41 results on '"Kadobayashi, Youki"'
Search Results
2. Active Credential Leakage for Observing Web-Based Attack Cycle
3. Building Better Unsupervised Anomaly Detector with S-Transform
4. Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer
5. STARS: A Simple and Efficient Scheme for Providing Transparent Traceability and Anonymity to Reputation Systems
6. Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning
7. A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis
8. Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing
9. String Kernel Based SVM for Internet Security Implementation
10. Hierarchical Core Vector Machines for Network Intrusion Detection
11. HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites
12. AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces
13. A Storage Efficient Redactable Signature in the Standard Model
14. Spanning SVM Tree for Personalized Transductive Learning
15. Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly
16. An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
17. Hardening Botnet by a Rational Botmaster
18. Bridging the Gap Between PAMs and Overlay Networks: A Framework-Oriented Approach
19. A Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms
20. Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
21. SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks
22. Proposal of Social Internetworking
23. Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks
24. Field-Trial of Dynamic SLA in Diffserv-Capable Network
25. Building Better Unsupervised Anomaly Detector with S-Transform
26. Active Credential Leakage for Observing Web-Based Attack Cycle
27. Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer
28. STARS: A Simple and Efficient Scheme for Providing Transparent Traceability and Anonymity to Reputation Systems
29. AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces
30. String Kernel Based SVM for Internet Security Implementation
31. An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
32. Hierarchical Core Vector Machines for Network Intrusion Detection
33. Spanning SVM Tree for Personalized Transductive Learning
34. Hardening Botnet by a Rational Botmaster
35. Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly
36. HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites
37. Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks
38. Field-Trial of Dynamic SLA in Diffserv-Capable Network
39. Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
40. A Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms
41. Bridging the Gap Between PAMs and Overlay Networks: A Framework-Oriented Approach
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.