Yoshiaki Hori
Yoshiaki Hori
Professor at Saga University
Verified email at cc.saga-u.ac.jp
TitleCited byYear
Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide
A Syalim, Y Hori, K Sakurai
2009 International conference on availability, reliability and security, 726-731, 2009
662009
Analysis of privacy disclosure in DNS query
F Zhao, Y Hori, K Sakurai
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
512007
Characteristics of UDP packet loss: Effect of tcp traffic
H Sawashima
Proc. of INET'97, June 1997, 1997
511997
Bot detection based on traffic analysis
Y Kugisaki, Y Kasahara, Y Hori, K Sakurai
The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
402007
Characterizing economic and social properties of trust and reputation systems in P2P environment
YF Wang, Y Hori, K Sakurai
Journal of Computer Science and Technology 23 (1), 129-140, 2008
382008
Interactively combining 2D and 3D visualization for network traffic monitoring
E Le Malécot, M Kohara, Y Hori, K Sakurai
Proceedings of the 3rd international workshop on Visualization for computer …, 2006
362006
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things
N Ruan, Y Hori
2012 International Conference on Selected Topics in Mobile and Wireless …, 2012
342012
A behavior based malware detection scheme for avoiding false positive
Y Fukushima, A Sakai, Y Hori, K Sakurai
2010 6th IEEE workshop on secure network protocols, 79-84, 2010
282010
Two-servers PIR based DNS query scheme with privacy-preserving
F Zhao, Y Hori, K Sakurai
The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
272007
Transport protocols for fast long-distance networks: comparison of their performances in JGN
K Kumazoe, Y Hori, M Tsuru, Y Oie
2004 International Symposium on Applications and the Internet Workshops …, 2004
212004
Enhancing SVO Logic for Mobile IPv6 Security Protocols.
I You, Y Hori, K Sakurai
JoWUA 2 (3), 26-52, 2011
202011
Mobility management of transport protocol supporting multiple connections
K Tsukamoto, Y Hori, Y Oie
Proceedings of the second international workshop on Mobility management …, 2004
182004
Grouping provenance information to improve efficiency of access control
A Syalim, Y Hori, K Sakurai
International Conference on Information Security and Assurance, 51-59, 2009
172009
On securing open networks through trust and reputation-architecture, challenges and solutions
Y Wang, Y Hori, K Sakurai
Proceeding of The 1st Joint Workshop on Information Security, 2006
172006
Security policy pre-evaluation towards risk analysis
Y Han, Y Hori, K Sakurai
2008 International Conference on Information Security and Assurance (isa …, 2008
162008
Transport protocol for fast long-distance networks: Evaluation of their penetration and robustness on JGNII
K Kumazoe
Proc. PFLDnet 2005, Feb., 2005
142005
Security Analysis of MIS Protocol on Wireless LAN comparison with IEEE802. 11i
Y Hori, K Sakurai
Proceedings of the 3rd international conference on Mobile technology …, 2006
132006
Can high-speed transport protocols be deployed on the Internet?: Evaluation through experiments on JGNII
K Kumazoe, K Kouyama, Y Hori, M Tsuru, Y Oie
Workshop on Protocols for Fast Long-Distance Networks, 2006
132006
New flow control schemes of TCP for multimodal mobile hosts
K Tsukamoto, Y Fukuda, Y Hori, Y Oie
The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003 …, 2003
132003
Economic-inspired truthful reputation feedback mechanism in p2p networks
Y Wang, Y Hori, K Sakurai
11th IEEE International Workshop on Future Trends of Distributed Computing …, 2007
122007
The system can't perform the operation now. Try again later.
Articles 1–20