|
Search the dblp DataBase
Hiroshi Tsunoda:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kumar Simkhada, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto
Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures. [Citation Graph (0, 0)][DBLP] ISM, 2005, pp:680-685 [Conf]
- Hiroshi Tsunoda, Umith Dharmaratn, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto
Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
Ultra-Mobile Echo Network in Health Care System. [Citation Graph (, )][DBLP]
A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages. [Citation Graph (, )][DBLP]
Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition. [Citation Graph (, )][DBLP]
Distributed Early Worm Detection Based on Payload Histograms. [Citation Graph (, )][DBLP]
A Reliable Network Identification Method Based on Transition Pattern of Payload Length. [Citation Graph (, )][DBLP]
Network Application Identification Using Transition Pattern of Payload Length. [Citation Graph (, )][DBLP]
Detecting DRDoS attacks by a simple response packet confirmation mechanism. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|