default search action
Youki Kadobayashi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Olufemi Abiodun Abraham, Hideya Ochiai, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks. IEEE Access 12: 26023-26045 (2024) - [j52]Bernard Ousmane Sané, Mandicou Ba, Doudou Fall, Yuzo Taenaka, Ibrahima Niang, Youki Kadobayashi:
Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage. IEEE Access 12: 74944-74960 (2024) - [j51]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall:
Web-Biometrics for User Authenticity Verification in Zero Trust Access Control. IEEE Access 12: 129611-129622 (2024) - [j50]Nahid Ferdous Aurna, Md Delwar Hossain, Latifur Khan, Yuzo Taenaka, Youki Kadobayashi:
FedFusion: Adaptive Model Fusion for Addressing Feature Discrepancies in Federated Credit Card Fraud Detection. IEEE Access 12: 136962-136978 (2024) - [j49]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
D2-PSD: Dynamic Differentially-Private Spatial Decomposition in Collaboration With Edge Server. IEEE Access 12: 156307-156326 (2024) - [c131]Adil Bin Bhutto, Ryota Kawashima, Yuzo Taenaka, Youki Kadobayashi:
Meeting Latency and Jitter Demands of Beyond 5G Networking Era: Are CNFs Up to the Challenge? COMPSAC 2024: 1598-1605 - [c130]Nahid Ferdous Aurna, Md Delwar Hossain, Hideya Ochiai, Yuzo Taenaka, Latifur Khan, Youki Kadobayashi:
Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity. ICISSP 2024: 309-319 - [c129]Md. Mahbubur Rahman, Md Delwar Hossain, Hideya Ochiai, Youki Kadobayashi, Tanjim Sakib, Syed Taha Yeasin Ramadan:
Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation. ICISSP 2024: 823-830 - [c128]Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi:
Differentially-Private Data Aggregation over Encrypted Location Data for Range Counting Query. ICOIN 2024: 409-414 - [c127]Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi:
OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect. SECRYPT 2024: 674-679 - 2023
- [j48]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Towards Autonomous Driving Model Resistant to Adversarial Attack. Appl. Artif. Intell. 37(1) (2023) - [j47]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
Oblivious Statistic Collection With Local Differential Privacy in Mutual Distrust. IEEE Access 11: 21374-21386 (2023) - [j46]Taisho Sasada, Masataka Kawai, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi:
Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture. IEEE Access 11: 141358-141374 (2023) - [j45]Hideya Ochiai, Md Delwar Hossain, Pawissakan Chirupphapa, Youki Kadobayashi, Hiroshi Esaki:
Modbus/RS-485 Attack Detection on Communication Signals with Machine Learning. IEEE Commun. Mag. 61(6): 43-49 (2023) - [j44]N'guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka, Youki Kadobayashi:
Smart home cybersecurity awareness and behavioral incentives. Inf. Comput. Secur. 31(5): 545-575 (2023) - [j43]Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto:
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware. J. Comput. Virol. Hacking Tech. 19(2): 149-163 (2023) - [c126]Mohammad Hafiz Hersyah, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology. CIoT 2023: 225-230 - [c125]Nahid Ferdous Aurna, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms. CSR 2023: 180-186 - [c124]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet. CSR 2023: 426-431 - [c123]Sadaf Md. Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen, Youki Kadobayashi:
Securing Smart Vehicles Through Federated Learning. FPS (1) 2023: 18-35 - [c122]Md Delwar Hossain, Hideya Ochiai, Latifur Khan, Youki Kadobayashi:
Smart Meter Modbus RS-485 Intrusion Detection by Federated Learning Approach. ICCAE 2023: 559-564 - [c121]Md Sharafat Hossain, Md Delwar Hossain, Md Mahbubur Rahman, Yuzo Taenaka, Md Saiful Islam, Youki Kadobayashi:
A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning. SIN 2023: 1-8 - [c120]Ryosuke Araki, Kshira Sagar Sahoo, Yuzo Taenaka, Youki Kadobayashi, Erik Elmroth, Monowar H. Bhuyan:
Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis. TrustCom 2023: 485-494 - [c119]Olufemi Abiodun Abraham, Hideya Ochiai, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data. WFCS 2023: 1-8 - [c118]Hideya Ochiai, Md Delwar Hossain, Youki Kadobayashi, Hiroshi Esaki:
Attacker Localization with Machine Learning in RS-485 Industrial Control Networks. WFCS 2023: 1-8 - 2022
- [j42]N'guessan Yves-Roland Douha, Monowar H. Bhuyan, Shigeru Kashihara, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
A survey on blockchain, SDN and NFV for the smart-home security. Internet Things 20: 100588 (2022) - [c117]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
Decoupling Statistical Trends from Data Volume on LDP-Based Spatio-Temporal Data Collection. FNWF 2022: 262-269 - [c116]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Personalized Federated Learning for Automotive Intrusion Detection Systems. FNWF 2022: 544-549 - [c115]Olufemi Abiodun Abraham, Hideya Ochiai, Kabid Hassan Shibly, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Unauthorized Power Usage Detection Using Gradient Boosting Classifier in Disaggregated Smart Meter Home Network. FNWF 2022: 688-693 - [c114]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Autonomous Driving Model Defense Study on Hijacking Adversarial Attack. ICANN (4) 2022: 546-557 - [c113]Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi:
Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior. ICISSP 2022: 677-687 - [c112]Md Delwar Hossain, Hideya Ochiai, Tatsuya Arisawa, Youki Kadobayashi:
Smart Meter Modbus RS-485 Spoofing Attack Detection by LSTM Deep Learning Approach. SDS 2022: 47-52 - [c111]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
DPSD: Dynamic Private Spatial Decomposition Based on Spatial and Temporal Correlations. SmartCom 2022: 188-202 - 2021
- [j41]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT. Internet Things 14: 100391 (2021) - [j40]Ruo Ando, Youki Kadobayashi, Hiroki Takakura:
Choice of parallelism: multi-GPU driven pipeline for huge academic backbone network. Int. J. Parallel Emergent Distributed Syst. 36(6): 609-622 (2021) - [c110]Mohd Ruzeiny Bin Kamaruzzaman, Bernard Ousmane Sané, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics. CSR 2021: 241-248 - [c109]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Ibrahima Diané, Youki Kadobayashi:
D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems. FiCloud 2021: 304-310 - [c108]Taisho Sasada, Masataka Kawai, Yuzo Taenaka, Doudou Fall, Youki Kadobayashi:
Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss. ICAIIC 2021: 42-47 - [c107]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Doudou Fall, Yuzo Taenaka, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications. IEA/AIE (1) 2021: 530-543 - [c106]Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall:
Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams. SDS 2021: 1-8 - [i4]Ruo Ando, Youki Kadobayashi, Hiroki Takakura:
Choice of Parallelism: Multi-GPU Driven Pipeline for Huge Academic Backbone Network. CoRR abs/2106.12863 (2021) - 2020
- [j39]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Youki Kadobayashi:
Hierarchical Load Balancing and Clustering Technique for Home Edge Computing. IEEE Access 8: 127593-127607 (2020) - [j38]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications. IEEE Access 8: 185489-185502 (2020) - [c105]Matthias Baudlet, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance. BRAINS 2020: 17-24 - [c104]Bernard Ousmane Sané, Mandicou Ba, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Ibrahima Niang, Youki Kadobayashi:
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage. CCGRID 2020: 440-449 - [c103]Md Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches. ICCCS 2020: 491-497 - [c102]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus. COMPSAC 2020: 10-17 - [c101]Md Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning. CSCloud/EdgeCom 2020: 62-69 - [c100]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach. GLOBECOM 2020: 1-6 - [c99]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. ICICS 2020: 223-242 - [c98]Shaoning Pang, Tao Ban, Youki Kadobayashi, Jungsuk Song, Kaizhu Huang, Geongsen Poh, Iqbal Gondal, Kitsuchart Pasupa, Fadi A. Aloul:
CDMC'19 - The 10th International Cybersecurity Data Mining Competition. ICONIP (2) 2020: 235-245 - [c97]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
SDN-Enabled IoT Anomaly Detection Using Ensemble Learning. AIAI (2) 2020: 268-280 - [c96]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
Anonymizing Location Information in Unstructured Text Using Knowledge Graph. iiWAS 2020: 163-167 - [i3]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes affecting user decision to adopt a Virtual Private Network (VPN) app. CoRR abs/2008.06813 (2020)
2010 – 2019
- 2019
- [j37]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi:
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents. IEEE Access 7: 130758-130771 (2019) - [j36]Gábor Lencse, Youki Kadobayashi:
Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis. IEICE Trans. Commun. 102-B(10): 2021-2035 (2019) - [j35]Andrew M'manga, Shamal Faily, John McAlaney, Chris Williams, Youki Kadobayashi, Daisuke Miyamoto:
A normative decision-making model for cyber security. Inf. Comput. Secur. 27(5) (2019) - [j34]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Youki Kadobayashi:
A Demographic Perspective of Smartphone Security and Its Redesigned Notifications. J. Inf. Process. 27: 773-786 (2019) - [c95]Youki Shiraishi, Akiko Manada, Yuzo Taenaka, Youki Kadobayashi:
A Method for Designing Proximity-Aware Regular Graph-Based Structured Overlay Networks. ICCCS 2019: 430-435 - [c94]Doudou Fall, Youki Kadobayashi:
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy? ICISSP 2019: 405-411 - [c93]Shun Yonamine, Youki Kadobayashi, Daisuke Miyamoto, Yuzo Taenaka:
Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection. ICISSP 2019: 471-478 - [c92]Monowar H. Bhuyan, Maode Ma, Youki Kadobayashi, Erik Elmroth:
Information-Theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting. ICTAI 2019: 995-1002 - [c91]Serigne Mouhamadane Diop, Jema David Ndibwile, Doudou Fall, Shigeru Kashihara, Youki Kadobayashi:
To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications. ISSRE Workshops 2019: 282-287 - [c90]Tan Omiya, Doudou Fall, Youki Kadobayashi:
IoT-Poly: An IoT Security Game Practice Tool for Learners Motivation and Skills Acquisition. Koli Calling 2019: 16:1-16:10 - [c89]Pratyush Kr. Deka, Monowar H. Bhuyan, Youki Kadobayashi, Erik Elmroth:
Adversarial Impact on Anomaly Detection in Cloud Datacenters. PRDC 2019: 188-197 - 2018
- [j33]Gábor Lencse, Youki Kadobayashi:
Benchmarking DNS64 implementations: Theory and practice. Comput. Commun. 127: 61-74 (2018) - [j32]Gábor Lencse, Youki Kadobayashi:
Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64. Comput. Secur. 77: 397-411 (2018) - [j31]Takeshi Takahashi, Bhola Panta, Youki Kadobayashi, Koji Nakao:
Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information. Int. J. Commun. Syst. 31(3) (2018) - [j30]Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi:
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle. Int. J. Inf. Sec. 17(2): 135-151 (2018) - [j29]Ady Wahyudi Paundu, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment. Secur. Commun. Networks 2018: 4216240:1-4216240:18 (2018) - [c88]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
A comparative study of smartphone-user security perception and preference towards redesigned security notifications. AfriCHI 2018: 17:1-17:6 - [c87]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Ibrahima Niang, Youki Kadobayashi:
Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency. EDGE 2018: 3-17 - [c86]Kazuya Okada, Shigeru Kashihara, Nao Kawanishi, Nobuo Suzuki, Keizo Sugiyama, Youki Kadobayashi:
GoEdge: A Scalable and Stateless Local Breakout Method. TOPIC@PODC 2018: 29-34 - [c85]Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto:
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. PST 2018: 1-11 - 2017
- [j28]Gábor Lencse, Marius Georgescu, Youki Kadobayashi:
Benchmarking methodology for DNS64 servers. Comput. Commun. 109: 162-175 (2017) - [j27]Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Youki Kadobayashi:
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. Comput. Secur. 69: 155-173 (2017) - [c84]Jema David Ndibwile, Youki Kadobayashi, Doudou Fall:
UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App. AsiaJCIS 2017: 38-47 - [c83]Gregory Blanc, Dawid Machnicki, Rodrigo Diaz-Rodriguez, Adam Kozakiewicz, Youki Kadobayashi, Rishikesh Sahay, Pawel Pawlinski:
NECOMA - Nippon-European Cyberdefense-Oriented Multilayer Analysis. EPS 2017 - 2016
- [j26]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing. J. Inf. Process. 24(2): 371-380 (2016) - [c82]Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System. CSCloud 2016: 84-94 - [c81]Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies. ICISSP 2016: 243-254 - 2015
- [j25]Takeshi Takahashi, Youki Kadobayashi:
Reference Ontology for Cybersecurity Operational Information. Comput. J. 58(10): 2297-2312 (2015) - [j24]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies. IEICE Trans. Inf. Syst. 98-D(3): 588-595 (2015) - [j23]Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi:
Client Honeypot Multiplication with High Performance and Precise Detection. IEICE Trans. Inf. Syst. 98-D(4): 775-787 (2015) - [j22]Christopher Michael Yap, Youki Kadobayashi, Suguru Yamaguchi:
Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home. Int. J. Gaming Comput. Mediat. Simulations 7(3): 1-21 (2015) - [j21]Marius Georgescu, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(2): e1 (2015) - [j20]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms. J. Inf. Process. 23(4): 465-475 (2015) - [c80]Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi:
AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. BADGERS@RAID 2015: 74-84 - [c79]Jema David Ndibwile, A. Govardhan, Kazuya Okada, Youki Kadobayashi:
Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication. COMPSAC Workshops 2015: 261-267 - [c78]Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System. ICICS 2015: 320-334 - [c77]Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi:
Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification. ICONIP (3) 2015: 223-232 - [c76]Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Benchmarking the load scalability of IPv6 transition technologies: A black-box analysis. ISCC 2015: 329-334 - [c75]Sirikarn Pukkawanna, Youki Kadobayashi, Suguru Yamaguchi:
Network-based mimicry anomaly detection using divergence measures. ISNCC 2015: 1-7 - 2014
- [j19]Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue:
A Learner-Independent Knowledge Transfer Approach to Multi-task Learning. Cogn. Comput. 6(3): 304-320 (2014) - [j18]Noppawat Chaisamran, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
SIP Flooding Attack Detection Using a Trust Model and Statistical Algorithms. J. Inf. Process. 22(2): 118-129 (2014) - [c74]Sirikarn Pukkawanna, Gregory Blanc, Joaquín García-Alfaro, Youki Kadobayashi, Hervé Debar:
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment. BADGERS@ESORICS 2014: 30-39 - [c73]Daisuke Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki, Youki Kadobayashi:
EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits. BADGERS@ESORICS 2014: 56-65 - [c72]Hajime Tazaki, Kazuya Okada, Yuji Sekiya, Youki Kadobayashi:
MATATABI: Multi-layer Threat Analysis Platform with Hadoop. BADGERS@ESORICS 2014: 75-82 - [c71]Kazuya Okada, Hiroaki Hazeyama, Youki Kadobayashi:
Oblivious DDoS mitigation with locator/ID separation protocol. CFI 2014: 8:1-8:6 - [c70]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Detecting anomalies in massive traffic with sketches. CFI 2014: 14:1-14:2 - [c69]Takuji Iimura, Daisuke Miyamoto, Hajime Tazaki, Youki Kadobayashi:
NECOMAtter: curating approach for sharing cyber threat information. CFI 2014: 19:1-19:2 - [c68]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks. ICOIN 2014: 282-287 - [c67]Takeshi Takahashi, Youki Kadobayashi:
Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks. ICSC 2014: 279-284 - [c66]Marius Georgescu, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Empirical Analysis of IPv6 Transition Technologies Using the IPv6 Network Evaluation Testbed. TRIDENTCOM 2014: 216-228 - [c65]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture. TRUST 2014: 127-142 - [i2]Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara:
Ontological Approach toward Cybersecurity in Cloud Computing. CoRR abs/1405.6169 (2014) - [i1]Takeshi Takahashi, Kent Landfield, Youki Kadobayashi:
An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information. RFC 7203: 1-28 (2014) - 2013
- [j17]Shuzhen Wang, Zonghua Zhang, Youki Kadobayashi:
Exploring attack graph for cost-benefit security hardening: A probabilistic approach. Comput. Secur. 32: 158-169 (2013) - [c64]Noppawat Chaisamran, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Trust-based SPIT detection by using call duration and social reliability. APCC 2013: 98-103 - [c63]Doudou Fall, Takeshi Okuda, Noppawat Chaisamran, Youki Kadobayashi, Suguru Yamaguchi:
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing. CLOSER 2013: 145-148 - [c62]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Building Better Unsupervised Anomaly Detector with S-Transform. NSS 2013: 582-589 - [c61]Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi:
Active Credential Leakage for Observing Web-Based Attack Cycle. RAID 2013: 223-243 - 2012
- [j16]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration. IEEE Trans. Syst. Man Cybern. Part B 42(2): 552-564 (2012) - [c60]Gregory Blanc, Daisuke Miyamoto, Mitsuaki Akiyama, Youki Kadobayashi:
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts. AINA Workshops 2012: 344-351 - [c59]Takeshi Takahashi, Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo:
Enabling secure multitenancy in cloud computing: Challenges and approaches. BCFIC 2012: 72-79 - [c58]Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue:
Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer. ICONIP (1) 2012: 375-382 - 2011
- [j15]Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Youki Kadobayashi:
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks. Comput. Secur. 30(6-7): 525-537 (2011) - [j14]Gregory Blanc, Youki Kadobayashi:
A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude. IEICE Trans. Inf. Syst. 94-D(11): 2159-2166 (2011) - [j13]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
Personalized mode transductive spanning SVM classification tree. Inf. Sci. 181(11): 2071-2085 (2011) - [c57]Tao Ban, Shanqing Guo, Zonghua Zhang, Ruo Ando, Youki Kadobayashi:
Practical network traffic analysis in P2P environment. IWCMC 2011: 1801-1807 - [c56]Takeshi Takahashi, Youki Kadobayashi, Koji Nakao:
Toward global cybersecurity collaboration: Cybersecurity operation activity model. Kaleidoscope 2011: 1-8 - [c55]Gregory Blanc, Ruo Ando, Youki Kadobayashi:
Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection. NTMS 2011: 1-6 - [c54]Tao Ban, Changshui Zhang, Shigeo Abe, Takeshi Takahashi, Youki Kadobayashi:
Mining interlacing manifolds in high dimensional spaces. SAC 2011: 942-949 - 2010
- [j12]Anthony M. Rutkowski, Youki Kadobayashi, Inette Furey, Damir Rajnovic, Robert Martin, Takeshi Takahashi, Craig Schultz, Gavin Reid, Gregg Schudel, Mike Hird, Stephen Adegbite:
CYBEX: the cybersecurity information exchange framework (x.1500). Comput. Commun. Rev. 40(5): 59-64 (2010) - [j11]Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites. J. Intell. Learn. Syst. Appl. 2(4): 190-199 (2010) - [c53]Gregory Blanc, Youki Kadobayashi:
Towards revealing JavaScript program intents using abstract interpretation. AINTEC 2010: 87-94 - [c52]Takeshi Takahashi, Hiroyuki Fujiwara, Youki Kadobayashi:
Building ontology of cybersecurity operational information. CSIIRW 2010: 79 - [c51]Zonghua Zhang, Jingwei Liu, Youki Kadobayashi:
STARS: A Simple and Efficient Scheme for Providing Transparent Traceability and Anonymity to Reputation Systems. DPM/SETOP 2010: 170-187 - [c50]Yongquan Shi, Tao Ban, Shanqing Guo, Qiuliang Xu, Youki Kadobayashi:
Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing. ICONIP (2) 2010: 143-151 - [c49]Tao Ban, Ruo Ando, Youki Kadobayashi:
A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis. ICONIP (2) 2010: 267-274 - [c48]Ruo Ando, Kang Byung, Youki Kadobayashi:
Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning. ICONIP (2) 2010: 337-343 - [c47]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
Incremental and decremental LDA learning with applications. IJCNN 2010: 1-8 - [c46]Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
Blink: Large-scale P2P network monitoring and visualization system using VM introspection. NCM 2010: 351-358 - [c45]Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara:
Ontological approach toward cybersecurity in cloud computing. SIN 2010: 100-109
2000 – 2009
- 2009
- [j10]Muhammad Niswar, Shigeru Kashihara, Kazuya Tsukamoto, Youki Kadobayashi, Suguru Yamaguchi:
Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries. IEICE Trans. Inf. Syst. 92-D(10): 1847-1856 (2009) - [j9]Mio Suzuki, Hiroaki Hazeyama, Daisuke Miyamoto, Shinsuke Miwa, Youki Kadobayashi:
Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set. IEICE Trans. Inf. Syst. 92-D(10): 1877-1887 (2009) - [j8]Masayoshi Shimamura, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs. Inf. Media Technol. 4(1): 85-102 (2009) - [j7]Ryo Nojima, Youki Kadobayashi:
Cryptographically Secure Bloom-Filters. Trans. Data Priv. 2(2): 131-139 (2009) - [c44]Yuzo Taenaka, Shigeru Kashihara, Youki Kadobayashi, Suguru Yamaguchi:
Wireless Measurement Framework to Survey an Area with Required Communication Quality. AINA Workshops 2009: 439-446 - [c43]Ruo Ando, Zonghua Zhang, Youki Kadobayashi, Yoichi Shinoda:
A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration. DASC 2009: 95-102 - [c42]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
Spanning SVM Tree for Personalized Transductive Learning. ICANN (1) 2009: 913-922 - [c41]Ye Chen, Shaoning Pang, Nikola K. Kasabov, Tao Ban, Youki Kadobayashi:
Hierarchical Core Vector Machines for Network Intrusion Detection. ICONIP (2) 2009: 520-529 - [c40]Zbynek Michlovský, Shaoning Pang, Nikola K. Kasabov, Tao Ban, Youki Kadobayashi:
String Kernel Based SVM for Internet Security Implementation. ICONIP (2) 2009: 530-539 - [c39]Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites. ICONIP (2) 2009: 548-555 - [c38]Tao Ban, Shanqing Guo, Qiuliang Xu, Youki Kadobayashi:
AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces. ICONIP (2) 2009: 729-737 - [c37]Tao Ban, Youki Kadobayashi, Shigeo Abe:
Sparse kernel feature analysis using FastMap and its variants. IJCNN 2009: 256-263 - [c36]Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi:
A Storage Efficient Redactable Signature in the Standard Model. ISC 2009: 326-337 - [c35]Muhammad Niswar, Eigo Horiuchi, Shigeru Kashihara, Kazuya Tsukamoto, Youki Kadobayashi, Suguru Yamaguchi:
Seamless VoWLAN Handoff Management based on Estimation of AP Queue Length and Frame Retries. PerCom Workshops 2009: 1-6 - [c34]Shinsuke Miwa, Mio Suzuki, Hiroaki Hazeyama, Satoshi Uda, Toshiyuki Miyachi, Youki Kadobayashi, Yoichi Shinoda:
Experiences in emulating 10K AS topology with massive VM multiplexing. VISA 2009: 97-104 - 2008
- [j6]Yoshihide Matsumoto, Hiroaki Hazeyama, Youki Kadobayashi:
Adaptive Bloom Filter: A Space-Efficient Counting Algorithm for Unpredictable Network Traffic. IEICE Trans. Inf. Syst. 91-D(5): 1292-1299 (2008) - [j5]Masayoshi Shimamura, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs. J. Inf. Process. 16: 201-218 (2008) - [c33]Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi:
Design of an FDB based Intra-domain Packet Traceback System. ARES 2008: 1313-1318 - [c32]Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
An Independent Evaluation of Web Timing Attack and its Countermeasure. ARES 2008: 1319-1324 - [c31]Zonghua Zhang, Ruo Ando, Youki Kadobayashi:
Hardening Botnet by a Rational Botmaster. Inscrypt 2008: 348-369 - [c30]Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites. ICONIP (1) 2008: 539-546 - [c29]Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly. ICONIP (1) 2008: 547-554 - [c28]Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. ICYCS 2008: 2222-2229 - [c27]Hiroaki Hazeyama, Mio Suzuki, Shinsuke Miwa, Daisuke Miyamoto, Youki Kadobayashi:
Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures. CSET 2008 - 2007
- [c26]Kenji Masui, Youki Kadobayashi:
A Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms. AINTEC 2007: 184-198 - [c25]Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. ICISC 2007: 131-143 - [c24]Yuzo Taenaka, Shigeru Kashihara, Kazuya Tsukamoto, Youki Kadobayashi, Yuji Oie:
Design and Implementation of Cross-layer Architecture for Seamless VoIP Handover. MASS 2007: 1-6 - [c23]Kenji Masui, Youki Kadobayashi:
Bridging the Gap Between PAMs and Overlay Networks: A Framework-Oriented Approach. PAM 2007: 265-268 - [c22]Yusuke Doi, Youki Kadobayashi, Kenji Saito:
Message from the Organizers of the Workshop on Dependable and Sustainable Peer-to-Peer Systems (DAS-P2P 2007). SAINT Workshops 2007 - [c21]Teruaki Yokoyama, Shigeru Kashihara, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
A Generic API for Retrieving Human-Oriented Information from Social Network Services. SAINT Workshops 2007: 33 - [c20]Kenji Masui, Youki Kadobayashi:
N-TAP: A Platform of Large-Scale Distributed Measurement for Overlay Network Applications. SAINT Workshops 2007: 60 - [c19]Yukio Okada, Hiroaki Hazeyama, Youki Kadobayashi:
Proposal of Constructing PKI on Overlay Network. SAINT Workshops 2007: 64 - [c18]Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi:
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. SAINT Workshops 2007: 82 - 2006
- [j4]Takuji Iimura, Hiroaki Hazeyama, Youki Kadobayashi:
Distributed Scalable Multi-player Online Game Servers on Peer-to-Peer Networks. Inf. Media Technol. 1(1): 545-560 (2006) - [c17]Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyamoto, Masafumi Oe:
An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation. ISCC 2006: 378-385 - [c16]Mio Suzuki, Hiroaki Hazeyama, Youki Kadobayashi:
Expediting experiments across testbeds with AnyBed: A testbed-independent topology configuration tool. TRIDENTCOM 2006 - 2005
- [j3]Vasaka Visoottiviseth, Hiroyuki Kido, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi:
Performance Study and Deployment Strategies on the Sender-Initiated Multicast. IEICE Trans. Commun. 88-B(4): 1383-1394 (2005) - [j2]Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi:
Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control. IEICE Trans. Inf. Syst. 88-D(6): 1168-1177 (2005) - [c15]Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi:
SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks. AINTEC 2005: 195-209 - [c14]Yukio Okada, Kenji Masui, Youki Kadobayashi:
Proposal of Social Internetworking. Human.Society@Internet 2005: 114-124 - [c13]Shigeki Takeuchi, Hiroyuki Koga, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi:
Performance Evaluations of DCCP for Bursty Traffic in Real-Time Applications. SAINT 2005: 142-149 - 2004
- [c12]Omar Ismail, Masashi Etoh, Youki Kadobayashi, Suguru Yamaguchi:
A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability. AINA (1) 2004: 145-151 - [c11]Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi:
A Fast Polling I/O Implementation with Real-time Signals. NCA 2004: 317-322 - [c10]Takuji Iimura, Hiroaki Hazeyama, Youki Kadobayashi:
Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games. NETGAMES 2004: 116-120 - [c9]Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi:
Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling. Parallel and Distributed Computing and Networks 2004: 134-140 - [c8]Shigeru Kashihara, Takashi Nishiyama, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Path Selection Using Active Measurement in Multi-Homed Wireless Networks. SAINT 2004: 273-276 - [c7]Youki Kadobayashi:
Achieving Heterogeneity and Fairness in Kademlia. SAINT Workshops 2004: 546-551 - [c6]Shu Zhang, Youki Kadobayashi:
Troubleshooting on intra-domain routing instability. NetT@SIGCOMM 2004: 289-294 - 2003
- [c5]Shigeru Kashihara, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks. IWDC 2003: 174-183 - [c4]Masafumi Oe, Youki Kadobayashi, Suguru Yamaguchi:
An implementation of a hierarchical IP traceback architecture. SAINT Workshops 2003: 250-253 - 2002
- [c3]Yuko Mizuno-Matsumoto, Susumu Date, Takeshi Kaishima, Youki Kadobayashi, Shinji Shimojo:
A Grid Application for an Evaluation of Brain Function using Independent Component Analysis (ICA). CCGRID 2002: 111-119 - 2001
- [c2]Ken-ichi Chinen, Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi:
User level techniques for improvement of disk I/O in WWW caching. SMC 2001: 3033 - 2000
- [j1]Yuko Mizuno-Matsumoto, Susumu Date, Yuji Tabuchi, Shinichi Tamura, Yoshinobu Sato, Reza Aghaeizadeh Zoroofi, Shinji Shimojo, Youki Kadobayashi, Haruyuki Tatsumi, Hiroki Nogawa, Kazuhiro Shinosaki, Masatoshi Takeda, Tsuyoshi Inouye, Hideo Miyahara:
Telemedicine for evaluation of brain function by a metacomputer. IEEE Trans. Inf. Technol. Biomed. 4(2): 165-172 (2000) - [c1]Naoto Morishima, Akimichi Ogawa, Keijiro Ehara, Youki Kadobayashi:
Field-Trial of Dynamic SLA in Diffserv-Capable Network. QofIS 2000: 117-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint