关注
Yuji Sekiya
Yuji Sekiya
在 nc.u-tokyo.ac.jp 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Proposal of a method to detect black hole attack in MANET
XY Zhang, Y Sekiya, Y Wakahara
2009 International Symposium on Autonomous Decentralized Systems, 1-6, 2009
682009
Library operating system with mainline Linux network stack
H Tazaki, R Nakamura, Y Sekiya
Proceedings of netdev, 2015
342015
Efficient alarm messaging by multi-channel cut-through rebroadcasting based on inter-vehicle communication
P Akkhara, Y Sekiya, Y Wakahara
IAENG International Journal of Computer Science 36 (2), 157-166, 2009
282009
mdx: A cloud platform for supporting data science and cross-disciplinary research collaborations
T Suzumura, A Sugiki, H Takizawa, A Imakura, H Nakamura, K Taura, ...
2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2022
232022
Availability and Effectiveness of Root DNS servers: A long term study
BS Lee, YS Tan, Y Sekiya, A Narishige, S Date
2010 IEEE Network Operations and Management Symposium-NOMS 2010, 862-865, 2010
222010
Flower jelly printer: Slit injection printing for parametrically designed flower jelly
M Miyatake, K Narumi, Y Sekiya, Y Kawahara
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
212021
Unsupervised scanning behavior detection based on distribution of network traffic features using robust autoencoders
G Kotani, Y Sekiya
2018 IEEE international conference on data mining workshops (ICDMW), 35-38, 2018
212018
Classification of URL bitstreams using bag of bytes
K Shima, D Miyamoto, H Abe, T Ishihara, K Okada, Y Sekiya, H Asai, ...
2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018
202018
MATATABI: multi-layer threat analysis platform with Hadoop
H Tazaki, K Okada, Y Sekiya, Y Kadobayashi
2014 Third International Workshop on Building Analysis Datasets and …, 2014
182014
Grafting sockets for fast container networking
R Nakamura, Y Sekiya, H Tazaki
Proceedings of the 2018 Symposium on Architectures for Networking and …, 2018
172018
Cyber attack prediction using social data analysis
B Munkhdorj, S Yuji
Journal of High Speed Networks 23 (2), 109-135, 2017
172017
The effects of server placement and server selection for Internet services
R Somegawa, K Cho, Y Sekiya, S Yamaguchi
IEICE transactions on communications 86 (2), 542-552, 2003
162003
Sufficiency of ensemble machine learning methods for phishing websites detection
Y Wei, Y Sekiya
IEEE Access 10, 124103-124113, 2022
152022
Feature selection approach for phishing detection based on machine learning
Y Wei, Y Sekiya
International Conference on Applied CyberSecurity, 61-70, 2021
142021
New ldos attack in zigbee network and its possible countermeasures
S Okada, D Miyamoto, Y Sekiya, H Nakamura
2021 IEEE International Conference on Smart Computing (SMARTCOMP), 246-251, 2021
112021
Scheme of resource optimization using vm migration for federated cloud
Y Xu, Y Sekiya
Proceedings of the Asia-Pacific Advanced Network 32, 36-44, 2011
112011
Research of method for DNS performance measurement and evaluation based on benchmark DNS servers
Y Sekiya, K Cho, A Kato, J Murai
Electronics and Communications in Japan (Part I: Communications) 89 (10), 66-75, 2006
112006
Development of training environment for deep learning with medical images on supercomputer system based on asynchronous parallel Bayesian optimization
Y Nomura, I Sato, T Hanawa, S Hanaoka, T Nakao, T Takenaga, ...
The Journal of Supercomputing 76, 7315-7332, 2020
92020
Root and ccTLD DNS server observation from worldwide locations
Y Sekiya, K Cho, A Kato, R Somegawa, T Jinmei, J Murai
citeseer. ist. psu. edu/567083. html, 2003
92003
Virtual machine migration strategy in federated cloud
Y Xu, Y Sekiya
Internet Conference, 2010
82010
系统目前无法执行此操作,请稍后再试。
文章 1–20