フォロー
Yoshiaki Hori
Yoshiaki Hori
Professor at Saga University
確認したメール アドレス: cc.saga-u.ac.jp
タイトル
引用先
引用先
Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide
A Syalim, Y Hori, K Sakurai
2009 International conference on availability, reliability and security, 726-731, 2009
1212009
Analysis of privacy disclosure in DNS query
F Zhao, Y Hori, K Sakurai
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
732007
Characteristics of UDP packet loss: Effect of tcp traffic
H Sawashima
Proceedings of INET'97, Engineering 3-1, June, 1997
651997
A behavior based malware detection scheme for avoiding false positive
Y Fukushima, A Sakai, Y Hori, K Sakurai
2010 6th IEEE workshop on secure network protocols, 79-84, 2010
542010
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things
N Ruan, Y Hori
2012 International Conference on Selected Topics in Mobile and Wireless …, 2012
502012
Bot detection based on traffic analysis
Y Kugisaki, Y Kasahara, Y Hori, K Sakurai
The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
492007
Characterizing economic and social properties of trust and reputation systems in P2P environment
YF Wang, Y Hori, K Sakurai
Journal of Computer Science and Technology 23 (1), 129-140, 2008
422008
Interactively combining 2D and 3D visualization for network traffic monitoring
E Le Malecot, M Kohara, Y Hori, K Sakurai
Proceedings of the 3rd international workshop on Visualization for computer …, 2006
412006
Two-servers PIR based DNS query scheme with privacy-preserving
F Zhao, Y Hori, K Sakurai
The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
402007
Enhancing SVO Logic for Mobile IPv6 Security Protocols.
I You, Y Hori, K Sakurai
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 26-52, 2011
252011
Transport protocols for fast long-distance networks: comparison of their performances in JGN
K Kumazoe, Y Hori, M Tsuru, Y Oie
2004 International Symposium on Applications and the Internet Workshops …, 2004
222004
On securing open networks through trust and reputation-architecture, challenges and solutions
Y Wang, Y Hori, K Sakurai
Proceeding of The 1st Joint Workshop on Information Security (JWIS). Seoul Korea, 2006
212006
Grouping provenance information to improve efficiency of access control
A Syalim, Y Hori, K Sakurai
Advances in Information Security and Assurance: Third International …, 2009
202009
Security policy pre-evaluation towards risk analysis
Y Han, Y Hori, K Sakurai
2008 International Conference on Information Security and Assurance (isa …, 2008
202008
Mobility management of transport protocol supporting multiple connections
K Tsukamoto, Y Hori, Y Oie
Proceedings of the second international workshop on Mobility management …, 2004
192004
Transport protocols for fast long-distance networks: Evaluation of their penetration and robustness on JGNII
K Kumazoe, K Kouyama, Y Hori, M Tsuru, Y Oie
IEICE Technical Report; IEICE Tech. Rep. 105 (279), 37-42, 2005
162005
Security Analysis of MIS Protocol on Wireless LAN comparison with IEEE802. 11i
Y Hori, K Sakurai
Proceedings of the 3rd international conference on mobile technology …, 2006
142006
Can high-speed transport protocols be deployed on the Internet?: Evaluation through experiments on JGNII
K Kumazoe, K Kouyama, Y Hori, M Tsuru, Y Oie
Workshop on Protocols for Fast Long-Distance Networks, 2006
142006
New flow control schemes of TCP for multimodal mobile hosts
K Tsukamoto, Y Fukuda, Y Hori, Y Oie
The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003 …, 2003
142003
Economic-inspired truthful reputation feedback mechanism in p2p networks
Y Wang, Y Hori, K Sakurai
11th IEEE International Workshop on Future Trends of Distributed Computing …, 2007
132007
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20