Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide A Syalim, Y Hori, K Sakurai 2009 International conference on availability, reliability and security, 726-731, 2009 | 115 | 2009 |
Analysis of privacy disclosure in DNS query F Zhao, Y Hori, K Sakurai 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007 | 73 | 2007 |
Characteristics of UDP packet loss: Effect of tcp traffic H Sawashima Proceedings of INET'97, Engineering 3-1, June, 1997 | 65 | 1997 |
A behavior based malware detection scheme for avoiding false positive Y Fukushima, A Sakai, Y Hori, K Sakurai 2010 6th IEEE workshop on secure network protocols, 79-84, 2010 | 49 | 2010 |
Bot detection based on traffic analysis Y Kugisaki, Y Kasahara, Y Hori, K Sakurai The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007 | 49 | 2007 |
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things N Ruan, Y Hori 2012 International Conference on Selected Topics in Mobile and Wireless …, 2012 | 48 | 2012 |
Characterizing economic and social properties of trust and reputation systems in P2P environment YF Wang, Y Hori, K Sakurai Journal of Computer Science and Technology 23 (1), 129-140, 2008 | 42 | 2008 |
Two-servers PIR based DNS query scheme with privacy-preserving F Zhao, Y Hori, K Sakurai The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007 | 39 | 2007 |
Interactively combining 2D and 3D visualization for network traffic monitoring E Le Malecot, M Kohara, Y Hori, K Sakurai Proceedings of the 3rd international workshop on Visualization for computer …, 2006 | 39 | 2006 |
Enhancing SVO Logic for Mobile IPv6 Security Protocols. I You, Y Hori, K Sakurai J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 26-52, 2011 | 25 | 2011 |
On securing open networks through trust and reputation-architecture, challenges and solutions Y Wang, Y Hori, K Sakurai Proceeding of the 1st Joint Workshop on Information Security (JWIS), Seoul Korea, 2006 | 21 | 2006 |
Grouping provenance information to improve efficiency of access control A Syalim, Y Hori, K Sakurai Advances in Information Security and Assurance: Third International …, 2009 | 20 | 2009 |
Security policy pre-evaluation towards risk analysis Y Han, Y Hori, K Sakurai 2008 International Conference on Information Security and Assurance (isa …, 2008 | 20 | 2008 |
Transport protocols for fast long-distance networks: comparison of their performances in JGN K Kumazoe, Y Hori, M Tsuru, Y Oie 2004 International Symposium on Applications and the Internet Workshops …, 2004 | 20 | 2004 |
Mobility management of transport protocol supporting multiple connections K Tsukamoto, Y Hori, Y Oie Proceedings of the second international workshop on Mobility management …, 2004 | 19 | 2004 |
Transport protocols for fast long-distance networks: Evaluation of their penetration and robustness on JGNII K Kumazoe, K Kouyama, Y Hori, M Tsuru, Y Oie IEICE Technical Report; IEICE Tech. Rep. 105 (279), 37-42, 2005 | 16 | 2005 |
Economic-inspired truthful reputation feedback mechanism in p2p networks Y Wang, Y Hori, K Sakurai 11th IEEE International Workshop on Future Trends of Distributed Computing …, 2007 | 14 | 2007 |
Can high-speed transport protocols be deployed on the Internet?: Evaluation through experiments on JGNII K Kumazoe, K Kouyama, Y Hori, M Tsuru, Y Oie Workshop on Protocols for Fast Long-Distance Networks, 2006 | 14 | 2006 |
New flow control schemes of TCP for multimodal mobile hosts K Tsukamoto, Y Fukuda, Y Hori, Y Oie The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003 …, 2003 | 14 | 2003 |
Security Analysis of MIS Protocol on Wireless LAN comparison with IEEE802. 11i Y Hori, K Sakurai Proceedings of the 3rd international conference on mobile technology …, 2006 | 13 | 2006 |