Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation J Song, H Takakura, Y Okabe, M Eto, D Inoue, K Nakao Proceedings of the first workshop on building analysis datasets and …, 2011 | 411 | 2011 |
Toward a more practical unsupervised anomaly detection system J Song, H Takakura, Y Okabe, K Nakao Information Sciences 231, 4-14, 2013 | 125 | 2013 |
Description of kyoto university benchmark data J Song, H Takakura, Y Okabe Available at link: http://www. takakura. com/Kyoto_data/BenchmarkData …, 2006 | 88 | 2006 |
A packet-in message filtering mechanism for protection of control plane in openflow networks D Kotani, Y Okabe Proceedings of the tenth ACM/IEEE symposium on Architectures for networking …, 2014 | 70 | 2014 |
Tcp multi-home options A Matsumoto, M Kozuka, K Fujikawa, Y Okabe draft-arifumi-tcp-mh-00. txt, IETF Internet draft, 2003 | 59 | 2003 |
Unsupervised anomaly detection based on clustering and multiple one-class SVM J Song, H Takakura, Y Okabe, Y Kwon IEICE transactions on communications 92 (6), 1981-1990, 2009 | 56 | 2009 |
An anonymous distributed electronic voting system using Zerocoin Y Takabatake, D Kotani, Y Okabe IEICE Technical Report 116 (282), 127-131, 2016 | 55 | 2016 |
Cooperation of intelligent honeypots to detect unknown malicious codes J Song, H Takakura, Y Okabe 2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008 | 53 | 2008 |
Reactive configuration updating for intent-based networking Y Tsuzaki, Y Okabe 2017 International Conference on Information Networking (ICOIN), 97-102, 2017 | 51 | 2017 |
Assistive robots for socialization in elderly people: results pertaining to the needs of the users G D’Onofrio, L Fiorini, H Hoshino, A Matsumori, Y Okabe, M Tsukamoto, ... Aging clinical and experimental research 31, 1313-1329, 2019 | 48 | 2019 |
High-performance intrusion detection using optigrid clustering and grid-based labelling M Ishida, H Takakura, Y Okabe 2011 IEEE/IPSJ International Symposium on Applications and the Internet, 11-19, 2011 | 35 | 2011 |
The online graph exploration problem on restricted graphs S Miyazaki, N Morimoto, Y Okabe IEICE transactions on information and systems 92 (9), 1620-1627, 2009 | 32 | 2009 |
A comprehensive approach to detect unknown attacks via intrusion detection alerts J Song, H Ohba, H Takakura, Y Okabe, K Ohira, Y Kwon Advances in Computer Science–ASIAN 2007. Computer and Network Security: 12th …, 2007 | 32 | 2007 |
Quality-aware energy routing toward on-demand home energy networking:(Position paper) K Sakai, Y Okabe 2011 IEEE Consumer Communications and Networking Conference (CCNC), 1041-1044, 2011 | 29 | 2011 |
Single backup table schemes for shortest-path routing H Ito, K Iwama, Y Okabe, T Yoshihiro Theoretical Computer Science 333 (3), 347-353, 2005 | 27 | 2005 |
Zero trust federation: sharing context under user control towards zero trust in identity federation K Hatakeyama, D Kotani, Y Okabe 2021 IEEE International Conference on Pervasive Computing and Communications …, 2021 | 24 | 2021 |
Polynomial-Time Computable Backup Tables for Shortest-Path Routing. H Ito, K Iwama, Y Okabe, T Yoshihiro SIROCCO, 163-177, 2003 | 24 | 2003 |
Packet-in message control for reducing cpu load and control traffic in openflow switches D Kotani, Y Okabe 2012 European Workshop on Software Defined Networking, 42-47, 2012 | 23 | 2012 |
The design and implementation of an on-demand DC grid in home T Shibata, K Sakai, Y Okabe 2011 IEEE/IPSJ International Symposium on Applications and the Internet, 152-159, 2011 | 23 | 2011 |
A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking M Okada, Y Okabe, T Uehara 2010 7th IEEE Consumer Communications and Networking Conference, 1-2, 2010 | 23 | 2010 |