Youki Kadobayashi

According to our database1, Youki Kadobayashi authored at least 172 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks.
IEEE Access, 2024

Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Towards Autonomous Driving Model Resistant to Adversarial Attack.
Appl. Artif. Intell., December, 2023

Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware.
J. Comput. Virol. Hacking Tech., June, 2023

Modbus/RS-485 Attack Detection on Communication Signals with Machine Learning.
IEEE Commun. Mag., June, 2023

Smart home cybersecurity awareness and behavioral incentives.
Inf. Comput. Secur., 2023

Oblivious Statistic Collection With Local Differential Privacy in Mutual Distrust.
IEEE Access, 2023

Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture.
IEEE Access, 2023

Attacker Localization with Machine Learning in RS-485 Industrial Control Networks.
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023

Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data.
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023

A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

Smart Meter Modbus RS-485 Intrusion Detection by Federated Learning Approach.
Proceedings of the 15th International Conference on Computer and Automation Engineering, 2023

A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology.
Proceedings of the 6th Conference on Cloud and Internet of Things, 2023

2022
A survey on blockchain, SDN and NFV for the smart-home security.
Internet Things, 2022

DPSD: Dynamic Private Spatial Decomposition Based on Spatial and Temporal Correlations.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Smart Meter Modbus RS-485 Spoofing Attack Detection by LSTM Deep Learning Approach.
Proceedings of the 9th Swiss Conference on Data Science, 2022

Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Autonomous Driving Model Defense Study on Hijacking Adversarial Attack.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Personalized Federated Learning for Automotive Intrusion Detection Systems.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

Decoupling Statistical Trends from Data Volume on LDP-Based Spatio-Temporal Data Collection.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

Unauthorized Power Usage Detection Using Gradient Boosting Classifier in Disaggregated Smart Meter Home Network.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
Choice of parallelism: multi-GPU driven pipeline for huge academic backbone network.
Int. J. Parallel Emergent Distributed Syst., 2021

DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT.
Internet Things, 2021

Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications.
Proceedings of the Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices, 2021

Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2021

D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications.
IEEE Access, 2020

Hierarchical Load Balancing and Clustering Technique for Home Edge Computing.
IEEE Access, 2020

Anonymizing Location Information in Unstructured Text Using Knowledge Graph.
Proceedings of the iiWAS '20: The 22nd International Conference on Information Integration and Web-based Applications & Services, Virtual Event / Chiang Mai, Thailand, November 30, 2020

SDN-Enabled IoT Anomaly Detection Using Ensemble Learning.
Proceedings of the Artificial Intelligence Applications and Innovations, 2020

CDMC'19 - The 10th International Cybersecurity Data Mining Competition.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2020

LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

2019
A Demographic Perspective of Smartphone Security and Its Redesigned Notifications.
J. Inf. Process., 2019

A normative decision-making model for cyber security.
Inf. Comput. Secur., 2019

Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis.
IEICE Trans. Commun., 2019

An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents.
IEEE Access, 2019

Adversarial Impact on Anomaly Detection in Cloud Datacenters.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

IoT-Poly: An IoT Security Game Practice Tool for Learners Motivation and Skills Acquisition.
Proceedings of the Koli Calling '19: 19th Koli Calling International Conference on Computing Education Research, 2019

To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

Information-Theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

A Method for Designing Proximity-Aware Regular Graph-Based Structured Overlay Networks.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment.
Secur. Commun. Networks, 2018

HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.
Int. J. Inf. Sec., 2018

Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information.
Int. J. Commun. Syst., 2018

Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64.
Comput. Secur., 2018

Benchmarking DNS64 implementations: Theory and practice.
Comput. Commun., 2018

The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

GoEdge: A Scalable and Stateless Local Breakout Method.
Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, 2018

Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency.
Proceedings of the Edge Computing - EDGE 2018, 2018

A comparative study of smartphone-user security perception and preference towards redesigned security notifications.
Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, 2018

2017
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots.
Comput. Secur., 2017

Benchmarking methodology for DNS64 servers.
Comput. Commun., 2017

NECOMA - Nippon-European Cyberdefense-Oriented Multilayer Analysis.
Proceedings of the European Project Space on Networks, 2017

UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2016
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing.
J. Inf. Process., 2016

The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms.
J. Inf. Process., 2015

Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015

Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home.
Int. J. Gaming Comput. Mediat. Simulations, 2015

Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies.
IEICE Trans. Inf. Syst., 2015

Client Honeypot Multiplication with High Performance and Precise Detection.
IEICE Trans. Inf. Syst., 2015

Reference Ontology for Cybersecurity Operational Information.
Comput. J., 2015

Network-based mimicry anomaly detection using divergence measures.
Proceedings of the International Symposium on Networks, Computers and Communications, 2015

Benchmarking the load scalability of IPv6 transition technologies: A black-box analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information.
RFC, April, 2014

SIP Flooding Attack Detection Using a Trust Model and Statistical Algorithms.
J. Inf. Process., 2014

A Learner-Independent Knowledge Transfer Approach to Multi-task Learning.
Cogn. Comput., 2014

Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014

Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks.
Proceedings of the International Conference on Information Networking 2014, 2014

Detecting anomalies in massive traffic with sketches.
Proceedings of the International Conference of Future Internet 2014, 2014

Oblivious DDoS mitigation with locator/ID separation protocol.
Proceedings of the International Conference of Future Internet 2014, 2014

NECOMAtter: curating approach for sharing cyber threat information.
Proceedings of the International Conference of Future Internet 2014, 2014

MATATABI: Multi-layer Threat Analysis Platform with Hadoop.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
Exploring attack graph for cost-benefit security hardening: A probabilistic approach.
Comput. Secur., 2013

Active Credential Leakage for Observing Web-Based Attack Cycle.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Building Better Unsupervised Anomaly Detector with S-Transform.
Proceedings of the Network and System Security - 7th International Conference, 2013

Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing.
Proceedings of the CLOSER 2013, 2013

Trust-based SPIT detection by using call duration and social reliability.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

2012
LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration.
IEEE Trans. Syst. Man Cybern. Part B, 2012

Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Enabling secure multitenancy in cloud computing: Challenges and approaches.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012

Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Personalized mode transductive spanning SVM classification tree.
Inf. Sci., 2011

A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude.
IEICE Trans. Inf. Syst., 2011

Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks.
Comput. Secur., 2011

Mining interlacing manifolds in high dimensional spaces.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Toward global cybersecurity collaboration: Cybersecurity operation activity model.
Proceedings of the ITU Kaleidoscope 2011: The Fully Networked Human?, 2011

Practical network traffic analysis in P2P environment.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites.
J. Intell. Learn. Syst. Appl., 2010

CYBEX: the cybersecurity information exchange framework (x.1500).
Comput. Commun. Rev., 2010

Ontological approach toward cybersecurity in cloud computing.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Blink: Large-scale P2P network monitoring and visualization system using VM introspection.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Incremental and decremental LDA learning with applications.
Proceedings of the International Joint Conference on Neural Networks, 2010

Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing.
Proceedings of the Neural Information Processing. Models and Applications, 2010

A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis.
Proceedings of the Neural Information Processing. Models and Applications, 2010

Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning.
Proceedings of the Neural Information Processing. Models and Applications, 2010

STARS: A Simple and Efficient <i>S</i>cheme for Providing Transparent <i>T</i>raceability and <i>A</i>nonymity to <i>R</i>eputation <i>S</i>ystems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

Building ontology of cybersecurity operational information.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Towards revealing JavaScript program intents using abstract interpretation.
Proceedings of the AINTEC '10, 2010

2009
Cryptographically Secure Bloom-Filters.
Trans. Data Priv., 2009

Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set.
IEICE Trans. Inf. Syst., 2009

Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries.
IEICE Trans. Inf. Syst., 2009

Experiences in emulating 10K AS topology with massive VM multiplexing.
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, 2009

Seamless VoWLAN Handoff Management based on Estimation of AP Queue Length and Frame Retries.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

A Storage Efficient Redactable Signature in the Standard Model.
Proceedings of the Information Security, 12th International Conference, 2009

Sparse kernel feature analysis using FastMap and its variants.
Proceedings of the International Joint Conference on Neural Networks, 2009

String Kernel Based SVM for Internet Security Implementation.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

Hierarchical Core Vector Machines for Network Intrusion Detection.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

Spanning SVM Tree for Personalized Transductive Learning.
Proceedings of the Artificial Neural Networks, 2009

A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Wireless Measurement Framework to Survey an Area with Required Communication Quality.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs.
J. Inf. Process., 2008

Adaptive Bloom Filter: A Space-Efficient Counting Algorithm for Unpredictable Network Traffic.
IEICE Trans. Inf. Syst., 2008

Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures.
Proceedings of the Workshop on Cyber Security and Test, 2008

An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Hardening Botnet by a Rational Botmaster.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

An Independent Evaluation of Web Timing Attack and its Countermeasure.
Proceedings of the The Third International Conference on Availability, 2008

Design of an FDB based Intra-domain Packet Traceback System.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Generic API for Retrieving Human-Oriented Information from Social Network Services.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Proposal of Constructing PKI on Overlay Network.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

N-TAP: A Platform of Large-Scale Distributed Measurement for Overlay Network Applications.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Message from the Organizers of the Workshop on Dependable and Sustainable Peer-to-Peer Systems (DAS-P2P 2007).
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Bridging the Gap Between PAMs and Overlay Networks: A Framework-Oriented Approach.
Proceedings of the Passive and Active Network Measurement, 8th Internatinoal Conference, 2007

Design and Implementation of Cross-layer Architecture for Seamless VoIP Handover.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module.
Proceedings of the Information Security and Cryptology, 2007

A Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms.
Proceedings of the Sustainable Internet, Third Asian Internet Engineering Conference, 2007

2006
Expediting experiments across testbeds with AnyBed: A testbed-independent topology configuration tool.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Performance Study and Deployment Strategies on the Sender-Initiated Multicast.
IEICE Trans. Commun., 2005

Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control.
IEICE Trans. Inf. Syst., 2005

Performance Evaluations of DCCP for Bursty Traffic in Real-Time Applications.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

Proposal of Social Internetworking.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks.
Proceedings of the Technologies for Advanced Heterogeneous Networks, 2005

2004
Troubleshooting on intra-domain routing instability.
Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting, 2004

Path Selection Using Active Measurement in Multi-Homed Wireless Networks.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

Achieving Heterogeneity and Fairness in Kademlia.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004

Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games.
Proceedings of the 3rd Workshop on Network and System Support for Games, 2004

A Fast Polling I/O Implementation with Real-time Signals.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
An implementation of a hierarchical IP traceback architecture.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks.
Proceedings of the Distributed Computing, 2003

2002
A Grid Application for an Evaluation of Brain Function using Independent Component Analysis (ICA).
Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2002), 2002

2001
User level techniques for improvement of disk I/O in WWW caching.
Proceedings of the IEEE International Conference on Systems, 2001

2000
Telemedicine for evaluation of brain function by a metacomputer.
IEEE Trans. Inf. Technol. Biomed., 2000

Field-Trial of Dynamic SLA in Diffserv-Capable Network.
Proceedings of the Quality of Future Internet Services, 2000


  Loading...