Suguru Yamaguchi

Affiliations:
  • Nara Institute of Science and Technology, Ikoma, Japan


According to our database1, Suguru Yamaguchi authored at least 78 papers between 1989 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing.
J. Inf. Process., 2016

The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms.
J. Inf. Process., 2015

Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015

Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home.
Int. J. Gaming Comput. Mediat. Simulations, 2015

Securing SOS Messages in Uncommunicable Areas via Information Sharing Cluster.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies.
IEICE Trans. Inf. Syst., 2015

Client Honeypot Multiplication with High Performance and Precise Detection.
IEICE Trans. Inf. Syst., 2015

Network-based mimicry anomaly detection using divergence measures.
Proceedings of the International Symposium on Networks, Computers and Communications, 2015

Benchmarking the load scalability of IPv6 transition technologies: A black-box analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
SIP Flooding Attack Detection Using a Trust Model and Statistical Algorithms.
J. Inf. Process., 2014

An implementation design of a cross-layer handover method with multi-path transmission for VoIP communication.
Ad Hoc Networks, 2014

Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks.
Proceedings of the International Conference on Information Networking 2014, 2014

Surface weather observation via distributed devices.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2014

Detecting anomalies in massive traffic with sketches.
Proceedings of the International Conference of Future Internet 2014, 2014

Battery-saving message collection method for disrupted communication service areas.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships.
J. Inf. Process., 2013

An Implementation Design of a WLAN Handover Method Based on Cross-Layer Collaboration for TCP Communication.
IEICE Trans. Commun., 2013

Use of Role Based Access Control for Security-Purpose Hypervisors.
Proceedings of the 12th IEEE International Conference on Trust, 2013

MPSDataStore: a sensor data repository system for mobile participatory sensing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

Building Better Unsupervised Anomaly Detector with S-Transform.
Proceedings of the Network and System Security - 7th International Conference, 2013

Radio signal-based measurements for localized heavy rain detection using smartphones.
Proceedings of the 2013 IEEE Global Humanitarian Technology Conference, 2013

Using a Trust Model to Reduce False Positives of SIP Flooding Attack Detection in IMS.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing.
Proceedings of the CLOSER 2013, 2013

Trust-based SPIT detection by using call duration and social reliability.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

Design of Geographically Aggregatable Address and Routing Toward Location Based Multicast.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving Average.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Using SOS message propagation to estimate the location of immobilized persons.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

SOSCast: Location Estimation of Immobilized Persons through SOS Message Propagation.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
New Era for Management to Deal with Scalability, Invisibility and Shared Responsibility.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

2010
A Mechanism of Flexible Memory Exchange in Cloud Computing Environments.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Proactive AP Selection Method Considering the Radio Interference Environment.
IEICE Trans. Inf. Syst., 2009

Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries.
IEICE Trans. Inf. Syst., 2009

A Two-Step Execution Mechanism for Thin Secure Hypervisors.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Seamless VoWLAN Handoff Management based on Estimation of AP Queue Length and Frame Retries.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

T-PIM: Trusted Password Input Method against Data Stealing Malware.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Wireless Measurement Framework to Survey an Area with Required Communication Quality.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs.
J. Inf. Process., 2008

Lightweight Vulnerability Management System.
J. Inf. Process., 2008

A Benchmark Tool for Network I/O Management Architectures.
Inf. Media Technol., 2008

Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership.
Inf. Media Technol., 2008

Obtaining Sensing Data Based on the Proximity of Sensor Nodes.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Inter-device Communication Paradigm: Requirements Analysis for Its Security Mechanisms.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Proposal for Adaptive Bandwidth Allocation Using One-Way Feedback Control for MPLS Networks.
IEICE Trans. Commun., 2007

A Generic API for Retrieving Human-Oriented Information from Social Network Services.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Nazca: A Geographic Location Service.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Overview of AI3 network: design and applications of satellite network.
Proceedings of the 2007 workshop on Networked systems for developing regions, 2007

Terminal-centric ap selection algorithm based on frame retransmissions.
Proceedings of the 2nd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2007

2006
A framework of a content distribution service synchronized with tv broadcasting programs.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Performance Study and Deployment Strategies on the Sender-Initiated Multicast.
IEICE Trans. Commun., 2005

Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control.
IEICE Trans. Inf. Syst., 2005

Performance Evaluations of DCCP for Bursty Traffic in Real-Time Applications.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

An Architecture of Network Imprinting for Personal but Wide Area Applications.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Path Selection Using Active Measurement in Multi-Homed Wireless Networks.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

A Fast Polling I/O Implementation with Real-time Signals.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Steps beyond International Collaborations: our challenges in Asian Internet Interconnection Initiatives.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

An implementation of a hierarchical IP traceback architecture.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

ShowNet on INTEROP Tokyo 2002.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks.
Proceedings of the Distributed Computing, 2003

2002
The Design and Implementation of a Kernel Monitoring System for Network Servers.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002

2001
User level techniques for improvement of disk I/O in WWW caching.
Proceedings of the IEEE International Conference on Systems, 2001

2000
Design and implementation of network management system SPLICE/NM based on scripted operations.
Syst. Comput. Jpn., 2000

Performance comparison of layer 3 switches in cases of flow- and topology-driven connection setup.
J. Commun. Networks, 2000

A Method for Reducing Network Routing Instability.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
An Analysis of the Number of ICP Packets on the Distributed WWW Caching System.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
Design and implementation of a hybrid prefetching proxy server for WWW.
Syst. Comput. Jpn., 1998

1997
WWW Cache Management and Its International Deployment: Challenges in the AI3 Project.
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1997

1994
DDT - A Versatile Tunneling Technology.
Comput. Networks ISDN Syst., 1994

1989
Construction of internet for Japanese academic communities.
Proceedings of the Proceedings Supercomputing '89, Reno, NV, USA, November 12-17, 1989, 1989


  Loading...