default search action
Kotaro Kataoka
- > Home > Persons > Kotaro Kataoka
Publications
- 2023
- [j14]Deepu Raj Ramachandran RAJ, Tahir Ahmed Shaik, Anish Hirwe, Praveen Tammana, Kotaro Kataoka:
Building a Digital Twin Network of SDN Using Knowledge Graphs. IEEE Access 11: 63092-63106 (2023) - [j13]Yuka Kataoka, Achmad Husni Thamrin, Rodney Van Meter, Jun Murai, Kotaro Kataoka:
Investigating the effect of computer-mediated feedback via an LMS integration in a large-scale Japanese speaking class. Educ. Inf. Technol. 28(2): 1957-1986 (2023) - [c39]Harish S. A, Suvrima Datta, Hemanth Kothapalli, Praveen Tammana, Achmad Basuki, Kotaro Kataoka, Selvakumar Manickam, U. Venkanna, Yung-Wey Chong:
Scaling IoT MUD Enforcement using Programmable Data Planes. NOMS 2023: 1-9 - 2022
- [j10]Pragati Shrivastava, Kotaro Kataoka:
Topology Poisoning Attacks and Prevention in Hybrid Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 19(1): 510-523 (2022) - [c38]Anish Hirwe, Nikita Makharia, Tanmay Renugunta, Kotaro Kataoka:
ResiConnect - Fault Detection and Resilience for Multi-Stage AWGR-based Optical Networks. APNOMS 2022: 1-6 - [c37]Harish S. A, Hemanth Kothapalli, Shubham Lahoti, Kotaro Kataoka, Praveen Tammana:
IoT MUD enforcement in the edge cloud using programmable switch. FFSPIN@SIGCOMM 2022: 1-7 - 2021
- [c34]Tahir Ahmed Shaik, Kotaro Kataoka:
capsAEUL: Slow HTTP DoS Attack Detection using Autoencoders through Unsupervised Learning. AINTEC 2021: 49-55 - [c32]Bhavesh Toshniwal, Kotaro Kataoka:
Comparative Performance Analysis of Underlying Network Topologies for Blockchain. ICOIN 2021: 367-372 - 2020
- [j8]Kalpana D. Joshi, Kotaro Kataoka:
pSMART: A lightweight, privacy-aware service function chain orchestration in multi-domain NFV/SDN. Comput. Networks 178: 107295 (2020) - [j7]Anish Hirwe, Ibrahim Dalal, Kotaro Kataoka:
Predicting Dynamic Network State of SFC Operation With Uncertainties. IEEE Commun. Lett. 24(11): 2564-2568 (2020) - [j6]Anish Hirwe, Kotaro Kataoka:
FDN: Function Delivery Network - Optimizing Service Chain Deployment in NFV. IEICE Trans. Commun. 103-B(7): 712-725 (2020) - [j5]Pragati Shrivastava, Mohd. Saalim Jamal, Kotaro Kataoka:
EvilScout: Detection and Mitigation of Evil Twin Attack in SDN Enabled WiFi. IEEE Trans. Netw. Serv. Manag. 17(1): 89-102 (2020) - 2019
- [c30]Bhavesh Toshniwal, Kalpana D. Joshi, Pragati Shrivastava, Kotaro Kataoka:
BEAM: BEhavior-Based Access Control Mechanism for SDN Applications. ICCCN 2019: 1-2 - [c29]Yuka Kataoka, Achmad Husni Thamrin, Jun Murai, Kotaro Kataoka:
Employing Automatic Speech Recognition for Quantitative Oral Corrective Feedback in Japanese Second or Foreign Language Education. ICETC 2019: 52-58 - [c28]Kalpana D. Joshi, Kotaro Kataoka:
PRIME-Q: Privacy Aware End-to-End QoS Framework in Multi-Domain SDN. NetSoft 2019: 169-177 - 2018
- [c27]Anish Hirwe, Mrinal Aich, Kotaro Kataoka:
Dynamic Network Function (DNF): Service Chain Placement and Bottleneck Removal for Edge-Fog-Cloud Interplay. AINTEC 2018: 46-53 - [c25]Yuka Kataoka, Achmad Husni Thamrin, Jun Murai, Kotaro Kataoka:
Effective use of learning management system for large-scale Japanese language education. ICETC 2018: 49-56 - [c24]Mohd. Saalim Jamal, Venkata Keerthy S, Hideya Ochiai, Hiroshi Esaki, Kotaro Kataoka:
INSTRUCT: A Clustering Based Identification of Valid Communications in IoT Networks. IoTSMS 2018: 228-233 - [c23]Pragati Shrivastava, Annanay Agarwal, Kotaro Kataoka:
Poster: Detection of Topology Poisoning by Silent Relay Attacker in SDN. MobiCom 2018: 792-794 - [c22]Pragati Shrivastava, Kotaro Kataoka:
LEGION: Lightweight & Distributed Mobility Management for MSDN based Large-scale WiFi. NetSoft 2018: 232-236 - [c21]Mohd. Saalim Jamal, Anish Hirwe, Kotaro Kataoka:
VIBHAJAN: A Lightweight and Scalable Control Plane Management for Multi-Controller SDN. NFV-SDN 2018: 1-7 - 2016
- [c16]Pragati Shrivastava, Kotaro Kataoka:
FastSplit: Fast and Dynamic IP Mobility Management in SDN. ITNAC 2016: 166-172 - [c15]Kalpana D. Joshi, Kotaro Kataoka:
SFO: SubFlow Optimizer for MPTCP in SDN. ITNAC 2016: 173-178 - [c13]Anish Hirwe, Kotaro Kataoka:
LightChain: A lightweight optimisation of VNF placement for service chaining in NFV. NetSoft 2016: 33-37 - 2012
- [j4]Kotaro Kataoka, Keisuke Uehara, Masafumi Oe, Jun Murai:
Design and Deployment of Post-Disaster Recovery Internet in 2011 Tohoku Earthquake. IEICE Trans. Commun. 95-B(7): 2200-2209 (2012) - [c4]Devendra Jalihal, Ravinder David Koilpillai, P. Khawas, S. Sampoornam, Sree Hari Nagarajan, Keiji Takeda, Kotaro Kataoka:
A rapidly deployable disaster communications system for developing countries. ICC 2012: 6339-6343 - 2011
- [c3]Noriatsu Kudo, Kotaro Kataoka, Jun Murai:
On Operational Scheme for Remote Lectures in Inter-university Distance Learning Project. CSEDU (2) 2011: 249-257 - 2010
- [j3]Kotaro Kataoka, Achmad Husni Thamrin, Jun Murai:
A Scalable Network Architecture for a Large-scale Uni-directional Link. Inf. Media Technol. 5(2): 813-825 (2010) - [j2]Kotaro Kataoka, Achmad Husni Thamrin, Jun Murai:
A Scalable Network Architecture for a Large-scale Uni-directional Link. J. Inf. Process. 18: 125-137 (2010) - 2007
- [c2]Kotaro Kataoka, Achmad Husni Thamrin, Kenjiro Cho, Jun Takei, Jun Murai:
Architecture of Satellite Internet for Asia-Wide Digital Communications. AINTEC 2007: 242-255 - 2003
- [c1]Kotaro Kataoka, Haruhito Watanabe, Jun Murai:
Data Link Monitoring on the Satellite Based Network in the Internet. SAINT Workshops 2003: 35-40
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-06 00:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint