Search

Your search keyword '"Kadobayashi, Youki"' showing total 279 results

Search Constraints

Start Over You searched for: Author "Kadobayashi, Youki" Remove constraint Author: "Kadobayashi, Youki"
279 results on '"Kadobayashi, Youki"'

Search Results

252. An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites.

253. Spanning SVM Tree for Personalized Transductive Learning.

254. Hardening Botnet by a Rational Botmaster.

255. Hierarchical Core Vector Machines for Network Intrusion Detection.

256. String Kernel Based SVM for Internet Security Implementation.

257. HumanBoost: Utilization of Users΄ Past Trust Decision for Identifying Fraudulent Websites.

258. AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces.

259. Bridging the Gap Between PAMs and Overlay Networks: A Framework-Oriented Approach.

260. A Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms.

261. Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module.

263. SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks.

266. A Learner-Independent Knowledge Transfer Approach to Multi-task Learning.

267. A survey on blockchain, SDN and NFV for the smart-home security

268. LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration.

269. On Tighter Inequalities for Efficient Similarity Search in Metric Spaces.

270. DeL-IoT: A Deep Ensemble Learning Approach to Uncover Anomalies in IoT

274. NECOMAtter.

276. Towards Autonomous Driving Model Resistant to Adversarial Attack.

277. Personalized mode transductive spanning SVM classification tree

278. HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.

279. The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan

Catalog

Books, media, physical & digital resources