The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yoshiaki Hori: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhan Wang, Yoshiaki Hori, Kouichi Sakurai
    Application and Evaluation of Bayesian Filter for Chinese Spam. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:253-263 [Conf]
  2. Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai
    Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:235-239 [Conf]
  3. Kazuya Tsukamoto, Yoshiaki Hori, Yuji Oie
    Mobility management of transport protocol supporting multiple connections. [Citation Graph (0, 0)][DBLP]
    Mobility Management & Wireless Access Protocols, 2004, pp:83-87 [Conf]
  4. Hiroyuki Koga, Takeshi Ikenaga, Yoshiaki Hori, Yuji Oie
    Out-of-Sequence in Packet Arrivals due to Layer 2 ARQ and Its Impact on TCP Performance in W-CDMA Networks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2003, pp:398-401 [Conf]
  5. Kazumi Kumazoe, Yoshiaki Hori, Masato Tsuru, Yuji Oie
    Transport Protocols for Fast Long-Distance Networks: Comparison of Their Performances in JGN. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2004, pp:645-650 [Conf]
  6. Yufeng Wang, Wendong Wang, Kouichi Sakurai, Yoshiaki Hori
    On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:1008-1018 [Conf]
  7. Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai
    Interactively combining 2D and 3D visualization for network traffic monitoring. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2006, pp:123-127 [Conf]
  8. Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai
    Analysis of Privacy Disclosure in DNS Query. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:952-957 [Conf]
  9. Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai
    On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:211-216 [Conf]
  10. Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai
    An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:249-258 [Conf]
  11. Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai
    On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:382-391 [Conf]

  12. Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. [Citation Graph (, )][DBLP]


  13. Secrecy Capacity of Wireless LAN. [Citation Graph (, )][DBLP]


  14. Security Analysis for P2P Routing Protocols. [Citation Graph (, )][DBLP]


  15. Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. [Citation Graph (, )][DBLP]


  16. Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System. [Citation Graph (, )][DBLP]


  17. Key Distribution Scheme Using Matched Filter Resistant against DoS Attack. [Citation Graph (, )][DBLP]


  18. Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment. [Citation Graph (, )][DBLP]


  19. Development of Single Sign-On System with Hardware Token and Key Management Server. [Citation Graph (, )][DBLP]


  20. Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. [Citation Graph (, )][DBLP]


  21. Formal Verification for Access Control in Web Information Sharing System. [Citation Graph (, )][DBLP]


  22. Grouping Provenance Information to Improve Efficiency of Access Control. [Citation Graph (, )][DBLP]


  23. Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving. [Citation Graph (, )][DBLP]


  24. Bot Detection Based on Traffic Analysis. [Citation Graph (, )][DBLP]


  25. Monitoring Unused IP Addresses on Segments Managed by DHCP. [Citation Graph (, )][DBLP]


Search in 0.025secs, Finished in 0.026secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002