|
Search the dblp DataBase
Yutaka Miyake:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig
Intrusion Detection for Encrypted Web Accesses. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:569-576 [Conf]
- Yutaka Miyake, Toshihiko Kato, Kenji Suzuki
Implementation method of high speed protocol as transport library. [Citation Graph (0, 0)][DBLP] ICNP, 1995, pp:172-179 [Conf]
- Yutaka Miyake, Teruyuki Hasegawa, Toru Hasegawa, Toshihiko Kato
Acceleration of TCP Throughput over Satellite-Based Internet Access Using TCP Gateway. [Citation Graph (0, 0)][DBLP] ISCC, 2000, pp:245-253 [Conf]
- Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:650-655 [Conf]
- Grit Denker, Jonathan K. Millen, Yutaka Miyake
Cross-Domain Access Control via PKI. [Citation Graph (0, 0)][DBLP] POLICY, 2002, pp:202-205 [Conf]
- Toshihiko Kato, Tomohiko Ogishi, Hiroyuki Shinbo, Yutaka Miyake, Akira Idoue, Kenji Suzuki
Interoperability Testing System of TCP/IP Based Systems in Operational Environment. [Citation Graph (0, 0)][DBLP] TestCom, 2000, pp:143-0 [Conf]
- Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase
A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. [Citation Graph (0, 0)][DBLP] ISI, 2007, pp:172-179 [Conf]
- Ayumu Kubota, Akira Yamada, Yutaka Miyake
L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
LSM-Based Secure System Monitoring Using Kernel Protection Schemes. [Citation Graph (, )][DBLP]
Anomaly Detection for DNS Servers Using Frequent Host Selection. [Citation Graph (, )][DBLP]
Web Tracking Site Detection Based on Temporal Link Analysis. [Citation Graph (, )][DBLP]
Service Independent Access Control Architecture for User Generated Content (UGC). [Citation Graph (, )][DBLP]
Combating Against Attacks on Encrypted Protocols. [Citation Graph (, )][DBLP]
Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking. [Citation Graph (, )][DBLP]
Detection of Bot Infected PCs Using Destination-Based IP and Domain Whitelists During a Non-Operating Term. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.004secs
|