Suguru Yamaguchi
Affiliations:- Nara Institute of Science and Technology, Ikoma, Japan
According to our database1,
Suguru Yamaguchi
authored at least 78 papers
between 1989 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
J. Inf. Process., 2016
The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
2015
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms.
J. Inf. Process., 2015
Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015
Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home.
Int. J. Gaming Comput. Mediat. Simulations, 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies.
IEICE Trans. Inf. Syst., 2015
IEICE Trans. Inf. Syst., 2015
Proceedings of the International Symposium on Networks, Computers and Communications, 2015
Benchmarking the load scalability of IPv6 transition technologies: A black-box analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
J. Inf. Process., 2014
An implementation design of a cross-layer handover method with multi-path transmission for VoIP communication.
Ad Hoc Networks, 2014
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks.
Proceedings of the International Conference on Information Networking 2014, 2014
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2014
Proceedings of the International Conference of Future Internet 2014, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
J. Inf. Process., 2013
An Implementation Design of a WLAN Handover Method Based on Cross-Layer Collaboration for TCP Communication.
IEICE Trans. Commun., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Radio signal-based measurements for localized heavy rain detection using smartphones.
Proceedings of the 2013 IEEE Global Humanitarian Technology Conference, 2013
Using a Trust Model to Reduce False Positives of SIP Flooding Attack Detection in IMS.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing.
Proceedings of the CLOSER 2013, 2013
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013
Design of Geographically Aggregatable Address and Routing Toward Location Based Multicast.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving Average.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
New Era for Management to Deal with Scalability, Invisibility and Shared Responsibility.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
2010
Proceedings of the Cloud Computing, Second International Conference, 2010
2009
IEICE Trans. Inf. Syst., 2009
Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries.
IEICE Trans. Inf. Syst., 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Seamless VoWLAN Handoff Management based on Estimation of AP Queue Length and Frame Retries.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Wireless Measurement Framework to Survey an Area with Required Communication Quality.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs.
J. Inf. Process., 2008
Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership.
Inf. Media Technol., 2008
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008
Inter-device Communication Paradigm: Requirements Analysis for Its Security Mechanisms.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Proposal for Adaptive Bandwidth Allocation Using One-Way Feedback Control for MPLS Networks.
IEICE Trans. Commun., 2007
A Generic API for Retrieving Human-Oriented Information from Social Network Services.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the 2007 workshop on Networked systems for developing regions, 2007
Proceedings of the 2nd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2007
2006
A framework of a content distribution service synchronized with tv broadcasting programs.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
2005
IEICE Trans. Commun., 2005
Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control.
IEICE Trans. Inf. Syst., 2005
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004
Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004
A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
Steps beyond International Collaborations: our challenges in Asian Internet Interconnection Initiatives.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks.
Proceedings of the Distributed Computing, 2003
2002
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002
2001
Proceedings of the IEEE International Conference on Systems, 2001
2000
Design and implementation of network management system SPLICE/NM based on scripted operations.
Syst. Comput. Jpn., 2000
Performance comparison of layer 3 switches in cases of flow- and topology-driven connection setup.
J. Commun. Networks, 2000
A Method for Reducing Network Routing Instability.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000
1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
1998
Syst. Comput. Jpn., 1998
1997
WWW Cache Management and Its International Deployment: Challenges in the AI3 Project.
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1997
1994
1989
Proceedings of the Proceedings Supercomputing '89, Reno, NV, USA, November 12-17, 1989, 1989