default search action
Katsuyoshi Iida
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Hayato Sagara, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai:
Privacy Preserved IoT Data Inquiry System using DoT. CIoT 2024: 1-6 - [c44]Satoru Sunahara, Yong Jin, Katsuyoshi Iida, Nariyoshi Yamai, Yoshiaki Takai:
Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH Architecture. COMPSAC 2024: 1554-1555 - 2023
- [j18]Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai:
Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis. IEEE Trans. Netw. Serv. Manag. 20(2): 2086-2095 (2023) - [c43]Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai:
Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis. CCNC 2023: 224-229 - [c42]Satoru Sunahara, Yong Jin, Katsuyoshi Iida:
Authoritative DNS Server Discovery Method to Enhance DNS Privacy Preservation. StudentWorkshop@CoNEXT 2023: 31-32 - [c41]Hikaru Ichise, Yong Jin, Katsuyoshi Iida:
Policy-based Detection and Blocking System against Abnormal Applications by Analyzing DNS Traffic. ISCIT 2023: 1-6 - 2022
- [c40]Satoru Sunahara, Yong Jin, Katsuyoshi Iida:
A proposal of DoH-based domain name resolution architecture including authoritative DNS servers. ITNAC 2022: 1-3 - 2021
- [j17]Krittin Intharawijitr, Katsuyoshi Iida, Hiroyuki Koga, Katsunori Yamaoka:
Empirical Study of Low-Latency Network Model with Orchestrator in MEC. IEICE Trans. Commun. 104-B(3): 229-239 (2021) - [c39]Rikima Mitsuhashi, Akihiro Satoh, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai:
Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification. ISC 2021: 238-256 - 2020
- [j16]Hikaru Ichise, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai:
NS record History Based Abnormal DNS traffic Detection Considering Adaptive Botnet Communication Blocking. J. Inf. Process. 28: 112-122 (2020) - [c38]Yuki Iuchi, Yong Jin, Hikaru Ichise, Katsuyoshi Iida, Yoshiaki Takai:
Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses. CSCloud/EdgeCom 2020: 82-87
2010 – 2019
- 2019
- [j15]Krittin Intharawijitr, Katsuyoshi Iida, Hiroyuki Koga, Katsunori Yamaoka:
Simulation Study of Low-Latency Network Model with Orchestrator in MEC. IEICE Trans. Commun. 102-B(11): 2139-2150 (2019) - 2018
- [j14]Hikaru Ichise, Yong Jin, Katsuyoshi Iida:
Analysis of DNS TXT Record Usage and Consideration of Botnet Communication Detection. IEICE Trans. Commun. 101-B(1): 70-79 (2018) - [j13]Yusuke Ito, Hiroyuki Koga, Katsuyoshi Iida:
A Bandwidth Allocation Scheme to Improve Fairness and Link Utilization in Data Center Networks. IEICE Trans. Commun. 101-B(3): 679-687 (2018) - [c37]Hikaru Ichise, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai:
Detection and Blocking of Anomaly DNS Traffic by Analyzing Achieved NS Record History. APSIPA 2018: 1586-1590 - 2017
- [j12]Krittin Intharawijitr, Katsuyoshi Iida, Hiroyuki Koga:
Simulation Study of Low Latency Network Architecture Using Mobile Edge Computing. IEICE Trans. Inf. Syst. 100-D(5): 963-972 (2017) - [c36]Yusuke Ito, Hiroyuki Koga, Katsuyoshi Iida:
A bandwidth allocation scheme to meet flow requirements in mobile edge computing. CloudNet 2017: 114-118 - [c35]Krittin Intharawijitr, Katsuyoshi Iida, Hiroyuki Koga, Katsunori Yamaoka:
Practical Enhancement and Evaluation of a Low-Latency Network Model Using Mobile Edge Computing. COMPSAC (1) 2017: 567-574 - [c34]Katsuyoshi Iida, Mohammad Zulkernine:
Message from SEPT 2017 Organizing Committee. COMPSAC (1) 2017: 585 - [c33]Yusuke Ito, Hiroyuki Koga, Katsuyoshi Iida:
A bandwidth allocation scheme based on residual bandwidth information in mobile edge computing. MECC@Middleware 2017: 3:1-3:3 - 2016
- [j11]Masayoshi Shimamura, Hiroaki Yamanaka, Akira Nagata, Katsuyoshi Iida, Eiji Kawai, Masato Tsuru:
Elastic and Adaptive Resource Orchestration Architecture on 3-Tier Network Virtualization Model. IEICE Trans. Inf. Syst. 99-D(4): 1127-1138 (2016) - [j10]Takuya Omizo, Takuma Watanabe, Toyokazu Akiyama, Katsuyoshi Iida:
ResilientFlow: Deployments of Distributed Control Channel Maintenance Modules to Recover SDN from Unexpected Failures. IEICE Trans. Commun. 99-B(5): 1041-1053 (2016) - [j9]Toyokazu Akiyama, Yuuichi Teranishi, Ryohei Banno, Katsuyoshi Iida, Yukiko Kawai:
Scalable Pub/Sub System Using OpenFlow Control. J. Inf. Process. 24(4): 635-646 (2016) - [c32]Katsuyoshi Iida, Yutaka Miyake, Chung Huang Yang, Bian Yang, Julien Bringer:
Message from the NETSAP and SIMICE Workshop Organizers. COMPSAC Workshops 2016: 552 - [c31]Krittin Intharawijitr, Katsuyoshi Iida, Hiroyuki Koga:
Analysis of fog model considering computing and communication latency in 5G cellular networks. PerCom Workshops 2016: 1-4 - [c30]Yusuke Ito, Hiroyuki Koga, Katsuyoshi Iida:
A bandwidth reallocation scheme to improve fairness and link utilization in data center networks. PerCom Workshops 2016: 1-4 - 2015
- [c29]Yuta Yoshinaga, Masayoshi Shimamura, Katsuyoshi Iida:
Multipath Transmission Model and Its Route Selection Policy Considering Packet Re-sequencing Buffers Availability. AINA Workshops 2015: 715-720 - [c28]Toyokazu Akiyama, Yukiko Kawai, Yuuichi Teranishi, Ryohei Banno, Katsuyoshi Iida:
SAPS: Software Defined Network Aware Pub/Sub - A Design of the Hybrid Architecture Utilizing Distributed and Centralized Multicast. COMPSAC 2015: 361-366 - [c27]Hossain Shahriar, Stelvio Cimato, Jingyu Zhou, Katsuyoshi Iida:
Message from the Fast Abstract Chairs. COMPSAC Workshops 2015: 635 - [c26]Ryota Ishikawa, Katsuyoshi Iida, Hiroyuki Koga, Masayoshi Shimamura:
Improved Handover Using Cloud Control in Heterogeneous Wireless Networks. COMPSAC Workshops 2015: 640-641 - [c25]Hikaru Ichise, Yong Jin, Katsuyoshi Iida:
Detection Method of DNS-based Botnet Communication Using Obtained NS Record History. COMPSAC Workshops 2015: 676-677 - [c24]Yong Jin, Hikaru Ichise, Katsuyoshi Iida:
Design of Detecting Botnet Communication by Monitoring Direct Outbound DNS Queries. CSCloud 2015: 37-41 - [c23]Takuma Watanabe, Takuya Omizo, Toyokazu Akiyama, Katsuyoshi Iida:
ResilientFlow: Deployments of distributed control channel maintenance modules to recover SDN from unexpected failures. DRCN 2015: 211-218 - [c22]Yusuke Ito, Yurino Sato, Hiroyuki Koga, Katsuyoshi Iida:
A Server-based Flow Allocation Scheme for Streaming Services in Data Center Networks. EUSPN/ICTH 2015: 529-532 - [c21]Hikaru Ichise, Yong Jin, Katsuyoshi Iida:
Analysis of via-resolver DNS TXT queries and detection possibility of botnet communications. PACRIM 2015: 216-221 - [c20]Yu Okada, Masayoshi Shimamura, Katsuyoshi Iida:
System investigation of a gateway implementing subflow control policies using a multipath TCP proxy. PACRIM 2015: 292-297 - 2014
- [c19]Yusuke Ito, Hiroyuki Koga, Katsuyoshi Iida:
A Bandwidth Allocation Scheme to Improve Fairness in Data Center Networks. CoNEXT Student Workshop 2014: 7-8 - [c18]Yasutaka Shindo, Akihiro Satoh, Yutaka Nakamura, Katsuyoshi Iida:
Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition. CoNEXT Student Workshop 2014: 28-30 - 2013
- [c17]Masayoshi Shimamura, Hiroaki Yamanaka, Yoshiyuki Uratani, Akira Nagata, Shuji Ishii, Katsuyoshi Iida, Eiji Kawai, Masato Tsuru:
Architecture for resource controllable NVE to meet service providers' dynamic QoS demands. NOF 2013: 1-6 - 2012
- [j8]Katsuyoshi Iida:
Foreword. IEICE Trans. Commun. 95-B(7): 2181 (2012) - [c16]Atsushi Den, Katsuyoshi Iida:
Communication Quality Improvement Method through End Host Enhancements for TFRC-type Mobile Streaming. AINA Workshops 2012: 897-902 - [c15]Supalerk Jivorasetkul, Masayoshi Shimamura, Katsuyoshi Iida:
End-to-End Header Compression over Software-Defined Networks: A Low Latency Network Architecture. INCoS 2012: 493-494 - [c14]Takeshi Horiuchi, Takuya Omizo, Katsuyoshi Iida:
Mobile video broadcasting system with multiple mobile devices for improving availability. MobiOpp 2012: 81-82 - 2011
- [c13]Hiroaki Yamanaka, Masayoshi Shimamura, Shuji Ishii, Eiji Kawai, Katsuyoshi Iida, Masato Tsuru:
A New Generation Network Architecture to Accommodate Virtual Network Application Services. INCoS 2011: 332-333 - [c12]Shohei Kodama, Masayoshi Shimamura, Katsuyoshi Iida:
Initial CWND determination method for fast startup TCP algorithms. IWQoS 2011: 1-3 - [c11]Takuya Omizo, Kenji Masui, Katsuyoshi Iida:
Design and Implementation of Inter-ISP Virtual Backbone Infrastructure to Meet Various QoS Requirements. SAINT 2011: 486-491 - 2010
- [c10]Hieu Hanh Le, Kenji Masui, Katsuyoshi Iida:
A Relative Bandwidth Allocation Method Enabling Fast Convergence in XCP. WCITD/NF 2010: 217-228
2000 – 2009
- 2009
- [j7]Masayoshi Shimamura, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs. Inf. Media Technol. 4(1): 85-102 (2009) - 2008
- [j6]Masayoshi Shimamura, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs. J. Inf. Process. 16: 201-218 (2008) - 2007
- [j5]Teruaki Yokoyama, Katsuyoshi Iida, Hiroyuki Koga, Suguru Yamaguchi:
Proposal for Adaptive Bandwidth Allocation Using One-Way Feedback Control for MPLS Networks. IEICE Trans. Commun. 90-B(12): 3530-3540 (2007) - [c9]Yudai Nitta, Taro Hashimoto, Katsuyoshi Iida, Katsunori Yamaoka, Yoshinori Sakai:
Novel Link Weight for Path Construction Based on Overall QoS Index. ICC 2007: 260-265 - [c8]Hiroki Baba, Hiroyuki Koga, Katsuyoshi Iida, Katsunori Yamaoka, Yoshinori Sakai:
Media-Handover-Aware TCP: Preventing Quality Degradation on Co-existing Real-Time Communications. WiMob 2007: 35 - 2006
- [j4]Hiroyuki Koga, Shigeru Kashihara, Yutaka Fukuda, Katsuyoshi Iida, Yuji Oie:
A quality-aware VoWLAN architecture and its quantitative evaluations. IEEE Wirel. Commun. 13(1): 52-59 (2006) - [c7]Hiroyuki Koga, Katsuyoshi Iida, Hiroaki Haraguchi, Yuji Oie:
Handover Latency Reduction on Host-based Mobility in Multihomed Networks. VTC Spring 2006: 937-941 - 2005
- [j3]Vasaka Visoottiviseth, Hiroyuki Kido, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi:
Performance Study and Deployment Strategies on the Sender-Initiated Multicast. IEICE Trans. Commun. 88-B(4): 1383-1394 (2005) - [c6]Teruaki Yokoyama, Katsuyoshi Iida, Suguru Yamaguchi:
An Architecture of Network Imprinting for Personal but Wide Area Applications. AINA 2005: 605-609 - [c5]Hiroyuki Koga, Hiroaki Haraguchi, Katsuyoshi Iida, Yuji Oie:
A framework for network media optimization in multihomed QoS networks. DIN@MobiCom 2005: 38-42 - [c4]Shigeki Takeuchi, Hiroyuki Koga, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi:
Performance Evaluations of DCCP for Bursty Traffic in Real-Time Applications. SAINT 2005: 142-149 - 2004
- [c3]Hiroyuki Koga, Katsuyoshi Iida, Yuji Oie:
Receiver-Based Flow Control Mechanism with Interlayer Collaboration for Real-Time Communication Quality in W-CDMA Networks. PWC 2004: 286-300 - [c2]Shigeru Kashihara, Takashi Nishiyama, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Path Selection Using Active Measurement in Multi-Homed Wireless Networks. SAINT 2004: 273-276 - 2003
- [c1]Shigeru Kashihara, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks. IWDC 2003: 174-183 - 2001
- [j2]Katsuyoshi Iida, Tetsuya Takine, Hideki Sunahara, Yuji Oie:
Delay analysis for CBR traffic under static-priority scheduling. IEEE/ACM Trans. Netw. 9(2): 177-185 (2001) - 2000
- [j1]Katsuyoshi Iida, Kenji Kawahara, Tetsuya Takine, Yuji Oie:
Performance evaluation of the architecture for end-to-end quality-of-service provisioning. IEEE Commun. Mag. 38(4): 76-81 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint