Yutaka Miyake
According to our database1,
Yutaka Miyake
authored at least 87 papers
between 1989 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data.
Enterp. Inf. Syst., September, 2023
Combining Stochastic and Deterministic Modeling of IPFIX Records to Infer Connected IoT Devices in Residential ISP Networks.
IEEE Internet Things J., 2023
2022
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
2021
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering Research, 2021
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
Malware Detection for IoT Devices using Automatically Generated White List and Isolation Forest.
Proceedings of the 6th International Conference on Internet of Things, 2021
2020
Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data.
Proceedings of the 5th International Conference on Internet of Things, 2020
Proceedings of the Intelligent Human Systems Integration 2020, 2020
Proceedings of the 2020 European Conference on Networks and Communications, 2020
2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
2016
Int. J. Netw. Comput., 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
J. Ambient Intell. Humaniz. Comput., 2014
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Inf. Syst., 2014
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the Symposium on Applied Computing, 2014
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
Implementation and evaluation of a remote authentication system using touchless palmprint recognition.
Multim. Syst., 2013
Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
IEEE Trans. Consumer Electron., 2011
Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism.
J. Internet Serv. Inf. Secur., 2011
Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation.
J. Inf. Process., 2011
Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists.
J. Inf. Process., 2011
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Automatic security verification for 3-party authentication and key exchange protocols.
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Traceback Framework against Botmaster by Sharing Network Communication Pattern Information.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Proceedings of the Security Technology, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Proceedings of the ARES 2010, 2010
2009
Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation.
IEICE Trans. Inf. Syst., 2009
Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking.
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Detection of Bot Infected PCs Using Destination-Based IP and Domain Whitelists During a Non-Operating Term.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Service Independent Access Control Architecture for User Generated Content (UGC).
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Syst. Comput. Jpn., 2007
A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
IEICE Trans. Commun., 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
2002
Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
2000
Interoperability Testing System of TCP/IP Based Systems in Operational Environment.
Proceedings of the Testing of Communicating Systems: Tools and Techniques, IFIP TC6/WG6.1 13<sup>th</sup> International Conference on Testing Communicating Systems (TestCom 2000), August 29, 2000
Acceleration of TCP Throughput over Satellite-Based Internet Access Using TCP Gateway.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000
1995
Proceedings of the 1995 International Conference on Network Protocols, 1995
1989
Proceedings of the IEEE International Conference on Acoustics, 1989