Search

Your search keyword '"Kadobayashi, Youki"' showing total 369 results

Search Constraints

Start Over You searched for: Author "Kadobayashi, Youki" Remove constraint Author: "Kadobayashi, Youki"
369 results on '"Kadobayashi, Youki"'

Search Results

51. Adaptive Bloom Filter: A space-efficient counting algorithm for unpredictable network traffic

52. Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set

53. Reducing processor usage on heavily-loaded network servers with POSIX real-time scheduling control

54. Empirical Analysis of IPv6 Transition Technologies Using the IPv6 Network Evaluation Testbed

55. Towards a Vulnerability Tree Security Evaluation of OpenStack’s Logical Architecture

57. Towards Autonomous Driving Model Resistant to Adversarial Attack.

62. Active Credential Leakage for Observing Web-Based Attack Cycle

63. Building Better Unsupervised Anomaly Detector with S-Transform

64. Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer

65. STARS: A Simple and Efficient Scheme for Providing Transparent Traceability and Anonymity to Reputation Systems

70. Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning

71. A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis

72. Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing

74. String Kernel Based SVM for Internet Security Implementation

75. Hierarchical Core Vector Machines for Network Intrusion Detection

76. HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites

77. AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces

78. A Storage Efficient Redactable Signature in the Standard Model

79. Spanning SVM Tree for Personalized Transductive Learning

80. Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly

81. An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites

82. Hardening Botnet by a Rational Botmaster

83. Bridging the Gap Between PAMs and Overlay Networks: A Framework-Oriented Approach

84. A Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms

85. Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module

86. SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks

87. Proposal of Social Internetworking

90. A survey on blockchain, SDN and NFV for the smart-home security

Catalog

Books, media, physical & digital resources