From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anonymous P2P Web Browse History Sharing for Web Page Recommendation., и . IEICE Trans. Inf. Syst., 90-D (9): 1343-1353 (2007)Traffic Matrix Estimation Using Spike Flow Detection., , , и . IEICE Trans. Commun., 88-B (4): 1484-1492 (2005)Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records., , , и . J. Inf. Process., (2019)Detecting Malware-Infected Devices Using the HTTP Header Patterns., , , и . IEICE Trans. Inf. Syst., 101-D (5): 1370-1379 (2018)Extended Darknet: Multi-Dimensional Internet Threat Monitoring System., , и . IEICE Trans. Commun., 95-B (6): 1915-1923 (2012)DURAL: an Extended Prolog Language.. RIMS Symposium on Software Science and Engineering, том 147 из Lecture Notes in Computer Science, стр. 73-87. Springer, (1982)POSTER: Predicting Website Abuse Using Update Histories., , , , и . WWW (Companion Volume), стр. 9-10. ACM, (2018)A Feasibility Study of Radio-frequency Retroreflector Attack., , , , , и . WOOT @ USENIX Security Symposium, USENIX Association, (2018)DomainScouter: Understanding the Risks of Deceptive IDNs., , , , , и . RAID, стр. 413-426. USENIX Association, (2019)Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites., , , и . Inf. Media Technol., 8 (3): 855-866 (2013)