default search action
Yoshiaki Hori
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c68]A. K. M. Jahangir Alam Majumder, Yoshiaki Hori, Ji-Jiang Yang:
Message from the Workshop Chairs; COMPSAC 2024. COMPSAC 2024: lx-lxi - [e1]Hossain Shahriar, Hiroyuki Ohsaki, Moushumi Sharmin, Dave Towey, A. K. M. Jahangir Alam Majumder, Yoshiaki Hori, Ji-Jiang Yang, Michiharu Takemoto, Nazmus Sakib, Ryohei Banno, Sheikh Iqbal Ahamed:
48th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2024, Osaka, Japan, July 2-4, 2024. IEEE 2024, ISBN 979-8-3503-7696-8 [contents]
2010 – 2019
- 2018
- [c67]Masaki Hashimoto, Yoshiaki Hori, Yutaka Miyake:
Message from the NETSAP 2018 Workshop Organizers. COMPSAC (2) 2018: 652 - 2017
- [c66]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation. SpaCCS 2017: 461-473 - 2016
- [c65]Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai:
A Comprehensive Security Analysis Checksheet for OpenFlow Networks. BWCCA 2016: 231-242 - [c64]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks. WISA 2016: 79-89 - 2015
- [c63]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding. AsiaJCIS 2015: 152-159 - [c62]Yoshiaki Hori, Yutaka Miyake, Chung Huang Yang:
Message from the NETSAP 2015 Workshop Organizers. COMPSAC Workshops 2015: 248 - [c61]Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Android ad library focusing on HTTP connections and view object redraw behaviors. ICOIN 2015: 104-109 - 2014
- [j25]Naoya Kajiwara, Shinichi Matsumoto, Yuuki Nishimoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework. J. Networks 9(11): 2905-2913 (2014) - [j24]Sajjad Dadkhah, Azizah Abd Manaf, Yoshiaki Hori, Aboul Ella Hassanien, Somayeh Sadeghi:
An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process. Image Commun. 29(10): 1197-1210 (2014) - [c60]Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai:
A Parameterless Learning Algorithm for Behavior-Based Detection. AsiaJCIS 2014: 11-18 - [c59]Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori:
Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors. COMPSAC 2014: 600-601 - [c58]Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori:
An NMF-Based Traffic Classification Approach towards Anomaly Detection for Massive Sensors. INCoS 2014: 396-399 - 2013
- [j23]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi:
A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets. Inf. Media Technol. 8(3): 843-854 (2013) - [j22]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi:
A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets. J. Inf. Process. 21(3): 527-538 (2013) - [c57]Kazumasa Yamauchi, Yoshiaki Hori, Kouichi Sakurai:
Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM. AsiaJCIS 2013: 63-68 - [c56]Hiroki Mori, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, Kenzi Watanabe:
Development of Lecture Videos Delivery System using HTML5 Video Element. BWCCA 2013: 557-559 - [c55]Shohei Yamashita, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, Kenzi Watanabe:
Development of Network User Authentication System Using OpenFlow. BWCCA 2013: 566-569 - [c54]Wataru Tsuda, Yoshiaki Hori, Kouichi Sakurai:
Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network. BWCCA 2013: 570-574 - [c53]Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Android API Call Using Logging Mechanism within Android Framework. SecureComm 2013: 393-404 - 2012
- [j21]Na Ruan, Takashi Nishide, Yoshiaki Hori:
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. Inf. Media Technol. 7(4): 1588-1595 (2012) - [j20]Ruan Na, Takashi Nishide, Yoshiaki Hori:
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. J. Inf. Process. 20(4): 846-853 (2012) - [j19]Kangbin Yim, Yoshiaki Hori:
Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2). J. Internet Serv. Inf. Secur. 2(3/4): 1-2 (2012) - [j18]Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai:
Detecting Information Leakage via a HTTP Request Based on the Edit Distance. J. Internet Serv. Inf. Secur. 2(3/4): 18-28 (2012) - [j17]Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. J. Networks 7(1): 88-100 (2012) - [j16]Yoshiaki Hori, William R. Claycomb, Kangbin Yim:
Frontiers in Insider Threats and Data Leakage Prevention. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 1-3 (2012) - [c52]Shogo Nakamura, Yoshiaki Hori, Kouichi Sakurai:
Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology. AINA Workshops 2012: 766-771 - [c51]Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai:
Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic. CSS 2012: 212-226 - [c50]Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:
Analysis of Methods for Detecting Compromised Nodes and its Countermeasures. ICITCS 2012: 53-60 - [c49]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi:
A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks. SAINT 2012: 267-272 - 2011
- [j15]Atsufumi Moriyama, Hiroshi Ishinishi, Katsuichi Nakamura, Yoshiaki Hori:
Precondition of a Routing Algorithm Dealing with Multiple Security Metrics. IEICE Trans. Commun. 94-B(6): 1625-1629 (2011) - [j14]Ilsun You, Yoshiaki Hori, Kouichi Sakurai:
Towards formal analysis of wireless LAN security with MIS protocol. Int. J. Ad Hoc Ubiquitous Comput. 7(2): 112-120 (2011) - [j13]Ilsun You, Yoshiaki Hori, Kouichi Sakurai:
Enhancing SVO Logic for Mobile IPv6 Security Protocols. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(3): 26-52 (2011) - [j12]Ilsun You, Jong-Hyouk Lee, Yoshiaki Hori, Kouichi Sakurai:
Enhancing MISP with Fast Mobile IPv6 Security. Mob. Inf. Syst. 7(3): 271-283 (2011) - [c48]Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
A generic evaluation method for key management schemes in wireless sensor network. ICUIMC 2011: 55 - [c47]Peng Gao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:
Integrity for the In-flight web page based on a fragile watermarking chain scheme. ICUIMC 2011: 86 - [c46]Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:
Design and Implementation of a Forced Encryption Kernel Module. IMIS 2011: 607-611 - [c45]Seiichiro Mizoguchi, Keisuke Takemori, Yutaka Miyake, Yoshiaki Hori, Kouichi Sakurai:
Traceback Framework against Botmaster by Sharing Network Communication Pattern Information. IMIS 2011: 639-644 - [c44]Satoru Akimoto, Hitomi Tamura, Kenji Kawahara, Yoshiaki Hori:
Study on Energy-Efficient Routing Protocol Based on Experimental Evaluation. INCoS 2011: 330-331 - [c43]Yoshiaki Hori, Takashi Nishide, Kouichi Sakurai:
Towards Countermeasure of Insider Threat in Network Security. INCoS 2011: 634-636 - [c42]Ryuzou Nishi, Kirill Morozov, Yoshiaki Hori, Kouichi Sakurai:
Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter. MSN 2011: 463-469 - [c41]Fumiharu Etoh, Yoshiaki Hori, Kouichi Sakurai:
A Study of Communication Route Selection Considering Route Security. SAINT 2011: 360-365 - [c40]Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai:
Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration. TrustCom 2011: 352-361 - [c39]Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. TrustCom 2011: 1739-1744 - 2010
- [j11]Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai:
Analysis of Existing Privacy-Preserving Protocols in Domain Name System. IEICE Trans. Inf. Syst. 93-D(5): 1031-1043 (2010) - [j10]Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai, Yoshiaki Hori:
ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6. IEICE Trans. Inf. Syst. 93-D(5): 1096-1105 (2010) - [j9]Heru Sukoco, Yoshiaki Hori, Hendrawan, Kouichi Sakurai:
Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol. IEICE Trans. Inf. Syst. 93-D(11): 2953-2961 (2010) - [c38]Seiichiro Mizoguchi, Yoshiro Fukushima, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai:
Darknet Monitoring on Real-Operated Networks. BWCCA 2010: 278-285 - [c37]Daiki Nobayashi, Takashi Sera, Takeshi Ikenaga, Yutaka Nakamura, Yoshiaki Hori:
A network reconfiguration scheme against misbehaving nodes. LCN 2010: 424-431 - [c36]Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai:
A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks. SAINT 2010: 261-264 - [c35]Fumiharu Etoh, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai:
Study of Log File Dispersion Management Method. SAINT 2010: 371-374 - [c34]Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai:
Behavior Control Based on Dynamic Code Translation. SAINT 2010: 375-378
2000 – 2009
- 2009
- [j8]Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga, Yoshiaki Hori:
Development of Single Sign-On System with Hardware Token and Key Management Server. IEICE Trans. Inf. Syst. 92-D(5): 826-835 (2009) - [j7]Ilsun You, Kouichi Sakurai, Yoshiaki Hori:
A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6. IEICE Trans. Commun. 92-B(6): 2287-2290 (2009) - [j6]Ilsun You, Kouichi Sakurai, Yoshiaki Hori:
An Enhanced Security Protocol for Fast Mobile IPv6. IEICE Trans. Inf. Syst. 92-D(10): 1979-1982 (2009) - [c33]Amril Syalim, Yoshiaki Hori, Kouichi Sakurai:
Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. ARES 2009: 726-731 - [c32]Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Security Analysis for P2P Routing Protocols. ARES 2009: 899-904 - [c31]Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:
Secrecy Capacity of Wireless LAN. ARES 2009: 905-910 - [c30]Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai:
Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. ARES 2009: 972-977 - [c29]Ilsun You, Kouichi Sakurai, Yoshiaki Hori:
Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6. FCST 2009: 351-355 - [c28]Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga, Yoshiaki Hori, Katsuichi Nakamura, Hiroshi Ishinishi, Syuuji Kaizaki:
Access point evaluation using packet transfer ratio in multihop wireless networks. ICOIN 2009: 1-3 - [c27]Amril Syalim, Yoshiaki Hori, Kouichi Sakurai:
Grouping Provenance Information to Improve Efficiency of Access Control. ISA 2009: 51-59 - [c26]Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai:
Formal Verification for Access Control in Web Information Sharing System. ISA 2009: 80-89 - 2008
- [j5]Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai:
Toward a Scalable Visualization System for Network Traffic Monitoring. IEICE Trans. Inf. Syst. 91-D(5): 1300-1310 (2008) - [j4]Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:
Reliable Key Distribution Scheme for Lossy Channels. IEICE Trans. Inf. Syst. 91-D(5): 1485-1488 (2008) - [j3]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment. J. Comput. Sci. Technol. 23(1): 129-140 (2008) - [c25]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System. AINA Workshops 2008: 241-246 - [c24]Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:
Key Distribution Scheme Using Matched Filter Resistant against DoS Attack. AINA Workshops 2008: 1534-1539 - [c23]Masakazu Fujii, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai:
Intrusion Detection Using Third-Parties Support. FTDCS 2008: 206-212 - [c22]Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai:
Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. MUE 2008: 485-489 - [c21]Seiichiro Mizoguchi, Yoshiaki Hori, Kouichi Sakurai:
Monitoring Unused IP Addresses on Segments Managed by DHCP. NCM (1) 2008: 510-515 - 2007
- [j2]Kazuya Tsukamoto, Yoshiaki Hori, Yuji Oie:
Transport Layer Mobility Management across Heterogeneous Wireless Access Networks. IEICE Trans. Commun. 90-B(5): 1122-1131 (2007) - [c20]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments. APWeb/WAIM Workshops 2007: 211-216 - [c19]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. ATC 2007: 249-258 - [c18]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Economic-Inspired Truthful Reputation Feedback Mechanism in P2P Networks. FTDCS 2007: 80-88 - [c17]Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga, Yoshiaki Hori:
Development of Single Sign-On System with Hardware Token and Key Management Server. ICSNC 2007: 73 - [c16]Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai:
Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving. IPC 2007: 299-302 - [c15]Yuji Kugisaki, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai:
Bot Detection Based on Traffic Analysis. IPC 2007: 303-306 - [c14]Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai:
Analysis of Privacy Disclosure in DNS Query. MUE 2007: 952-957 - [c13]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment. PAKDD Workshops 2007: 502-514 - [c12]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network. TAMC 2007: 362-373 - [c11]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network. UIC 2007: 382-391 - 2006
- [j1]Kazuya Tsukamoto, Yutaka Fukuda, Yoshiaki Hori, Yuji Oie:
New TCP Congestion Control Schemes for Multimodal Mobile Hosts. IEICE Trans. Commun. 89-B(6): 1825-1836 (2006) - [c10]Zhan Wang, Yoshiaki Hori, Kouichi Sakurai:
Application and Evaluation of Bayesian Filter for Chinese Spam. Inscrypt 2006: 253-263 - [c9]Yoshiaki Hori, Kouichi Sakurai:
Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i. Mobility Conference 2006: 11 - [c8]Yufeng Wang, Wendong Wang, Kouichi Sakurai, Yoshiaki Hori:
On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance. UIC 2006: 1008-1018 - [c7]Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai:
Interactively combining 2D and 3D visualization for network traffic monitoring. VizSEC 2006: 123-127 - 2005
- [c6]Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai:
Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet. ICPADS (2) 2005: 235-239 - 2004
- [c5]Hiroshi Kadota, Yoshiaki Hori, Akiyoshi Wakatani:
A new reconfigurable architecture with smart data-transfer subsystems for the intelligent image processing. FPT 2004: 429-432 - [c4]Kazuya Tsukamoto, Yoshiaki Hori, Yuji Oie:
Mobility management of transport protocol supporting multiple connections. Mobility Management & Wireless Access Protocols 2004: 83-87 - [c3]Kazumi Kumazoe, Yoshiaki Hori, Masato Tsuru, Yuji Oie:
Transport Protocols for Fast Long-Distance Networks: Comparison of Their Performances in JGN. SAINT Workshops 2004: 645-650 - 2003
- [c2]Hiroyuki Koga, Takeshi Ikenaga, Yoshiaki Hori, Yuji Oie:
Out-of-Sequence in Packet Arrivals due to Layer 2 ARQ and Its Impact on TCP Performance in W-CDMA Networks. SAINT 2003: 398-401 - 2002
- [c1]Takeshi Ikenaga, Yoshinori Isozaki, Yoshiaki Hori, Yuji Oie:
Performance evaluation of delayed reservation schemes in server-based QoS management. GLOBECOM 2002: 1460-1464
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint