Proposal of a method to detect black hole attack in MANET XY Zhang, Y Sekiya, Y Wakahara 2009 International Symposium on Autonomous Decentralized Systems, 1-6, 2009 | 68 | 2009 |
Library operating system with mainline Linux network stack H Tazaki, R Nakamura, Y Sekiya Proceedings of netdev, 2015 | 34 | 2015 |
Efficient alarm messaging by multi-channel cut-through rebroadcasting based on inter-vehicle communication P Akkhara, Y Sekiya, Y Wakahara IAENG International Journal of Computer Science 36 (2), 157-166, 2009 | 28 | 2009 |
mdx: A cloud platform for supporting data science and cross-disciplinary research collaborations T Suzumura, A Sugiki, H Takizawa, A Imakura, H Nakamura, K Taura, ... 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2022 | 23 | 2022 |
Availability and Effectiveness of Root DNS servers: A long term study BS Lee, YS Tan, Y Sekiya, A Narishige, S Date 2010 IEEE Network Operations and Management Symposium-NOMS 2010, 862-865, 2010 | 22 | 2010 |
Flower jelly printer: Slit injection printing for parametrically designed flower jelly M Miyatake, K Narumi, Y Sekiya, Y Kawahara Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021 | 21 | 2021 |
Unsupervised scanning behavior detection based on distribution of network traffic features using robust autoencoders G Kotani, Y Sekiya 2018 IEEE international conference on data mining workshops (ICDMW), 35-38, 2018 | 21 | 2018 |
Classification of URL bitstreams using bag of bytes K Shima, D Miyamoto, H Abe, T Ishihara, K Okada, Y Sekiya, H Asai, ... 2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018 | 20 | 2018 |
MATATABI: multi-layer threat analysis platform with Hadoop H Tazaki, K Okada, Y Sekiya, Y Kadobayashi 2014 Third International Workshop on Building Analysis Datasets and …, 2014 | 18 | 2014 |
Grafting sockets for fast container networking R Nakamura, Y Sekiya, H Tazaki Proceedings of the 2018 Symposium on Architectures for Networking and …, 2018 | 17 | 2018 |
Cyber attack prediction using social data analysis B Munkhdorj, S Yuji Journal of High Speed Networks 23 (2), 109-135, 2017 | 17 | 2017 |
The effects of server placement and server selection for Internet services R Somegawa, K Cho, Y Sekiya, S Yamaguchi IEICE transactions on communications 86 (2), 542-552, 2003 | 16 | 2003 |
Sufficiency of ensemble machine learning methods for phishing websites detection Y Wei, Y Sekiya IEEE Access 10, 124103-124113, 2022 | 15 | 2022 |
Feature selection approach for phishing detection based on machine learning Y Wei, Y Sekiya International Conference on Applied CyberSecurity, 61-70, 2021 | 14 | 2021 |
New ldos attack in zigbee network and its possible countermeasures S Okada, D Miyamoto, Y Sekiya, H Nakamura 2021 IEEE International Conference on Smart Computing (SMARTCOMP), 246-251, 2021 | 11 | 2021 |
Scheme of resource optimization using vm migration for federated cloud Y Xu, Y Sekiya Proceedings of the Asia-Pacific Advanced Network 32, 36-44, 2011 | 11 | 2011 |
Research of method for DNS performance measurement and evaluation based on benchmark DNS servers Y Sekiya, K Cho, A Kato, J Murai Electronics and Communications in Japan (Part I: Communications) 89 (10), 66-75, 2006 | 11 | 2006 |
Development of training environment for deep learning with medical images on supercomputer system based on asynchronous parallel Bayesian optimization Y Nomura, I Sato, T Hanawa, S Hanaoka, T Nakao, T Takenaga, ... The Journal of Supercomputing 76, 7315-7332, 2020 | 9 | 2020 |
Root and ccTLD DNS server observation from worldwide locations Y Sekiya, K Cho, A Kato, R Somegawa, T Jinmei, J Murai citeseer. ist. psu. edu/567083. html, 2003 | 9 | 2003 |
Virtual machine migration strategy in federated cloud Y Xu, Y Sekiya Internet Conference, 2010 | 8 | 2010 |