Follow
Yoshiaki Hori
Yoshiaki Hori
Professor at Saga University
Verified email at cc.saga-u.ac.jp
Title
Cited by
Cited by
Year
Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide
A Syalim, Y Hori, K Sakurai
2009 International conference on availability, reliability and security, 726-731, 2009
1032009
Analysis of privacy disclosure in DNS query
F Zhao, Y Hori, K Sakurai
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
692007
Characteristics of UDP packet loss: Effect of tcp traffic
H Sawashima
Proc. of INET'97, June 1997, 1997
591997
Bot detection based on traffic analysis
Y Kugisaki, Y Kasahara, Y Hori, K Sakurai
The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
472007
A behavior based malware detection scheme for avoiding false positive
Y Fukushima, A Sakai, Y Hori, K Sakurai
2010 6th IEEE workshop on secure network protocols, 79-84, 2010
442010
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things
N Ruan, Y Hori
2012 International Conference on Selected Topics in Mobile and Wireless …, 2012
402012
Characterizing economic and social properties of trust and reputation systems in P2P environment
YF Wang, Y Hori, K Sakurai
Journal of Computer Science and Technology 23 (1), 129-140, 2008
392008
Two-servers PIR based DNS query scheme with privacy-preserving
F Zhao, Y Hori, K Sakurai
The 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
392007
Interactively combining 2D and 3D visualization for network traffic monitoring
E Le Malécot, M Kohara, Y Hori, K Sakurai
Proceedings of the 3rd international workshop on Visualization for computer …, 2006
382006
Enhancing SVO Logic for Mobile IPv6 Security Protocols.
I You, Y Hori, K Sakurai
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 26-52, 2011
232011
On securing open networks through trust and reputation-architecture, challenges and solutions
Y Wang, Y Hori, K Sakurai
Proceeding of the 1st Joint Workshop on Information Security (JWIS), Seoul Korea, 2006
212006
Grouping provenance information to improve efficiency of access control
A Syalim, Y Hori, K Sakurai
International Conference on Information Security and Assurance, 51-59, 2009
202009
Transport protocols for fast long-distance networks: comparison of their performances in JGN
K Kumazoe, Y Hori, M Tsuru, Y Oie
2004 International Symposium on Applications and the Internet Workshops …, 2004
202004
Mobility management of transport protocol supporting multiple connections
K Tsukamoto, Y Hori, Y Oie
Proceedings of the second international workshop on Mobility management …, 2004
182004
Security policy pre-evaluation towards risk analysis
Y Han, Y Hori, K Sakurai
2008 International Conference on Information Security and Assurance (isa …, 2008
172008
Transport protocols for fast long-distance networks: Evaluation of their penetration and robustness on JGNII
K Kumazoe, K Kouyama, Y Hori, M Tsuru, Y Oie
IEICE Technical Report; IEICE Tech. Rep. 105 (279), 37-42, 2005
162005
Economic-inspired truthful reputation feedback mechanism in p2p networks
Y Wang, Y Hori, K Sakurai
11th IEEE International Workshop on Future Trends of Distributed Computing …, 2007
142007
New flow control schemes of TCP for multimodal mobile hosts
K Tsukamoto, Y Fukuda, Y Hori, Y Oie
The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003 …, 2003
142003
Can high-speed transport protocols be deployed on the Internet?: Evaluation through experiments on JGNII
K Kumazoe, K Kouyama, Y Hori, M Tsuru, Y Oie
Workshop on Protocols for Fast Long-Distance Networks, 2006
132006
Out-of-sequence packet arrivals due to layer 2 ARQ and its impact on TCP performance in W-CDMA networks
H Koga, T Ikenaga, Y Hori, Y Oie
2003 Symposium on Applications and the Internet, 2003. Proceedings., 398-401, 2003
132003
The system can't perform the operation now. Try again later.
Articles 1–20