default search action
Youki Kadobayashi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j50]Olufemi Abiodun Abraham, Hideya Ochiai, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks. IEEE Access 12: 26023-26045 (2024) - [j49]Bernard Ousmane Sané, Mandicou Ba, Doudou Fall, Yuzo Taenaka, Ibrahima Niang, Youki Kadobayashi:
Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage. IEEE Access 12: 74944-74960 (2024) - [c131]Adil Bin Bhutto, Ryota Kawashima, Yuzo Taenaka, Youki Kadobayashi:
Meeting Latency and Jitter Demands of Beyond 5G Networking Era: Are CNFs Up to the Challenge? COMPSAC 2024: 1598-1605 - [c130]Nahid Ferdous Aurna, Md Delwar Hossain, Hideya Ochiai, Yuzo Taenaka, Latifur Khan, Youki Kadobayashi:
Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity. ICISSP 2024: 309-319 - [c129]Md. Mahbubur Rahman, Md Delwar Hossain, Hideya Ochiai, Youki Kadobayashi, Tanjim Sakib, Syed Taha Yeasin Ramadan:
Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation. ICISSP 2024: 823-830 - [c128]Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi:
Differentially-Private Data Aggregation over Encrypted Location Data for Range Counting Query. ICOIN 2024: 409-414 - [c127]Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi:
OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect. SECRYPT 2024: 674-679 - 2023
- [j48]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Towards Autonomous Driving Model Resistant to Adversarial Attack. Appl. Artif. Intell. 37(1) (2023) - [j47]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
Oblivious Statistic Collection With Local Differential Privacy in Mutual Distrust. IEEE Access 11: 21374-21386 (2023) - [j46]Taisho Sasada, Masataka Kawai, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi:
Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture. IEEE Access 11: 141358-141374 (2023) - [j45]Hideya Ochiai, Md Delwar Hossain, Pawissakan Chirupphapa, Youki Kadobayashi, Hiroshi Esaki:
Modbus/RS-485 Attack Detection on Communication Signals with Machine Learning. IEEE Commun. Mag. 61(6): 43-49 (2023) - [j44]N'guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka, Youki Kadobayashi:
Smart home cybersecurity awareness and behavioral incentives. Inf. Comput. Secur. 31(5): 545-575 (2023) - [j43]Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto:
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware. J. Comput. Virol. Hacking Tech. 19(2): 149-163 (2023) - [c126]Mohammad Hafiz Hersyah, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology. CIoT 2023: 225-230 - [c125]Nahid Ferdous Aurna, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms. CSR 2023: 180-186 - [c124]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet. CSR 2023: 426-431 - [c123]Sadaf Md. Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen, Youki Kadobayashi:
Securing Smart Vehicles Through Federated Learning. FPS (1) 2023: 18-35 - [c122]Md Delwar Hossain, Hideya Ochiai, Latifur Khan, Youki Kadobayashi:
Smart Meter Modbus RS-485 Intrusion Detection by Federated Learning Approach. ICCAE 2023: 559-564 - [c121]Md Sharafat Hossain, Md Delwar Hossain, Md Mahbubur Rahman, Yuzo Taenaka, Md Saiful Islam, Youki Kadobayashi:
A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning. SIN 2023: 1-8 - [c120]Ryosuke Araki, Kshira Sagar Sahoo, Yuzo Taenaka, Youki Kadobayashi, Erik Elmroth, Monowar H. Bhuyan:
Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis. TrustCom 2023: 485-494 - [c119]Olufemi Abiodun Abraham, Hideya Ochiai, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data. WFCS 2023: 1-8 - [c118]Hideya Ochiai, Md Delwar Hossain, Youki Kadobayashi, Hiroshi Esaki:
Attacker Localization with Machine Learning in RS-485 Industrial Control Networks. WFCS 2023: 1-8 - 2022
- [j42]N'guessan Yves-Roland Douha, Monowar H. Bhuyan, Shigeru Kashihara, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
A survey on blockchain, SDN and NFV for the smart-home security. Internet Things 20: 100588 (2022) - [c117]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
Decoupling Statistical Trends from Data Volume on LDP-Based Spatio-Temporal Data Collection. FNWF 2022: 262-269 - [c116]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Personalized Federated Learning for Automotive Intrusion Detection Systems. FNWF 2022: 544-549 - [c115]Olufemi Abiodun Abraham, Hideya Ochiai, Kabid Hassan Shibly, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Unauthorized Power Usage Detection Using Gradient Boosting Classifier in Disaggregated Smart Meter Home Network. FNWF 2022: 688-693 - [c114]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Autonomous Driving Model Defense Study on Hijacking Adversarial Attack. ICANN (4) 2022: 546-557 - [c113]Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi:
Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior. ICISSP 2022: 677-687 - [c112]Md Delwar Hossain, Hideya Ochiai, Tatsuya Arisawa, Youki Kadobayashi:
Smart Meter Modbus RS-485 Spoofing Attack Detection by LSTM Deep Learning Approach. SDS 2022: 47-52 - [c111]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
DPSD: Dynamic Private Spatial Decomposition Based on Spatial and Temporal Correlations. SmartCom 2022: 188-202 - 2021
- [j41]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT. Internet Things 14: 100391 (2021) - [j40]Ruo Ando, Youki Kadobayashi, Hiroki Takakura:
Choice of parallelism: multi-GPU driven pipeline for huge academic backbone network. Int. J. Parallel Emergent Distributed Syst. 36(6): 609-622 (2021) - [c110]Mohd Ruzeiny Bin Kamaruzzaman, Bernard Ousmane Sané, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics. CSR 2021: 241-248 - [c109]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Ibrahima Diané, Youki Kadobayashi:
D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems. FiCloud 2021: 304-310 - [c108]Taisho Sasada, Masataka Kawai, Yuzo Taenaka, Doudou Fall, Youki Kadobayashi:
Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss. ICAIIC 2021: 42-47 - [c107]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Doudou Fall, Yuzo Taenaka, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications. IEA/AIE (1) 2021: 530-543 - [c106]Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall:
Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams. SDS 2021: 1-8 - [i4]Ruo Ando, Youki Kadobayashi, Hiroki Takakura:
Choice of Parallelism: Multi-GPU Driven Pipeline for Huge Academic Backbone Network. CoRR abs/2106.12863 (2021) - 2020
- [j39]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Youki Kadobayashi:
Hierarchical Load Balancing and Clustering Technique for Home Edge Computing. IEEE Access 8: 127593-127607 (2020) - [j38]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications. IEEE Access 8: 185489-185502 (2020) - [c105]Matthias Baudlet, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance. BRAINS 2020: 17-24 - [c104]Bernard Ousmane Sané, Mandicou Ba, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Ibrahima Niang, Youki Kadobayashi:
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage. CCGRID 2020: 440-449 - [c103]Md Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches. ICCCS 2020: 491-497 - [c102]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus. COMPSAC 2020: 10-17 - [c101]Md Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning. CSCloud/EdgeCom 2020: 62-69 - [c100]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach. GLOBECOM 2020: 1-6 - [c99]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. ICICS 2020: 223-242 - [c98]Shaoning Pang, Tao Ban, Youki Kadobayashi, Jungsuk Song, Kaizhu Huang, Geongsen Poh, Iqbal Gondal, Kitsuchart Pasupa, Fadi A. Aloul:
CDMC'19 - The 10th International Cybersecurity Data Mining Competition. ICONIP (2) 2020: 235-245 - [c97]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
SDN-Enabled IoT Anomaly Detection Using Ensemble Learning. AIAI (2) 2020: 268-280 - [c96]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
Anonymizing Location Information in Unstructured Text Using Knowledge Graph. iiWAS 2020: 163-167 - [i3]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes affecting user decision to adopt a Virtual Private Network (VPN) app. CoRR abs/2008.06813 (2020)
2010 – 2019
- 2019
- [j37]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi:
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents. IEEE Access 7: 130758-130771 (2019) - [j36]Gábor Lencse, Youki Kadobayashi:
Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis. IEICE Trans. Commun. 102-B(10): 2021-2035 (2019) - [j35]Andrew M'manga, Shamal Faily, John McAlaney, Chris Williams, Youki Kadobayashi, Daisuke Miyamoto:
A normative decision-making model for cyber security. Inf. Comput. Secur. 27(5) (2019) - [j34]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Youki Kadobayashi:
A Demographic Perspective of Smartphone Security and Its Redesigned Notifications. J. Inf. Process. 27: 773-786 (2019) - [c95]Youki Shiraishi, Akiko Manada, Yuzo Taenaka, Youki Kadobayashi:
A Method for Designing Proximity-Aware Regular Graph-Based Structured Overlay Networks. ICCCS 2019: 430-435 - [c94]Doudou Fall, Youki Kadobayashi:
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy? ICISSP 2019: 405-411 - [c93]Shun Yonamine, Youki Kadobayashi, Daisuke Miyamoto, Yuzo Taenaka:
Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection. ICISSP 2019: 471-478 - [c92]Monowar H. Bhuyan, Maode Ma, Youki Kadobayashi, Erik Elmroth:
Information-Theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting. ICTAI 2019: 995-1002 - [c91]Serigne Mouhamadane Diop, Jema David Ndibwile, Doudou Fall, Shigeru Kashihara, Youki Kadobayashi:
To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications. ISSRE Workshops 2019: 282-287 - [c90]Tan Omiya, Doudou Fall, Youki Kadobayashi:
IoT-Poly: An IoT Security Game Practice Tool for Learners Motivation and Skills Acquisition. Koli Calling 2019: 16:1-16:10 - [c89]Pratyush Kr. Deka, Monowar H. Bhuyan, Youki Kadobayashi, Erik Elmroth:
Adversarial Impact on Anomaly Detection in Cloud Datacenters. PRDC 2019: 188-197 - 2018
- [j33]Gábor Lencse, Youki Kadobayashi:
Benchmarking DNS64 implementations: Theory and practice. Comput. Commun. 127: 61-74 (2018) - [j32]Gábor Lencse, Youki Kadobayashi:
Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64. Comput. Secur. 77: 397-411 (2018) - [j31]Takeshi Takahashi, Bhola Panta, Youki Kadobayashi, Koji Nakao:
Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information. Int. J. Commun. Syst. 31(3) (2018) - [j30]Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi:
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle. Int. J. Inf. Sec. 17(2): 135-151 (2018) - [j29]Ady Wahyudi Paundu, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment. Secur. Commun. Networks 2018: 4216240:1-4216240:18 (2018) - [c88]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
A comparative study of smartphone-user security perception and preference towards redesigned security notifications. AfriCHI 2018: 17:1-17:6 - [c87]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Ibrahima Niang, Youki Kadobayashi:
Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency. EDGE 2018: 3-17 - [c86]Kazuya Okada, Shigeru Kashihara, Nao Kawanishi, Nobuo Suzuki, Keizo Sugiyama, Youki Kadobayashi:
GoEdge: A Scalable and Stateless Local Breakout Method. TOPIC@PODC 2018: 29-34 - [c85]Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto:
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. PST 2018: 1-11 - 2017
- [j28]Gábor Lencse, Marius Georgescu, Youki Kadobayashi:
Benchmarking methodology for DNS64 servers. Comput. Commun. 109: 162-175 (2017) - [j27]Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Youki Kadobayashi:
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. Comput. Secur. 69: 155-173 (2017) - [c84]Jema David Ndibwile, Youki Kadobayashi, Doudou Fall:
UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App. AsiaJCIS 2017: 38-47 - [c83]Gregory Blanc, Dawid Machnicki, Rodrigo Diaz-Rodriguez, Adam Kozakiewicz, Youki Kadobayashi, Rishikesh Sahay, Pawel Pawlinski:
NECOMA - Nippon-European Cyberdefense-Oriented Multilayer Analysis. EPS 2017 - 2016
- [j26]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing. J. Inf. Process. 24(2): 371-380 (2016) - [c82]Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System. CSCloud 2016: 84-94 - [c81]Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies. ICISSP 2016: 243-254 - 2015
- [j25]Takeshi Takahashi, Youki Kadobayashi:
Reference Ontology for Cybersecurity Operational Information. Comput. J. 58(10): 2297-2312 (2015) - [j24]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies. IEICE Trans. Inf. Syst. 98-D(3): 588-595 (2015) - [j23]Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi:
Client Honeypot Multiplication with High Performance and Precise Detection. IEICE Trans. Inf. Syst. 98-D(4): 775-787 (2015) - [j22]Christopher Michael Yap, Youki Kadobayashi, Suguru Yamaguchi:
Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home. Int. J. Gaming Comput. Mediat. Simulations 7(3): 1-21 (2015) - [j21]Marius Georgescu, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(2): e1 (2015) - [j20]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms. J. Inf. Process. 23(4): 465-475 (2015) - [c80]Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi:
AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. BADGERS@RAID 2015: 74-84 - [c79]Jema David Ndibwile, A. Govardhan, Kazuya Okada, Youki Kadobayashi:
Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication. COMPSAC Workshops 2015: 261-267 - [c78]Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System. ICICS 2015: 320-334 - [c77]Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi:
Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification. ICONIP (3) 2015: 223-232 - [c76]Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Benchmarking the load scalability of IPv6 transition technologies: A black-box analysis. ISCC 2015: 329-334 - [c75]Sirikarn Pukkawanna, Youki Kadobayashi, Suguru Yamaguchi:
Network-based mimicry anomaly detection using divergence measures. ISNCC 2015: 1-7 - 2014
- [j19]Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue:
A Learner-Independent Knowledge Transfer Approach to Multi-task Learning. Cogn. Comput. 6(3): 304-320 (2014) - [j18]Noppawat Chaisamran, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
SIP Flooding Attack Detection Using a Trust Model and Statistical Algorithms. J. Inf. Process. 22(2): 118-129 (2014) - [c74]Sirikarn Pukkawanna, Gregory Blanc, Joaquín García-Alfaro, Youki Kadobayashi, Hervé Debar:
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment. BADGERS@ESORICS 2014: 30-39 - [c73]Daisuke Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki, Youki Kadobayashi:
EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits. BADGERS@ESORICS 2014: 56-65 - [c72]Hajime Tazaki, Kazuya Okada, Yuji Sekiya, Youki Kadobayashi:
MATATABI: Multi-layer Threat Analysis Platform with Hadoop. BADGERS@ESORICS 2014: 75-82 - [c71]Kazuya Okada, Hiroaki Hazeyama, Youki Kadobayashi:
Oblivious DDoS mitigation with locator/ID separation protocol. CFI 2014: 8:1-8:6 - [c70]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Detecting anomalies in massive traffic with sketches. CFI 2014: 14:1-14:2 - [c69]Takuji Iimura, Daisuke Miyamoto, Hajime Tazaki, Youki Kadobayashi:
NECOMAtter: curating approach for sharing cyber threat information. CFI 2014: 19:1-19:2 - [c68]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks. ICOIN 2014: 282-287 - [c67]Takeshi Takahashi, Youki Kadobayashi:
Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks. ICSC 2014: 279-284 - [c66]Marius Georgescu, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Empirical Analysis of IPv6 Transition Technologies Using the IPv6 Network Evaluation Testbed. TRIDENTCOM 2014: 216-228 - [c65]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture. TRUST 2014: 127-142 - [i2]Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara:
Ontological Approach toward Cybersecurity in Cloud Computing. CoRR abs/1405.6169 (2014) - [i1]Takeshi Takahashi, Kent Landfield, Youki Kadobayashi:
An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information. RFC 7203: 1-28 (2014) - 2013
- [j17]Shuzhen Wang, Zonghua Zhang, Youki Kadobayashi:
Exploring attack graph for cost-benefit security hardening: A probabilistic approach. Comput. Secur. 32: 158-169 (2013) - [c64]Noppawat Chaisamran, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Trust-based SPIT detection by using call duration and social reliability. APCC 2013: 98-103 - [c63]Doudou Fall, Takeshi Okuda, Noppawat Chaisamran, Youki Kadobayashi, Suguru Yamaguchi:
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing. CLOSER 2013: 145-148 - [c62]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Building Better Unsupervised Anomaly Detector with S-Transform. NSS 2013: 582-589 - [c61]Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi:
Active Credential Leakage for Observing Web-Based Attack Cycle. RAID 2013: 223-243 - 2012
- [j16]