default search action
Kunio Akashi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, Hideki Takase, Gregory Blanc, Hiroshi Nakamura:
XAI-driven Adversarial Attacks on Network Intrusion Detectors. EICC 2024: 65-73 - [c13]Kunio Akashi, Seiichi Yamamoto, Haruki Sakurai, Koki Ito, Tomohiro Ishihara, Takuji Iimura, Yuji Sekiya, Hiroki Watanabe, Keiichi Shima, Katsuhiro Horiba:
Cloud5GC : Design and implementation of scalable and stateless mobile core system on public cloud. ICOIN 2024: 310-315 - 2023
- [j3]Satoshi Okada, Kunio Akashi, Daisuke Miyamoto, Yuji Sekiya, Hideki Takase, Hiroshi Nakamura:
Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network. J. Inf. Process. 31: 537-549 (2023) - [c12]Hiroki Watanabe, Kunio Akashi, Keiichi Shima, Yuji Sekiya, Katsuhiro Horiba:
A Design of Stateless 5G Core Network with Procedural Processing. BlackSeaCom 2023: 199-204 - 2022
- [j2]Rintaro Harada, Naotaka Shibata, Shin Kaneko, Kazuaki Honda, Jun Terada, Yota Ishida, Kunio Akashi, Toshiyuki Miyachi:
Quick Suppression of DDoS Attacks by Frame Priority Control in IoT Backhaul With Construction of Mirai-Based Attacks. IEEE Access 10: 22392-22399 (2022) - 2021
- [j1]Kazuaki Honda, Naotaka Shibata, Rintaro Harada, Yota Ishida, Kunio Akashi, Shin Kaneko, Toshiyuki Miyachi, Jun Terada:
Cooperated Traffic Shaping With Traffic Estimation and Path Reallocation to Mitigate Microbursts in IoT Backhaul Network. IEEE Access 9: 162190-162196 (2021) - [c11]Toshiyuki Miyachi, Kunio Akashi, Tomoya Inoue, Yota Ishida, Ryosuke Miura, Shinsuke Miwa, Fumihide Kojima, Hiroaki Harai:
Extensions for Wireless Technology Emulation to Wire-based Network Testbed. WPMC 2021: 1-6 - 2020
- [c10]Ryo Nakamura, Yohei Kuga, Kunio Akashi:
How beneficial is peer-to-peer DMA? APSys 2020: 25-32
2010 – 2019
- 2019
- [c9]Kei Hiroi, Tomoya Inoue, Kunio Akashi, Tsubasa Yumura, Toshiyuki Miyachi, Hayate Hironaka, Hironobu Kanno, Yoichi Shinoda:
ARIA: interactive damage prediction system for urban flood using simulation and emulation federation platform. UbiComp/ISWC Adjunct 2019: 284-287 - 2018
- [c8]Tsubasa Yumura, Masatoshi Enomoto, Kunio Akashi, Futoshi Hirose, Tomoya Inoue, Satoshi Uda, Toshiyuki Miyachi, Yasuo Tan, Yoichi Shinoda:
AOBAKO: A Testbed for Context-Aware Applications with Physicalizing Virtual Beacons. UbiComp/ISWC Adjunct 2018: 476-479 - [c7]Tsubasa Yumura, Kunio Akashi, Tomoya Inoue:
BluMoon: Bluetooth Low Energy Emulation System with Software-Implemented Controller. PerCom Workshops 2018: 860-865 - 2016
- [c6]Kunio Akashi, Tomoya Inoue, Shingo Yasuda, Yuuki Takano, Yoichi Shinoda:
NETorium: high-fidelity scalable wireless network emulator. AINTEC 2016: 25-32 - 2015
- [c5]Yuuki Takano, Ryosuke Miura, Shingo Yasuda, Kunio Akashi, Tomoya Inoue:
SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware. LISA 2015: 25-36 - 2014
- [c4]Yasuhiro Ohara, Kaname Nishizuka, Ken-ichi Chinen, Kunio Akashi, Makoto Kohrin, Eiichi Muramoto, Shin Miyakawa:
On the Impact of Mobile Network Delays on Connection Establishment Performance of a Carrier Grade NAT Device. AINTEC 2014: 1 - 2013
- [c3]Shingo Yasuda, Kunio Akashi, Toshiyuki Miyachi, Razvan Beuran, Yoshiki Makino, Tomoya Inoue, Shinsuke Miwa, Yoichi Shinoda:
Emulation-Based ICT System Resiliency Verification for Disaster Situations. SITIS 2013: 875-882 - 2012
- [c2]Toshiyuki Miyachi, Razvan Beuran, Yoshiki Makino, Kunio Akashi, Shingo Yasuda, Tomoya Inoue, Shinsuke Miwa, Satoshi Uda, Yasuo Tan, Yoichi Shinoda:
On network system evaluation under various failures. VALUETOOLS 2012: 226-227 - 2010
- [c1]Thilmee M. Baduge, Boon Ping Lim, Kunio Akashi, Jason Soong, Ken-ichi Chinen, Ettikan Kandasamy Karuppiah, Eiichi Muramoto:
Functional and Performance Verification of Overlay Multicast Applications - A Product Level Approach. CCNC 2010: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint