The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yutaka Miyake: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig
    Intrusion Detection for Encrypted Web Accesses. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:569-576 [Conf]
  2. Yutaka Miyake, Toshihiko Kato, Kenji Suzuki
    Implementation method of high speed protocol as transport library. [Citation Graph (0, 0)][DBLP]
    ICNP, 1995, pp:172-179 [Conf]
  3. Yutaka Miyake, Teruyuki Hasegawa, Toru Hasegawa, Toshihiko Kato
    Acceleration of TCP Throughput over Satellite-Based Internet Access Using TCP Gateway. [Citation Graph (0, 0)][DBLP]
    ISCC, 2000, pp:245-253 [Conf]
  4. Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka
    Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:650-655 [Conf]
  5. Grit Denker, Jonathan K. Millen, Yutaka Miyake
    Cross-Domain Access Control via PKI. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:202-205 [Conf]
  6. Toshihiko Kato, Tomohiko Ogishi, Hiroyuki Shinbo, Yutaka Miyake, Akira Idoue, Kenji Suzuki
    Interoperability Testing System of TCP/IP Based Systems in Operational Environment. [Citation Graph (0, 0)][DBLP]
    TestCom, 2000, pp:143-0 [Conf]
  7. Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase
    A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:172-179 [Conf]
  8. Ayumu Kubota, Akira Yamada, Yutaka Miyake
    L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  9. LSM-Based Secure System Monitoring Using Kernel Protection Schemes. [Citation Graph (, )][DBLP]


  10. Anomaly Detection for DNS Servers Using Frequent Host Selection. [Citation Graph (, )][DBLP]


  11. Web Tracking Site Detection Based on Temporal Link Analysis. [Citation Graph (, )][DBLP]


  12. Service Independent Access Control Architecture for User Generated Content (UGC). [Citation Graph (, )][DBLP]


  13. Combating Against Attacks on Encrypted Protocols. [Citation Graph (, )][DBLP]


  14. Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking. [Citation Graph (, )][DBLP]


  15. Detection of Bot Infected PCs Using Destination-Based IP and Domain Whitelists During a Non-Operating Term. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002