Research theme for competitive and other funds (15):
2016 - 2019 Integrated Security of SDN
2012 - 2015 Multipath integration for providing secure communication with multi-level
2011 - 2014 A study on evaluating Insider Threats and fighting against Insider attacks in Cyber Systems
2009 - 2011 Structure discovery of Network Services by Using Network Traffic
2008 - 2010 Design and Security Analysis of Cryptographic Protocol for Privacy-Preserving Data Mining
2003 - 2005 Studies on the mechanisms of traffic management and control required for the deeper Internet
2002 - 2005 Establishment of an intelligent support system using information technology
2003 - 2004 Implementation of Information Sharing System with Mobile and Broadband Network
2001 - 2002 レイヤー間の連携を許す新たなインターネットアーキテクチャに関する研究
2001 - 2002 マルチクラストラヒック制御機構を有するインターネット
2000 - 2001 Studies on provision of Quality of Service for multi-class traffic on the Internet
1996 - 1996 ATM網におけるトランスポートプロトコルに関する研究
ネットワークセキュリティに関する研究
情報ネットワークの構築・運用技術 情報ネットワークの評価
Computer Network and Security
Show all
Papers (117):
Named Entities Extraction by Citizen Participation and Machine Learning for Making Machine-readable Old Records of the Edo Period Remaining in Local Communities. 2022. 63. 2. 310-323
Masaki Hashimoto, Yoshiaki Hori, Yutaka Miyake. Message from the NETSAP 2018 Workshop Organizers. 2018 IEEE 42nd Annual Computer Software and Applications Conference. 2018. 652-652
Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai. A behavior-based online engine for detecting distributed cyber-attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2017. 10144. 79-89
Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai. A Comprehensive Security Analysis Checksheet for OpenFlow Networks. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS. 2017. 2. 231-242
Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai. A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2017. 10656. 461-473