Follow
Yuji Sekiya
Title
Cited by
Cited by
Year
Proposal of a method to detect black hole attack in MANET
XY Zhang, Y Sekiya, Y Wakahara
2009 International Symposium on Autonomous Decentralized Systems, 1-6, 2009
692009
Library operating system with mainline Linux network stack
H Tazaki, R Nakamura, Y Sekiya
Proceedings of netdev, 2015
342015
Efficient alarm messaging by multi-channel cut-through rebroadcasting based on inter-vehicle communication
P Akkhara, Y Sekiya, Y Wakahara
IAENG International Journal of Computer Science 36 (2), 157-166, 2009
292009
Availability and Effectiveness of Root DNS servers: A long term study
BS Lee, YS Tan, Y Sekiya, A Narishige, S Date
2010 IEEE Network Operations and Management Symposium-NOMS 2010, 862-865, 2010
232010
Classification of URL bitstreams using bag of bytes
K Shima, D Miyamoto, H Abe, T Ishihara, K Okada, Y Sekiya, H Asai, ...
2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018
222018
Unsupervised scanning behavior detection based on distribution of network traffic features using robust autoencoders
G Kotani, Y Sekiya
2018 IEEE international conference on data mining workshops (ICDMW), 35-38, 2018
202018
mdx: A cloud platform for supporting data science and cross-disciplinary research collaborations
T Suzumura, A Sugiki, H Takizawa, A Imakura, H Nakamura, K Taura, ...
2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2022
192022
MATATABI: multi-layer threat analysis platform with Hadoop
H Tazaki, K Okada, Y Sekiya, Y Kadobayashi
2014 Third International Workshop on Building Analysis Datasets and …, 2014
182014
Flower jelly printer: Slit injection printing for parametrically designed flower jelly
M Miyatake, K Narumi, Y Sekiya, Y Kawahara
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
172021
Grafting sockets for fast container networking
R Nakamura, Y Sekiya, H Tazaki
Proceedings of the 2018 Symposium on Architectures for Networking and …, 2018
162018
Cyber attack prediction using social data analysis
B Munkhdorj, S Yuji
Journal of High Speed Networks 23 (2), 109-135, 2017
162017
The effects of server placement and server selection for Internet services
R Somegawa, K Cho, Y Sekiya, S Yamaguchi
IEICE transactions on communications 86 (2), 542-552, 2003
162003
Feature selection approach for phishing detection based on machine learning
Y Wei, Y Sekiya
International Conference on Applied CyberSecurity, 61-70, 2021
122021
New ldos attack in zigbee network and its possible countermeasures
S Okada, D Miyamoto, Y Sekiya, H Nakamura
2021 IEEE International Conference on Smart Computing (SMARTCOMP), 246-251, 2021
112021
Scheme of resource optimization using vm migration for federated cloud
Y Xu, Y Sekiya
Proceedings of the Asia-Pacific Advanced Network 32, 36-44, 2011
112011
Research of method for DNS performance measurement and evaluation based on benchmark DNS servers
Y Sekiya, K Cho, A Kato, J Murai
Electronics and Communications in Japan (Part I: Communications) 89 (10), 66-75, 2006
112006
Sufficiency of ensemble machine learning methods for phishing websites detection
Y Wei, Y Sekiya
IEEE Access 10, 124103-124113, 2022
102022
Root and ccTLD DNS server observation from worldwide locations
Y Sekiya, K Cho, A Kato, R Somegawa, T Jinmei, J Murai
citeseer. ist. psu. edu/567083. html, 2003
92003
Virtual machine migration strategy in federated cloud
Y Xu, Y Sekiya
Internet Conference, 2010
82010
Virtual machine migration strategy in federated cloud
Y Xu, Y Sekiya
Internet Conference, 2010
82010
The system can't perform the operation now. Try again later.
Articles 1–20