113 results on '"Ayumu Kubota"'
Search Results
2. Extension of Resource Authorization Method with SSI in Edge Computing.
3. Poster: Understanding and Managing Changes in IoT Device Behaviors for Reliable Network Traffic Inference.
4. Application of Generalized Deduplication Techniques in Edge Computing Environments.
5. Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert.
6. Resource Authorization Methods for Edge Computing.
7. Identification of an IoT Device Model in the Home Domain Using IPFIX Records.
8. On recruiting and retaining users for security-sensitive longitudinal measurement panels.
9. Anomaly Traffic Detection with Federated Learning toward Network-based Malware Detection in IoT.
10. A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load.
11. A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow Data.
12. Designing Personalized OS Update Message based on Security Behavior Stage Model.
13. SeBeST: Security Behavior Stage Model and Its Application to OS Update.
14. Phishing Site Detection Using Similarity of Website Structure.
15. Human Factors in Homograph Attack Recognition.
16. Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack.
17. Detecting Malicious Websites by Query Templates.
18. Runtime Attestation for IAAS Clouds.
19. Predicting Impending Exposure to Malicious Content from User Behavior.
20. Robust ORAM: Enhancing Availability, Confidentiality and Integrity.
21. ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System.
22. Classification of Landing and Distribution Domains Using Whois' Text Mining.
23. Anonymous and analysable web browsing.
24. Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
25. On the implementation of path-based dynamic pricing in edge-directed routing.
26. A Comprehensive Security Analysis Checksheet for OpenFlow Networks.
27. Ephemeral UUID for Protecting User Privacy in Mobile Advertisements.
28. On the Feasibility of Deploying Software Attestation in Cloud Environments.
29. An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors.
30. Smart City Security Based on a Meta-Security Framework for Digital Twins
31. Passive OS Fingerprinting by DNS Traffic Analysis.
32. SanAdBox: Sandboxing third party advertising libraries in a mobile application.
33. Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web.
34. SIBRA: Scalable Internet Bandwidth Reservation Architecture.
35. Understanding the time-series behavioral characteristics of evolutionally advanced email spammers.
36. On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic.
37. Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics.
38. Kernel-based Behavior Analysis for Android Malware Detection.
39. Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data
40. Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking.
41. Service Independent Access Control Architecture for User Generated Content (UGC).
42. Open 6to4 Relay Router Operation.
43. A study on identifying battery-draining Android applications in screen-off state.
44. 5G Security
45. Dynamic Inference from IoT Traffic Flows under Concept Drifts in Residential ISP Networks
46. L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes.
47. OCALA: An Architecture for Supporting Legacy Applications over Overlays.
48. Network Security Status in Japan
49. Correction to: Cord blood transplantation with a reduced-intensity conditioning regimen using fludarabine and melphalan for adult T-cell leukemia/lymphoma
50. Cord blood transplantation with a reduced-intensity conditioning regimen using fludarabine and melphalan for adult T-cell leukemia/lymphoma
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.