Seguir
Yoshiaki Hori
Yoshiaki Hori
Professor at Saga University
Dirección de correo verificada de cc.saga-u.ac.jp
Título
Citado por
Citado por
Año
Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide
A Syalim, Y Hori, K Sakurai
2009 International conference on availability, reliability and security, 726-731, 2009
1222009
Analysis of privacy disclosure in DNS query
F Zhao, Y Hori, K Sakurai
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
732007
Characteristics of UDP packet loss: Effect of tcp traffic
H Sawashima
Proceedings of INET'97, Engineering 3-1, June, 1997
661997
A behavior based malware detection scheme for avoiding false positive
Y Fukushima, A Sakai, Y Hori, K Sakurai
2010 6th IEEE workshop on secure network protocols, 79-84, 2010
562010
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things
N Ruan, Y Hori
2012 International Conference on Selected Topics in Mobile and Wireless …, 2012
512012
Bot detection based on traffic analysis
Y Kugisaki, Y Kasahara, Y Hori, K Sakurai
The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
492007
Characterizing economic and social properties of trust and reputation systems in P2P environment
YF Wang, Y Hori, K Sakurai
Journal of Computer Science and Technology 23 (1), 129-140, 2008
422008
Interactively combining 2D and 3D visualization for network traffic monitoring
E Le Malecot, M Kohara, Y Hori, K Sakurai
Proceedings of the 3rd international workshop on Visualization for computer …, 2006
412006
Two-servers PIR based DNS query scheme with privacy-preserving
F Zhao, Y Hori, K Sakurai
The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
402007
Enhancing SVO Logic for Mobile IPv6 Security Protocols.
I You, Y Hori, K Sakurai
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 26-52, 2011
252011
Transport protocols for fast long-distance networks: comparison of their performances in JGN
K Kumazoe, Y Hori, M Tsuru, Y Oie
2004 International Symposium on Applications and the Internet Workshops …, 2004
222004
On securing open networks through trust and reputation-architecture, challenges and solutions
Y Wang, Y Hori, K Sakurai
Proceeding of The 1st Joint Workshop on Information Security (JWIS). Seoul Korea, 2006
212006
Grouping provenance information to improve efficiency of access control
A Syalim, Y Hori, K Sakurai
Advances in Information Security and Assurance: Third International …, 2009
202009
Security policy pre-evaluation towards risk analysis
Y Han, Y Hori, K Sakurai
2008 International Conference on Information Security and Assurance (isa …, 2008
202008
Mobility management of transport protocol supporting multiple connections
K Tsukamoto, Y Hori, Y Oie
Proceedings of the second international workshop on Mobility management …, 2004
192004
Transport protocols for fast long-distance networks: Evaluation of their penetration and robustness on JGNII
K Kumazoe, K Kouyama, Y Hori, M Tsuru, Y Oie
IEICE Technical Report; IEICE Tech. Rep. 105 (279), 37-42, 2005
162005
Security Analysis of MIS Protocol on Wireless LAN comparison with IEEE802. 11i
Y Hori, K Sakurai
Proceedings of the 3rd international conference on mobile technology …, 2006
142006
Can high-speed transport protocols be deployed on the Internet?: Evaluation through experiments on JGNII
K Kumazoe, K Kouyama, Y Hori, M Tsuru, Y Oie
Workshop on Protocols for Fast Long-Distance Networks, 2006
142006
New flow control schemes of TCP for multimodal mobile hosts
K Tsukamoto, Y Fukuda, Y Hori, Y Oie
The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003 …, 2003
142003
Economic-inspired truthful reputation feedback mechanism in p2p networks
Y Wang, Y Hori, K Sakurai
11th IEEE International Workshop on Future Trends of Distributed Computing …, 2007
132007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20