default search action
Suguru Yamaguchi
Person information
- affiliation: Nara Institute of Science and Technology, Ikoma, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j27]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing. J. Inf. Process. 24(2): 371-380 (2016) - [c55]Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System. CSCloud 2016: 84-94 - [c54]Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies. ICISSP 2016: 243-254 - 2015
- [j26]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies. IEICE Trans. Inf. Syst. 98-D(3): 588-595 (2015) - [j25]Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi:
Client Honeypot Multiplication with High Performance and Precise Detection. IEICE Trans. Inf. Syst. 98-D(4): 775-787 (2015) - [j24]Louie Zamora, Noriyuki Suzuki, Hiroaki Takemoto, Shigeru Kashihara, Suguru Yamaguchi:
Securing SOS Messages in Uncommunicable Areas via Information Sharing Cluster. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(8): 1618-1626 (2015) - [j23]Christopher Michael Yap, Youki Kadobayashi, Suguru Yamaguchi:
Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home. Int. J. Gaming Comput. Mediat. Simulations 7(3): 1-21 (2015) - [j22]Marius Georgescu, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(2): e1 (2015) - [j21]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms. J. Inf. Process. 23(4): 465-475 (2015) - [c53]Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System. ICICS 2015: 320-334 - [c52]Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Benchmarking the load scalability of IPv6 transition technologies: A black-box analysis. ISCC 2015: 329-334 - [c51]Sirikarn Pukkawanna, Youki Kadobayashi, Suguru Yamaguchi:
Network-based mimicry anomaly detection using divergence measures. ISNCC 2015: 1-7 - 2014
- [j20]Yuzo Taenaka, Shigeru Kashihara, Kazuya Tsukamoto, Suguru Yamaguchi, Yuji Oie:
An implementation design of a cross-layer handover method with multi-path transmission for VoIP communication. Ad Hoc Networks 13: 462-475 (2014) - [j19]Noppawat Chaisamran, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
SIP Flooding Attack Detection Using a Trust Model and Statistical Algorithms. J. Inf. Process. 22(2): 118-129 (2014) - [c50]Jane Louie Fresco Zamora, Noriyuki Suzuki, Hiroaki Takemoto, Shigeru Kashihara, Yuzo Taenaka, Suguru Yamaguchi:
Battery-saving message collection method for disrupted communication service areas. CCNC 2014: 113-118 - [c49]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Detecting anomalies in massive traffic with sketches. CFI 2014: 14:1-14:2 - [c48]Jane Louie Fresco Zamora, Naoya Sawada, Takemi Sahara, Shigeru Kashihara, Yuzo Taenaka, Suguru Yamaguchi:
Surface weather observation via distributed devices. I2MTC 2014: 1405-1410 - [c47]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks. ICOIN 2014: 282-287 - [c46]Marius Georgescu, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Empirical Analysis of IPv6 Transition Technologies Using the IPv6 Network Evaluation Testbed. TRIDENTCOM 2014: 216-228 - [c45]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture. TRUST 2014: 127-142 - 2013
- [j18]Yuzo Taenaka, Kazuya Tsukamoto, Shigeru Kashihara, Suguru Yamaguchi, Yuji Oie:
An Implementation Design of a WLAN Handover Method Based on Cross-Layer Collaboration for TCP Communication. IEICE Trans. Commun. 96-B(7): 1716-1726 (2013) - [j17]Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:
Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships. Inf. Media Technol. 8(2): 528-537 (2013) - [j16]Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:
Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships. J. Inf. Process. 21(2): 188-197 (2013) - [c44]Kazuya Okada, Takeshi Okuda, Suguru Yamaguchi:
Design of Geographically Aggregatable Address and Routing Toward Location Based Multicast. AINA Workshops 2013: 1307-1312 - [c43]Noppawat Chaisamran, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Trust-based SPIT detection by using call duration and social reliability. APCC 2013: 98-103 - [c42]Doudou Fall, Takeshi Okuda, Noppawat Chaisamran, Youki Kadobayashi, Suguru Yamaguchi:
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing. CLOSER 2013: 145-148 - [c41]Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:
Using a Trust Model to Reduce False Positives of SIP Flooding Attack Detection in IMS. COMPSAC Workshops 2013: 254-259 - [c40]Jane Louie Fresco Zamora, Shigeru Kashihara, Suguru Yamaguchi:
Radio signal-based measurements for localized heavy rain detection using smartphones. GHTC 2013: 173-178 - [c39]Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Building Better Unsupervised Anomaly Detector with S-Transform. NSS 2013: 582-589 - [c38]Junya Niwa, Kazuya Okada, Takeshi Okuda, Suguru Yamaguchi:
MPSDataStore: a sensor data repository system for mobile participatory sensing. MCC@SIGCOMM 2013: 3-8 - [c37]Manabu Hirano, David W. Chadwick, Suguru Yamaguchi:
Use of Role Based Access Control for Security-Purpose Hypervisors. TrustCom/ISPA/IUCC 2013: 1613-1619 - 2012
- [c36]Noriyuki Suzuki, Jane Louie Fresco Zamora, Shigeru Kashihara, Suguru Yamaguchi:
SOSCast: Location Estimation of Immobilized Persons through SOS Message Propagation. INCoS 2012: 428-435 - [c35]Noriyuki Suzuki, Jane Louie Fresco Zamora, Shigeru Kashihara, Suguru Yamaguchi:
Using SOS message propagation to estimate the location of immobilized persons. MobiCom 2012: 455-458 - [c34]Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:
A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving Average. SAINT 2012: 278-283 - 2011
- [c33]Suguru Yamaguchi:
New Era for Management to Deal with Scalability, Invisibility and Shared Responsibility. SAINT 2011: 352 - [c32]Noppawat Chaisamran, Takeshi Okuda, Gregory Blanc, Suguru Yamaguchi:
Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships. SAINT 2011: 451-456 - 2010
- [c31]Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
A Mechanism of Flexible Memory Exchange in Cloud Computing Environments. CloudCom 2010: 75-80
2000 – 2009
- 2009
- [j15]Muhammad Niswar, Shigeru Kashihara, Kazuya Tsukamoto, Youki Kadobayashi, Suguru Yamaguchi:
Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries. IEICE Trans. Inf. Syst. 92-D(10): 1847-1856 (2009) - [j14]Yuzo Taenaka, Shigeru Kashihara, Kazuya Tsukamoto, Suguru Yamaguchi, Yuji Oie:
Proactive AP Selection Method Considering the Radio Interference Environment. IEICE Trans. Inf. Syst. 92-D(10): 1867-1876 (2009) - [j13]Masayoshi Shimamura, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs. Inf. Media Technol. 4(1): 85-102 (2009) - [c30]Yuzo Taenaka, Shigeru Kashihara, Youki Kadobayashi, Suguru Yamaguchi:
Wireless Measurement Framework to Survey an Area with Required Communication Quality. AINA Workshops 2009: 439-446 - [c29]Manabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
T-PIM: Trusted Password Input Method against Data Stealing Malware. ITNG 2009: 429-434 - [c28]Muhammad Niswar, Eigo Horiuchi, Shigeru Kashihara, Kazuya Tsukamoto, Youki Kadobayashi, Suguru Yamaguchi:
Seamless VoWLAN Handoff Management based on Estimation of AP Queue Length and Frame Retries. PerCom Workshops 2009: 1-6 - [c27]Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
A Two-Step Execution Mechanism for Thin Secure Hypervisors. SECURWARE 2009: 129-135 - 2008
- [j12]Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi:
Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership. Inf. Media Technol. 3(2): 258-271 (2008) - [j11]Eiji Kawai, Suguru Yamaguchi:
A Benchmark Tool for Network I/O Management Architectures. Inf. Media Technol. 3(2): 272-284 (2008) - [j10]Takeshi Okuda, Suguru Yamaguchi:
Lightweight Vulnerability Management System. Inf. Media Technol. 3(4): 964-971 (2008) - [j9]Takeshi Okuda, Suguru Yamaguchi:
Lightweight Vulnerability Management System. J. Inf. Process. 16: 157-164 (2008) - [j8]Masayoshi Shimamura, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs. J. Inf. Process. 16: 201-218 (2008) - [c26]Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. APSCC 2008: 1225-1230 - [c25]Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi:
Inter-device Communication Paradigm: Requirements Analysis for Its Security Mechanisms. SAINT 2008: 345-348 - [c24]Kazumasa Kojima, Shigeru Kashihara, Teruaki Yokoyama, Takeshi Okuda, Suguru Yamaguchi:
Obtaining Sensing Data Based on the Proximity of Sensor Nodes. SAINT 2008: 409-412 - 2007
- [j7]Teruaki Yokoyama, Katsuyoshi Iida, Hiroyuki Koga, Suguru Yamaguchi:
Proposal for Adaptive Bandwidth Allocation Using One-Way Feedback Control for MPLS Networks. IEICE Trans. Commun. 90-B(12): 3530-3540 (2007) - [c23]Yuzo Taenaka, Shigeru Kashihara, Kazuya Tsukamoto, Suguru Yamaguchi, Yuji Oie:
Terminal-centric ap selection algorithm based on frame retransmissions. PM2HW2N 2007: 128-131 - [c22]Teruaki Yokoyama, Shoko Mikawa, Jun Takei, Kenjiro Cho, Suguru Yamaguchi, Jun Murai:
Overview of AI3 network: design and applications of satellite network. NSDR 2007: 10 - [c21]Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi:
Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. SAINT Workshops 2007: 31 - [c20]Teruaki Yokoyama, Shigeru Kashihara, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
A Generic API for Retrieving Human-Oriented Information from Social Network Services. SAINT Workshops 2007: 33 - [c19]Mio Suzuki, Teruaki Yokoyama, Takuji Iimura, Shigeru Kashihara, Takeshi Okuda, Suguru Yamaguchi:
Nazca: A Geographic Location Service. SAINT Workshops 2007: 51 - [c18]Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi:
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. SAINT Workshops 2007: 82 - 2006
- [c17]Eiji Kawai, Suguru Yamaguchi, Tomohisa Akafuji, Keishi Kandori:
A framework of a content distribution service synchronized with tv broadcasting programs. CCNC 2006: 1063-1067 - 2005
- [j6]Vasaka Visoottiviseth, Hiroyuki Kido, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi:
Performance Study and Deployment Strategies on the Sender-Initiated Multicast. IEICE Trans. Commun. 88-B(4): 1383-1394 (2005) - [j5]Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi:
Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control. IEICE Trans. Inf. Syst. 88-D(6): 1168-1177 (2005) - [c16]Teruaki Yokoyama, Katsuyoshi Iida, Suguru Yamaguchi:
An Architecture of Network Imprinting for Personal but Wide Area Applications. AINA 2005: 605-609 - [c15]Shigeki Takeuchi, Hiroyuki Koga, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi:
Performance Evaluations of DCCP for Bursty Traffic in Real-Time Applications. SAINT 2005: 142-149 - 2004
- [c14]Omar Ismail, Masashi Etoh, Youki Kadobayashi, Suguru Yamaguchi:
A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability. AINA (1) 2004: 145-151 - [c13]Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi:
A Fast Polling I/O Implementation with Real-time Signals. NCA 2004: 317-322 - [c12]Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi:
Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling. Parallel and Distributed Computing and Networks 2004: 134-140 - [c11]Shigeru Kashihara, Takashi Nishiyama, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Path Selection Using Active Measurement in Multi-Homed Wireless Networks. SAINT 2004: 273-276 - 2003
- [c10]Shigeru Kashihara, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks. IWDC 2003: 174-183 - [c9]Suguru Yamaguchi, Tomomitsu Baba, Jun Murai:
Steps beyond International Collaborations: our challenges in Asian Internet Interconnection Initiatives. SAINT Workshops 2003: 8-13 - [c8]Osamu Nakamura, Yuji Sekiya, Suguru Yamaguchi, Noriyuki Shigechika, Naoto Morishima:
ShowNet on INTEROP Tokyo 2002. SAINT Workshops 2003: 167-171 - [c7]Masafumi Oe, Youki Kadobayashi, Suguru Yamaguchi:
An implementation of a hierarchical IP traceback architecture. SAINT Workshops 2003: 250-253 - 2002
- [c6]Yutaka Nakamura, Eiji Kawai, Shinji Shimojo, Suguru Yamaguchi, Hideki Sunahara:
The Design and Implementation of a Kernel Monitoring System for Network Servers. SAINT 2002: 14-15 - 2001
- [c5]Ken-ichi Chinen, Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi:
User level techniques for improvement of disk I/O in WWW caching. SMC 2001: 3033 - 2000
- [j4]Shogo Nakazawa, Kenji Kawahara, Suguru Yamaguchi, Yuji Oie:
Performance comparison of layer 3 switches in cases of flow- and topology-driven connection setup. J. Commun. Networks 2(2): 118-126 (2000) - [j3]Kiyohiko Okayama, Suguru Yamaguchi, Hideo Miyahara:
Design and implementation of network management system SPLICE/NM based on scripted operations. Syst. Comput. Jpn. 31(9): 89-99 (2000) - [c4]Shu Zhang, Suguru Yamaguchi, Heiichi Yamamoto:
A Method for Reducing Network Routing Instability. ICDCS Workshop on Internet 2000: A82-A87
1990 – 1999
- 1999
- [c3]Eiji Kawai, Ken-ichi Chinen, Suguru Yamaguchi, Hideki Sunahara:
An Analysis of the Number of ICP Packets on the Distributed WWW Caching System. ICPP Workshops 1999: 234-239 - 1998
- [j2]Ken-ichi Chinen, Hiroyuki Inoue, Kiyohiko Okayama, Suguru Yamaguchi:
Design and implementation of a hybrid prefetching proxy server for WWW. Syst. Comput. Jpn. 29(12): 57-65 (1998) - 1997
- [c2]Suguru Yamaguchi, Ken-ichi Chinen, Hiroyuki Inoue:
WWW Cache Management and Its International Deployment: Challenges in the AI3 Project. WWCA 1997: 267-280 - 1994
- [j1]Noritoshi Demizu, Suguru Yamaguchi:
DDT - A Versatile Tunneling Technology. Comput. Networks ISDN Syst. 27(3): 493-502 (1994)
1980 – 1989
- 1989
- [c1]Jun Murai, Hiroyuki Kusumoto, Suguru Yamaguchi, Akira Kato:
Construction of internet for Japanese academic communities. SC 1989: 737-746
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint