From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Kadobayashi, Youki
add a person with the name Kadobayashi, Youki
 

Другие публикации лиц с тем же именем

CYBEX: the cybersecurity information exchange framework (x.1500)., , , , , , , , , и 1 other автор(ы). Comput. Commun. Rev., 40 (5): 59-64 (2010)Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing., , , и . J. Inf. Process., 24 (2): 371-380 (2016)An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents., , , , , и . IEEE Access, (2019)Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage., , , , , , и . CCGRID, стр. 440-449. IEEE, (2020)Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling., , и . Parallel and Distributed Computing and Networks, стр. 134-140. IASTED/ACTA Press, (2004)Network-based mimicry anomaly detection using divergence measures., , и . ISNCC, стр. 1-7. IEEE, (2015)The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies., , , , и . ICISSP, стр. 243-254. SciTePress, (2016)Detecting anomalies in massive traffic with sketches., , , и . CFI, стр. 14:1-14:2. ACM, (2014)NECOMAtter: curating approach for sharing cyber threat information., , , и . CFI, стр. 19:1-19:2. ACM, (2014)Towards revealing JavaScript program intents using abstract interpretation., и . AINTEC, стр. 87-94. ACM, (2010)