Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Device-Based Network Selection for Edge Computing., , , , and . CCNC, page 1-2. IEEE, (2019)Proposal of Collaboration Safety in a Coexistence Environment of Human and Robots., , , , and . ICRA, page 1924-1930. IEEE, (2018)MATATABI: Multi-layer Threat Analysis Platform with Hadoop., , , and . BADGERS@ESORICS, page 75-82. IEEE, (2014)Malicious Host Detection by Imaging SYN Packets and A Neural Network., , , , and . ISNCC, page 1-4. IEEE, (2018)Investigating the Impact of Network Metrics on Multi-path Transport., , , and . AINTEC, page 46-53. ACM, (2023)Distributed Hayabusa: Scalable Syslog Search Engine Optimized for Time-Dimensional Search., , , , , , , and . AINTEC, page 9-16. ACM, (2019)Design of Geographically Aggregatable Address and Routing Toward Location Based Multicast., , and . AINA Workshops, page 1307-1312. IEEE Computer Society, (2013)Geometric registration for zoomable camera using epipolar constraint and pre-calibrated intrinsic camera parameter change., , , , and . ISMAR, page 295-296. IEEE Computer Society, (2013)Oblivious DDoS mitigation with locator/ID separation protocol., , and . CFI, page 8:1-8:6. ACM, (2014)Toward Real-time Packet Classification for Preventing Malicious Traffic by Machine Learning., , and . ICIN, page 106-111. IEEE, (2019)