Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hiroshi Tsunoda
@inproceedings{DBLP:conf/icawst/KeeniT19, author = {Glenn Mansfield Keeni and Hiroshi Tsunoda}, title = {Security and Privacy Awareness: for Software Creators and Users}, booktitle = {{IEEE} 10th International Conference on Awareness Science and Technology, iCAST 2019, Morioka, Japan, October 23-25, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICAwST.2019.8923148}, doi = {10.1109/ICAWST.2019.8923148}, timestamp = {Wed, 22 Jan 2020 17:32:52 +0100}, biburl = {https://dblp.org/rec/conf/icawst/KeeniT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/TsunodaRLK18, author = {Hiroshi Tsunoda and Rodrigo Roman and Javier L{\'{o}}pez and Glenn Mansfield Keeni}, title = {Feasibility of Societal Model for Securing Internet of Things}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {8}, pages = {3567--3588}, year = {2018}, url = {https://doi.org/10.3837/tiis.2018.08.003}, doi = {10.3837/TIIS.2018.08.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/TsunodaRLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/VichaidisTK18, author = {Napaphat Vichaidis and Hiroshi Tsunoda and Glenn Mansfield Keeni}, title = {Analyzing darknet {TCP} traffic stability at different timescales}, booktitle = {2018 International Conference on Information Networking, {ICOIN} 2018, Chiang Mai, Thailand, January 10-12, 2018}, pages = {128--133}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICOIN.2018.8343098}, doi = {10.1109/ICOIN.2018.8343098}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/VichaidisTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8502, author = {Zhaohui Zhang and Hiroshi Tsunoda}, title = {{L2L3} {VPN} Multicast {MIB}}, journal = {{RFC}}, volume = {8502}, pages = {1--20}, year = {2018}, url = {https://doi.org/10.17487/RFC8502}, doi = {10.17487/RFC8502}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8502.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8503, author = {Hiroshi Tsunoda}, title = {{BGP/MPLS} Layer 3 {VPN} Multicast Management Information Base}, journal = {{RFC}}, volume = {8503}, pages = {1--57}, year = {2018}, url = {https://doi.org/10.17487/RFC8503}, doi = {10.17487/RFC8503}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8503.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/TsunodaK17, author = {Hiroshi Tsunoda and Glenn Mansfield Keeni}, title = {Feasibility of societal model for securing Internet of Things}, booktitle = {13th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2017, Valencia, Spain, June 26-30, 2017}, pages = {541--546}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IWCMC.2017.7986343}, doi = {10.1109/IWCMC.2017.7986343}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/TsunodaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnoms/TsunodaK14, author = {Hiroshi Tsunoda and Glenn Mansfield Keeni}, title = {Managing syslog}, booktitle = {The 16th Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2014, Hsinchu, Taiwan, September 17-19, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/APNOMS.2014.6996575}, doi = {10.1109/APNOMS.2014.6996575}, timestamp = {Wed, 13 Nov 2019 15:14:09 +0100}, biburl = {https://dblp.org/rec/conf/apnoms/TsunodaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/TsunodaK14, author = {Hiroshi Tsunoda and Glenn Mansfield Keeni}, title = {Focus on accuracy and consistency of advanced applications for monitoring the future Internet}, booktitle = {2014 {IEEE} Network Operations and Management Symposium, {NOMS} 2014, Krakow, Poland, May 5-9, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NOMS.2014.6838382}, doi = {10.1109/NOMS.2014.6838382}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/TsunodaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcce/IzumiNTMOSKS13, author = {Satoru Izumi and Naoki Nakamura and Hiroshi Tsunoda and Masahiro Matsuda and Kohei Ohta and Takuo Suganuma and Glenn Mansfield Keeni and Norio Shiratori}, title = {{G-MIB:} Green-oriented Management Information Base and its standardization in {IETF}}, booktitle = {{IEEE} 2nd Global Conference on Consumer Electronics, {GCCE} 2013, Tokyo, Japan, 1-4 October 2013}, pages = {21--22}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GCCE.2013.6664801}, doi = {10.1109/GCCE.2013.6664801}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/gcce/IzumiNTMOSKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisec/WaizumiTTN12, author = {Yuji Waizumi and Hiroshi Tsunoda and Masashi Tsuji and Yoshiaki Nemoto}, title = {A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy}, journal = {J. Information Security}, volume = {3}, number = {1}, pages = {18--24}, year = {2012}, url = {https://doi.org/10.4236/jis.2012.31003}, doi = {10.4236/JIS.2012.31003}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisec/WaizumiTTN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/TsunodaK12, author = {Hiroshi Tsunoda and Glenn Mansfield Keeni}, editor = {Manoj Singh Gaur and Atilla El{\c{c}}i and Oleg B. Makarevich and Mehmet A. Orgun and Virendra Singh}, title = {Security by simple network traffic monitoring}, booktitle = {5th International Conference of Security of Information and Networks, {SIN} '12, Jaipur, India, October 22 - 26, 2012}, pages = {201--204}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2388576.2388608}, doi = {10.1145/2388576.2388608}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/TsunodaK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/TsunodaNOSNNHWKN11, author = {Hiroshi Tsunoda and Hidehisa Nakayama and Kohei Ohta and Akihiro Suzuki and Hiroki Nishiyama and Ryoichi Nagatomi and Kazuo Hashimoto and Yuji Waizumi and Glenn Mansfield Keeni and Yoshiaki Nemoto}, title = {Development of a {WLAN} based monitoring system for group activity measurement in real-time}, journal = {J. Commun. Networks}, volume = {13}, number = {2}, pages = {86--94}, year = {2011}, url = {https://doi.org/10.1109/JCN.2011.6157407}, doi = {10.1109/JCN.2011.6157407}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/TsunodaNOSNNHWKN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/ZhangAT10, author = {Yan Zhang and Nirwan Ansari and Hiroshi Tsunoda}, title = {Wireless telemedicine services over integrated {IEEE} 802.11/WLAN and {IEEE} 802.16/WiMAX networks}, journal = {{IEEE} Wirel. Commun.}, volume = {17}, number = {1}, pages = {30--36}, year = {2010}, url = {https://doi.org/10.1109/MWC.2010.5416347}, doi = {10.1109/MWC.2010.5416347}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/ZhangAT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsr/TsunodaMOWKN09, author = {Hiroshi Tsunoda and Takafumi Maruyama and Kohei Ohta and Yuji Waizumi and Glenn Mansfield Keeni and Yoshiaki Nemoto}, title = {A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages}, booktitle = {7th Annual Conference on Communication Networks and Services Research, {CNSR} 2009, 11-13 May 2009, Moncton, New Brunswick, Canada}, pages = {158--165}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CNSR.2009.33}, doi = {10.1109/CNSR.2009.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsr/TsunodaMOWKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/TsunodaOYAWN08, author = {Hiroshi Tsunoda and Kohei Ohta and Atsunori Yamamoto and Nirwan Ansari and Yuji Waizumi and Yoshiaki Nemoto}, title = {Detecting DRDoS attacks by a simple response packet confirmation mechanism}, journal = {Comput. Commun.}, volume = {31}, number = {14}, pages = {3299--3306}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2008.05.033}, doi = {10.1016/J.COMCOM.2008.05.033}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/TsunodaOYAWN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbms/SaijoIKYTNKN08, author = {Yoshifumi Saijo and Takahiro Iwamoto and Kazuto Kobayashi and Satoshi Yamaguchi and Hiroshi Tsunoda and Hidehisa Nakayama and Nei Kato and Yoshiaki Nemoto}, title = {Ultra-Mobile Echo Network in Health Care System}, booktitle = {Proceedings of the Twenty-First {IEEE} International Symposium on Computer-Based Medical Systems, June 17-19, 2008, Jyv{\"{a}}skyl{\"{a}}, Finland}, pages = {164--166}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CBMS.2008.23}, doi = {10.1109/CBMS.2008.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cbms/SaijoIKYTNKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/YagiWTN08, author = {Shinnosuke Yagi and Yuji Waizumi and Hiroshi Tsunoda and Yoshiaki Nemoto}, title = {A Reliable Network Identification Method Based on Transition Pattern of Payload Length}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {1915--1919}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.370}, doi = {10.1109/GLOCOM.2008.ECP.370}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/YagiWTN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/TsunodaAWAN08, author = {Hiroshi Tsunoda and Kenjirou Arai and Yuji Waizumi and Nirwan Ansari and Yoshiaki Nemoto}, title = {Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2008, Beijing, China, 19-23 May 2008}, pages = {1670--1674}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICC.2008.322}, doi = {10.1109/ICC.2008.322}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/TsunodaAWAN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/YagiWTJKN08, author = {Shinnosuke Yagi and Yuji Waizumi and Hiroshi Tsunoda and Abbas Jamalipour and Nei Kato and Yoshiaki Nemoto}, title = {Network Application Identification Using Transition Pattern of Payload Length}, booktitle = {{WCNC} 2008, {IEEE} Wireless Communications {\&} Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings}, pages = {2633--2638}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/WCNC.2008.462}, doi = {10.1109/WCNC.2008.462}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/YagiWTJKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WaizumiTTAN07, author = {Yuji Waizumi and Masashi Tsuji and Hiroshi Tsunoda and Nirwan Ansari and Yoshiaki Nemoto}, title = {Distributed Early Worm Detection Based on Payload Histograms}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {1404--1408}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.236}, doi = {10.1109/ICC.2007.236}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/WaizumiTTAN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webist/SuzukiWTN07, author = {Youhei Suzuki and Yuji Waizumi and Hiroshi Tsunoda and Yoshiaki Nemoto}, editor = {Joaquim Filipe and Jos{\'{e}} Cordeiro and Bruno Encarna{\c{c}}{\~{a}}o and Vitor Pedrosa}, title = {A Low Cost Worm Detection Technique based on Flow Payload Similarity}, booktitle = {{WEBIST} 2007 - Proceedings of the Third International Conference on Web Information Systems and Technologies, Volume IT, Barcelona, Spain, March 3-6, 2007}, pages = {414--417}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 26 Oct 2012 18:22:41 +0200}, biburl = {https://dblp.org/rec/conf/webist/SuzukiWTN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/TsunodaDKJN06, author = {Hiroshi Tsunoda and Umith Dharmaratna and Nei Kato and Abbas Jamalipour and Yoshiaki Nemoto}, title = {Network Controlled Handover for Improving {TCP} Performance in {LEO} Satellite Networks}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.526}, doi = {10.1109/GLOCOM.2006.526}, timestamp = {Fri, 21 Feb 2020 18:38:36 +0100}, biburl = {https://dblp.org/rec/conf/globecom/TsunodaDKJN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/TsunodaOKN06, author = {Hiroshi Tsunoda and Kohei Ohta and Nei Kato and Yoshiaki Nemoto}, title = {Geographical and Orbital Information Based Mobility Management to Overcome Last-Hop Ambiguity over {IP/LEO} Satellite Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {1849--1854}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.254989}, doi = {10.1109/ICC.2006.254989}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/TsunodaOKN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism/SimkhadaTWN05, author = {Kumar Simkhada and Hiroshi Tsunoda and Yuji Waizumi and Yoshiaki Nemoto}, title = {Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures}, booktitle = {Seventh {IEEE} International Symposium on Multimedia {(ISM} 2005), 12-14 December 2005, Irvine, CA, {USA}}, pages = {680--685}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ISM.2005.49}, doi = {10.1109/ISM.2005.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ism/SimkhadaTWN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/TsunodaOKN04, author = {Hiroshi Tsunoda and Kohei Ohta and Nei Kato and Yoshiaki Nemoto}, title = {Supporting {IP/LEO} satellite networks by handover-independent {IP} mobility management}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {22}, number = {2}, pages = {300--307}, year = {2004}, url = {https://doi.org/10.1109/JSAC.2003.819977}, doi = {10.1109/JSAC.2003.819977}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/TsunodaOKN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.