Hiroki Takakura

Orcid: 0000-0003-0238-4506

According to our database1, Hiroki Takakura authored at least 77 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Editor's Message to Special Issue of "Young Researchers' Papers".
J. Inf. Process., 2024

Generative AI-based closed-loop fMRI system.
CoRR, 2024

Multi-Armed Bandit-Based Secure Routing in Air-Ground Integrated Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

2023
Activities of National Institute of Informatics in Japan.
Commun. ACM, July, 2023

Double-Sided Auction based Data-Energy Trading Architecture in Internet of Vehicles.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Bandwidth Allocation for Low-Latency Wireless Federated Learning: An Evolutionary Game Approach.
Proceedings of the IEEE International Conference on Communications, 2023

Security Operation Support by Estimating Cyber Attacks Without Traffic Decryption.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation?
IEEE Internet Things J., 2022

Cyber Attack Stage Tracing System based on Attack Scenario Comparison.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

A Resource Importance Estimation Method Based on Proximity of Hierarchical Position.
Proceedings of the 5th International Conference on Information Science and Systems, 2022

Stackelberg Game-based Secure Communication in SWIPT-enabled Relaying Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Incentive Routing Design for Covert Communication in Multi-hop Decentralized Wireless Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Choice of parallelism: multi-GPU driven pipeline for huge academic backbone network.
Int. J. Parallel Emergent Distributed Syst., 2021

A Proposal of Stochastic Quantitative Resilience Index Based on SLAs for Communication Lines.
Proceedings of the International Conference on Information Networking, 2021

A Dynamic Access Control System based on Situations of Users.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Assessment System for Residual Risks of Information Leakage in Incident Countermeasures.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021

Incident Response Support System for Multi-Located Network by Correlation Analysis of Individual Events.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021

On Strategic Interactions in Blockchain Markets: A Three-stage Stackelberg Game Approach.
Proceedings of the IEEE Global Communications Conference, 2021

An Evaluation of Stochastic Quantitative Resilience Index Based on SLAs of Communication Lines.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
A Quantitative Evaluation of a Wide-Area Distributed System with SDN-FIT.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
SPINZ: A Speculating Incident Zone Systemfor Incident Handling.
J. Cyber Secur. Mobil., 2019

Resilient Mechanisms for Reliable Digital Health Services.
Proceedings of the 2019 IEEE World Congress on Services, 2019

IDS Alert Priority Determination Based on Traffic Behavior.
Proceedings of the Advances in Information and Computer Security, 2019

Resilience Evaluations of a Wide-area Distributed System with a SDN-FIT system.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

Construction of Secure Internal Networks with Communication Classifying System.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Speculating Incident Zone System on Local Area Networks.
Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity, 2018

Message from the Fast Abstract Co-chairs.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2016.
J. Inf. Process., 2017

Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

Malware originated HTTP traffic detection utilizing cluster appearance ratio.
Proceedings of the 2017 International Conference on Information Networking, 2017

SINET5: A low-latency and high-bandwidth backbone network for SDN/NFV Era.
Proceedings of the IEEE International Conference on Communications, 2017

2016
A fully meshed backbone network for data-intensive sciences and SDN services.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

An incident response support system based on seriousness of infection.
Proceedings of the 2016 International Conference on Information Networking, 2016

Message from the SEPT Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An Automated ACL Generation System for Secure Internal Network.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Evaluation on Malware Classification by Session Sequence of Common Protocols.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Malware Classification Method Based on Sequence of Traffic Flow.
Proceedings of the ICISSP 2015, 2015

Detecting Malicious Inputs of Web Application Parameters Using Character Class Sequences.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Message from SEPT Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Estimation of cause of ice jam flooding in sub-arctic regions using PALSAR full polarimetry data.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Toward a more practical unsupervised anomaly detection system.
Inf. Sci., 2013

ARIGUMA Code Analyzer: Efficient Variant Detection by Identifying Common Instruction Sequences in Malware Families.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
A Malware Classification Method Based on Similarity of Function Structure.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Unknown Attacks Detection Using Feature Extraction from Anomaly-Based IDS Alerts.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

An anti-spam method via real-time retransmission detection.
Proceedings of the 18th IEEE International Conference on Networks, 2012

An Adaptive Honeypot System to Capture IPv6 Address Scans.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Improving Performance of Anomaly-Based IDS by Combining Multiple Classifiers.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

A grid-based clustering for low-overhead anomaly intrusion detection.
Proceedings of the 5th International Conference on Network and System Security, 2011

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010

2009
Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM.
IEICE Trans. Commun., 2009

2008
A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System.
IEICE Trans. Inf. Syst., 2008

A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

2007
A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System.
Proceedings of the Advances in Databases: Concepts, 2007

A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts.
Proceedings of the Advances in Computer Science, 2007

2006
Hierarchical Visualization of Network Intrusion Detection Data.
IEEE Computer Graphics and Applications, 2006

2003
Optimization of geographic area to a Web page for two-dimensional range query processing.
Proceedings of the 4th International Conference on Web Information Systems Engineering Workshops, 2003

Map-Based Range Query Processing for Geographic Web Search Systems.
Proceedings of the Digital Cities III, 2003

2002
Caching Schema for Mobile Web information Retrieval.
Proceedings of the Second International Workshop on Web Dynamics, 2002

Classification of Web Pages with Geographic Scope and Level of Details for Mobile Cache Management.
Proceedings of the 3rd International Conference on Web Information Systems Engineering Workshops, 2002

Web Locality Based Ranking Utilizing Location Names and Link Structure.
Proceedings of the 3rd International Conference on Web Information Systems Engineering Workshops, 2002

Visual Query Processing for GIS with Web Contents.
Proceedings of the Visual and Multimedia Information Management, 2002

2001
Web-Based Inference Rules for Processing Conceptual Geographical Relationships.
Proceedings of the 2nd International Conference on Web Information Systems Engineering, 2001

1999
Organization of Mobile Networks under Privacy Constraints.
Proceedings of the Internet Applications, 5th International Computer Science Conference, 1999

Visual User Interface for Spatial Databases Combined with Landscape Images and Sensors.
Proceedings of the 1999 International Symposium on Database Applications in Non-Traditional Environments (DANTE '99), 1999

1998
A Dynamic Navigation System Based on User's Geographical Situation.
Proceedings of the Advances in Database Technologies, 1998

1997
Dynamic Map Synthesis Utilizing Extended Thesauruses and Reuse of Query Generation Process.
Proceedings of the GIS '97. Proceedings of the 5th International Workshop on Advances in Geographic Information Systems, 1997

1994
Design and performance evaluation of flash memory back-up systems.
Syst. Comput. Jpn., 1994

1993
Continuous Backup Systems Utilizing Flash Memory.
Proceedings of the Ninth International Conference on Data Engineering, 1993

Data Structure and Algorithms for New Hardware Technology.
Proceedings of the Foundations of Data Organization and Algorithms, 1993

A Design of a Transparent Backup System Using a Main Memory Database.
Proceedings of the 3rd International Conference on Database Systems for Advanced Applications (DASFAA), 1993

1991
Realization of Continuously Backed-up RAMs for High-Speed Database Recovery.
Proceedings of the Database Systems for Advanced Applications '91, 1991


  Loading...