Yoshiaki Hori
According to our database1,
Yoshiaki Hori
authored at least 90 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
Detection of Android ad library focusing on HTTP connections and view object redraw behaviors.
Proceedings of the 2015 International Conference on Information Networking, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
An effective SVD-based image tampering detection and self-recovery using active watermarking.
Signal Process. Image Commun., 2014
Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework.
J. Networks, 2014
An NMF-Based Traffic Classification Approach towards Anomaly Detection for Massive Sensors.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
J. Inf. Process., 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
J. Networks, 2012
J. Internet Serv. Inf. Secur., 2012
J. Internet Serv. Inf. Secur., 2012
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs.
J. Inf. Process., 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Int. J. Ad Hoc Ubiquitous Comput., 2011
IEICE Trans. Commun., 2011
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Traceback Framework against Botmaster by Sharing Network Communication Pattern Information.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
Integrity for the <i>In-flight</i> web page based on a fragile watermarking chain scheme.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
2010
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Inf. Syst., 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
IEICE Trans. Commun., 2009
IEICE Trans. Inf. Syst., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the 2009 International Conference on Information Networking, 2009
Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets.
Proceedings of the The Forth International Conference on Availability, 2009
Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide.
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment.
J. Comput. Sci. Technol., 2008
IEICE Trans. Inf. Syst., 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008
Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
IEICE Trans. Commun., 2007
On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network.
Proceedings of the Theory and Applications of Models of Computation, 2007
Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007
An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
2006
IEICE Trans. Commun., 2006
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the 3rd international conference on Mobile technology, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
2004
Transport Protocols for Fast Long-Distance Networks: Comparison of Their Performances in JGN.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004
Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004
A new reconfigurable architecture with smart data-transfer subsystems for the intelligent image processing.
Proceedings of the 2004 IEEE International Conference on Field-Programmable Technology, 2004
2003
Out-of-Sequence in Packet Arrivals due to Layer 2 ARQ and Its Impact on TCP Performance in W-CDMA Networks.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003
2002
Performance evaluation of delayed reservation schemes in server-based QoS management.
Proceedings of the Global Telecommunications Conference, 2002