Hiroki Takakura
Orcid: 0000-0003-0238-4506
According to our database1,
Hiroki Takakura
authored at least 77 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Inf. Process., 2024
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
2023
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
Bandwidth Allocation for Low-Latency Wireless Federated Learning: An Evolutionary Game Approach.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
2022
Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation?
IEEE Internet Things J., 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 5th International Conference on Information Science and Systems, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Incentive Routing Design for Covert Communication in Multi-hop Decentralized Wireless Networks.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Int. J. Parallel Emergent Distributed Syst., 2021
A Proposal of Stochastic Quantitative Resilience Index Based on SLAs for Communication Lines.
Proceedings of the International Conference on Information Networking, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Assessment System for Residual Risks of Information Leakage in Incident Countermeasures.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021
Incident Response Support System for Multi-Located Network by Correlation Analysis of Individual Events.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021
On Strategic Interactions in Blockchain Markets: A Three-stage Stackelberg Game Approach.
Proceedings of the IEEE Global Communications Conference, 2021
An Evaluation of Stochastic Quantitative Resilience Index Based on SLAs of Communication Lines.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
J. Cyber Secur. Mobil., 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
Proceedings of the Advances in Information and Computer Security, 2019
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
2018
Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2016.
J. Inf. Process., 2017
Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
Proceedings of the IEEE International Conference on Communications, 2017
2016
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016
Proceedings of the 2016 International Conference on Information Networking, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Proceedings of the ICISSP 2015, 2015
Detecting Malicious Inputs of Web Application Parameters Using Character Class Sequences.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
2014
Estimation of cause of ice jam flooding in sub-arctic regions using PALSAR full polarimetry data.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014
Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval.
Proceedings of the Neural Information Processing - 21st International Conference, 2014
Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
ARIGUMA Code Analyzer: Efficient Variant Detection by Identifying Common Instruction Sequences in Malware Families.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the 18th IEEE International Conference on Networks, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2010
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010
2009
IEICE Trans. Commun., 2009
2008
A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System.
IEICE Trans. Inf. Syst., 2008
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008
2007
A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System.
Proceedings of the Advances in Databases: Concepts, 2007
Proceedings of the Advances in Computer Science, 2007
2006
IEEE Computer Graphics and Applications, 2006
2003
Optimization of geographic area to a Web page for two-dimensional range query processing.
Proceedings of the 4th International Conference on Web Information Systems Engineering Workshops, 2003
Proceedings of the Digital Cities III, 2003
2002
Proceedings of the Second International Workshop on Web Dynamics, 2002
Classification of Web Pages with Geographic Scope and Level of Details for Mobile Cache Management.
Proceedings of the 3rd International Conference on Web Information Systems Engineering Workshops, 2002
Proceedings of the 3rd International Conference on Web Information Systems Engineering Workshops, 2002
Visual Query Processing for GIS with Web Contents.
Proceedings of the Visual and Multimedia Information Management, 2002
2001
Proceedings of the 2nd International Conference on Web Information Systems Engineering, 2001
1999
Proceedings of the Internet Applications, 5th International Computer Science Conference, 1999
Visual User Interface for Spatial Databases Combined with Landscape Images and Sensors.
Proceedings of the 1999 International Symposium on Database Applications in Non-Traditional Environments (DANTE '99), 1999
1998
A Dynamic Navigation System Based on User's Geographical Situation.
Proceedings of the Advances in Database Technologies, 1998
1997
Dynamic Map Synthesis Utilizing Extended Thesauruses and Reuse of Query Generation Process.
Proceedings of the GIS '97. Proceedings of the 5th International Workshop on Advances in Geographic Information Systems, 1997
1994
Syst. Comput. Jpn., 1994
1993
Proceedings of the Ninth International Conference on Data Engineering, 1993
Proceedings of the Foundations of Data Organization and Algorithms, 1993
A Design of a Transparent Backup System Using a Main Memory Database.
Proceedings of the 3rd International Conference on Database Systems for Advanced Applications (DASFAA), 1993
1991
Realization of Continuously Backed-up RAMs for High-Speed Database Recovery.
Proceedings of the Database Systems for Advanced Applications '91, 1991