default search action
Glenn Mansfield Keeni
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c27]Glenn Mansfield Keeni, Hiroshi Tsunoda:
Security and Privacy Awareness: for Software Creators and Users. iCAST 2019: 1-4 - 2018
- [j15]Hiroshi Tsunoda, Rodrigo Roman, Javier López, Glenn Mansfield Keeni:
Feasibility of Societal Model for Securing Internet of Things. KSII Trans. Internet Inf. Syst. 12(8): 3567-3588 (2018) - [c26]Napaphat Vichaidis, Hiroshi Tsunoda, Glenn Mansfield Keeni:
Analyzing darknet TCP traffic stability at different timescales. ICOIN 2018: 128-133 - 2017
- [c25]Hiroshi Tsunoda, Glenn Mansfield Keeni:
Feasibility of societal model for securing Internet of Things. IWCMC 2017: 541-546 - 2014
- [c24]Hiroshi Tsunoda, Glenn Mansfield Keeni:
Managing syslog. APNOMS 2014: 1-4 - [c23]Hiroshi Tsunoda, Glenn Mansfield Keeni:
Focus on accuracy and consistency of advanced applications for monitoring the future Internet. NOMS 2014: 1-4 - 2013
- [c22]Satoru Izumi, Naoki Nakamura, Hiroshi Tsunoda, Masahiro Matsuda, Kohei Ohta, Takuo Suganuma, Glenn Mansfield Keeni, Norio Shiratori:
G-MIB: Green-oriented Management Information Base and its standardization in IETF. GCCE 2013: 21-22 - 2012
- [c21]Hiroshi Tsunoda, Glenn Mansfield Keeni:
Security by simple network traffic monitoring. SIN 2012: 201-204 - [i10]Glenn Mansfield Keeni, Kazuhide Koide, Sri Gundavelli, Ryuji Wakikawa:
Proxy Mobile IPv6 Management Information Base. RFC 6475: 1-63 (2012) - 2011
- [j14]Hiroshi Tsunoda, Hidehisa Nakayama, Kohei Ohta, Akihiro Suzuki, Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi, Glenn Mansfield Keeni, Yoshiaki Nemoto:
Development of a WLAN based monitoring system for group activity measurement in real-time. J. Commun. Networks 13(2): 86-94 (2011) - 2010
- [j13]Egon Hilgenstieler, Elias P. Duarte Jr., Glenn Mansfield Keeni, Norio Shiratori:
Extensions to the source path isolation engine for precise and efficient log-based IP traceback. Comput. Secur. 29(4): 383-392 (2010) - [j12]Masahiro Nagao, Kazuhide Koide, Akihiro Satoh, Glenn Mansfield Keeni, Norio Shiratori:
Sharing information for event analysis over the wide Internet. J. Commun. Networks 12(4): 382-394 (2010)
2000 – 2009
- 2009
- [c20]Kazuhide Koide, Takafumi Maruyama, Glenn Mansfield Keeni, Norio Shiratori:
Management for Mobility-Aware Networks Based on Standardized Protocols. CISIS 2009: 327-334 - [c19]Hiroshi Tsunoda, Takafumi Maruyama, Kohei Ohta, Yuji Waizumi, Glenn Mansfield Keeni, Yoshiaki Nemoto:
A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages. CNSR 2009: 158-165 - [i9]Glenn Mansfield Keeni:
Textual Conventions for Syslog Management. RFC 5427: 1-8 (2009) - [i8]Sri Gundavelli, Glenn Mansfield Keeni, Kazuhide Koide, Kenichi Nagami:
Network Mobility (NEMO) Management Information Base. RFC 5488: 1-44 (2009) - 2007
- [c18]Egon Hilgenstieler, Elias P. Duarte Jr., Glenn Mansfield Keeni, Norio Shiratori:
Improving the Precision and Efficiency of Log-Based IP Packet Traceback. GLOBECOM 2007: 1823-1827 - [c17]Kazuhide Koide, Glenn Mansfield Keeni, Thanh Trung Nguyen, Norio Shiratori:
A New Concept in Ubiquitous Network Management: Guest Node Monitoring--Applications of the MobileIPv6-MIB--. SAINT 2007: 17 - 2006
- [c16]Glenn Mansfield Keeni, Kazuhide Koide, Takeo Saitoh, Norio Shiratori:
A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment. AINA (1) 2006: 889-894 - [i7]Glenn Mansfield Keeni, Kazuhide Koide, Kenichi Nagami, Sri Gundavelli:
Mobile IPv6 Management Information Base. RFC 4295: 1-109 (2006) - [i6]Glenn Mansfield Keeni:
The Managed Object Aggregation MIB. RFC 4498: 1-29 (2006) - 2005
- [j11]Kazuhide Koide, Gen Kitagata, Hiroki Kamiyama, Debasish Chakraborty, Glenn Mansfield Keeni, Norio Shiratori:
MobiSNMP - A Model for Remote Information Collection from Moving Entities Using SNMP over MobileIPv6. IEICE Trans. Commun. 88-B(12): 4481-4489 (2005) - 2004
- [j10]Debasish Chakraborty, Ashir Ahmed, Takuo Suganuma, Glenn Mansfield Keeni, T. K. Roy, Norio Shiratori:
Self-similar and fractal nature of internet traffic. Int. J. Netw. Manag. 14(2): 119-129 (2004) - [j9]Aldri L. dos Santos, Elias P. Duarte Jr., Glenn Mansfield Keeni:
Reliable Distributed Network Management by Replication. J. Netw. Syst. Manag. 12(3): 191-213 (2004) - 2003
- [c15]Glenn Mansfield Keeni, Debasish Chakraborty, Kazuhide Koide, Norio Shiratori:
SNMP in the IPv6 context. SAINT Workshops 2003: 254-257 - 2002
- [c14]Kazuhide Koide, Glenn Mansfield Keeni, Norio Shiratori:
In Search of Torrents: Automatic Detection of Logical Sets Flows in Network Traffic. DNIS 2002: 239-252 - [c13]Atsushi Totsuka, Hidenari Ohwada, Nobuhisa Fujita, Debasish Chakraborty, Glenn Mansfield Keeni, Norio Shiratori:
Network-based Intrusion Detection - Modeling for a Larger Picture. LISA 2002: 227-232 - 2001
- [j8]Ashir Ahmed, Takuo Suganuma, Tetsuo Kinoshita, T. K. Roy, Glenn Mansfield, Norio Shiratori:
Network traffic characterization and network information services - R&D on JGN. Comput. Commun. 24(17): 1734-1743 (2001) - [c12]Glenn Mansfield, T. K. Roy, Norio Shiratori:
Self-Similar and Fractal Nature of Internet Traffic Data. ICOIN 2001: 227-231 - 2000
- [j7]Glenn Mansfield, Kohei Ohta, Yohsuke Takei, Nei Kato, Yoshiaki Nemoto:
Towards trapping wily intruders in the large. Comput. Networks 34(4): 659-670 (2000) - [j6]Akira Kanamaru, Kohei Ohta, Nei Kato, Glenn Mansfield, Yoshiaki Nemoto:
A simple packet aggregation technique for fault detection. Int. J. Netw. Manag. 10(4): 215-228 (2000) - [c11]Akira Kanamura, Kohei Ohta, Nei Kato, Glenn Mansfield, Yoshiaki Nemoto:
Evaluation of Simple Packet Aggregation Technique for Fault Detection. ICDCS Workshop on Internet 2000: A88-A94
1990 – 1999
- 1999
- [c10]Takeo Saitoh, Glenn Mansfield, Norio Shiratori:
Network Congestion Monitoring and Detection Using the IMI Infrastructure. ICPP 1999: 462-471 - [c9]Glenn Mansfield:
Towards trapping wily intruders in the large. Recent Advances in Intrusion Detection 1999 - [i5]Glenn Mansfield, Stephen E. Kille:
Directory Server Monitoring MIB. RFC 2605: 1-26 (1999) - 1998
- [j5]Elias Procópio Duarte Jr., Glenn Mansfield, Takashi Nanya, Shoichi Noguchi:
Improving the dependability of network management systems. Int. J. Netw. Manag. 8(4): 244-253 (1998) - 1997
- [c8]Elias Procópio Duarte Jr., Glenn Mansfield, Takashi Nanya, Shoichi Noguchi:
Non-Broadcast Network Fault-Monitoring Based on System-Level Diagnosis. Integrated Network Management 1997: 597-609 - [c7]Kohei Ohta, Takumi Mori, Nei Kato, Hideaki Sone, Glenn Mansfield, Yoshiaki Nemoto:
Divide and Conquer Technique for Network Fault Management. Integrated Network Management 1997: 675-687 - [c6]Glenn Mansfield, Elias Procópio Duarte Jr., Masako Kithashi, Shoichi Noguchi:
VINES: Distributed Algorithms for a Web-Based Distributed Network Management System. WWCA 1997: 281-293 - [c5]Masato Terada, Yuko Murayama, Glenn Mansfield:
Access Control for Inter-Organizational Computer Network Environment. WWCA 1997: 394-409 - 1996
- [j4]Kohei Ohta, Nei Kato, Glenn Mansfield, Yoshiaki Nemoto:
Configuring a Network Management System for Efficient Operation. Int. J. Netw. Manag. 6(2): 108-118 (1996) - [j3]Atsushi Togashi, Glenn Mansfield, Norio Shiratori:
Animating LOTOS Specifications Using Amlog. Int. J. Softw. Eng. Knowl. Eng. 6(1): 5-19 (1996) - [c4]Glenn Mansfield, M. Ouchi, K. Jayanthi, Y. Kimura, Kohei Ohta, Yoshiaki Nemoto:
Techniques for Automated Network Map Generation Using SNMP. INFOCOM 1996: 473-480 - 1995
- [i4]Glenn Mansfield, P. V. Rajeev, S. V. Raghavan, Tim Howes:
Schema Publishing in X.500 Directory. RFC 1804: 1-10 (1995) - 1994
- [j2]Thomas Johannsen, Glenn Mansfield:
A study of FTP traffic: Estimation of the non-optimality. Int. J. Netw. Manag. 4(4): 190-197 (1994) - [c3]Atsushi Togashi, Glenn Mansfield, Norio Shiratori:
An Intelligent LOTOS interpreter in AMLOG. ICLP Workshop: Applications of Logic Programming to Software Engineering 1994 - [i3]Glenn Mansfield, Stephen E. Kille:
X.500 Directory Monitoring MIB. RFC 1567: 1-18 (1994) - [i2]Thomas Johannsen, Glenn Mansfield, Mark Kosters, Srinivas R. Sataluri:
Representing IP Information in the X.500 Directory. RFC 1608: 1-20 (1994) - [i1]Glenn Mansfield, Thomas Johannsen, Mark A. Knopper:
Charting Networks in the X.500 Directory. RFC 1609: 1-15 (1994) - 1993
- [j1]Glenn Mansfield, K. Jayanthi, Kenichi Higuchi, Thomas Johannsen, Yasunoni Nemoto, Shoichi Noguchi:
Mapping Communication Networks in the Directory. Comput. Networks ISDN Syst. 26(3): 327-335 (1993) - 1992
- [c2]Glenn Mansfield, Makoto Murata, Kenichi Higuchi, Krishnamachari J. Yanthi, Basabi Chakraborty, Yoshiaki Nemoto, Shoichi Noguchi:
Network Management In A Large-scale OSI-based Campus Network. NOMS 1992: 566-577 - 1991
- [c1]Glenn Mansfield, Atsushi Togashi, Nobuhisa Miake, Shoichi Noguchi:
AMLOG-E: A New Approach towards Amalgamation. ICLP 1991: 364-378
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint