From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Traffic Matrix Estimation Using Spike Flow Detection., , , и . IEICE Trans. Commun., 88-B (4): 1484-1492 (2005)Introducing Routing Guidance Name in Content-Centric Networking., и . IEICE Trans. Commun., 97-B (12): 2596-2605 (2014)DomainProfiler: toward accurate and early discovery of domain names abused in future., , , , , и . Int. J. Inf. Sec., 17 (6): 661-680 (2018)Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites., , , и . J. Inf. Process., 21 (3): 539-550 (2013)Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records., , , и . J. Inf. Process., (2019)DURAL: an Extended Prolog Language.. RIMS Symposium on Software Science and Engineering, том 147 из Lecture Notes in Computer Science, стр. 73-87. Springer, (1982)Detecting Malware-Infected Devices Using the HTTP Header Patterns., , , и . IEICE Trans. Inf. Syst., 101-D (5): 1370-1379 (2018)Extended Darknet: Multi-Dimensional Internet Threat Monitoring System., , и . IEICE Trans. Commun., 95-B (6): 1915-1923 (2012)Anonymous P2P Web Browse History Sharing for Web Page Recommendation., и . IEICE Trans. Inf. Syst., 90-D (9): 1343-1353 (2007)POSTER: Predicting Website Abuse Using Update Histories., , , , и . WWW (Companion Volume), стр. 9-10. ACM, (2018)