From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Kadobayashi, Youki
add a person with the name Kadobayashi, Youki
 

Другие публикации лиц с тем же именем

NECOMAtter: curating approach for sharing cyber threat information., , , и . CFI, стр. 19:1-19:2. ACM, (2014)Detecting anomalies in massive traffic with sketches., , , и . CFI, стр. 14:1-14:2. ACM, (2014)A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis., , и . ICONIP (2), том 6444 из Lecture Notes in Computer Science, стр. 267-274. Springer, (2010)An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents., , , , , и . IEEE Access, (2019)Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage., , , , , , и . CCGRID, стр. 440-449. IEEE, (2020)CYBEX: the cybersecurity information exchange framework (x.1500)., , , , , , , , , и 1 other автор(ы). Comput. Commun. Rev., 40 (5): 59-64 (2010)Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing., , , и . J. Inf. Process., 24 (2): 371-380 (2016)Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation., , , , , и . ICISSP, стр. 823-830. SCITEPRESS, (2024)Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling., , и . Parallel and Distributed Computing and Networks, стр. 134-140. IASTED/ACTA Press, (2004)Network-based mimicry anomaly detection using divergence measures., , и . ISNCC, стр. 1-7. IEEE, (2015)