2 ARQ and Its Impact on TCP Performance in W-CDMA Networks.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

2002
Performance evaluation of delayed reservation schemes in server-based QoS management.
Proceedings of the Global Telecommunications Conference, 2002


  Loading...