default search action
Takeshi Okuda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j8]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing. J. Inf. Process. 24(2): 371-380 (2016) - [c24]Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Sequence-Based Analysis of Static Probe Instrumentation Data for a VMM-Based Anomaly Detection System. CSCloud 2016: 84-94 - [c23]Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies. ICISSP 2016: 243-254 - 2015
- [j7]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms. J. Inf. Process. 23(4): 465-475 (2015) - [c22]Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System. ICICS 2015: 320-334 - [c21]Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Benchmarking the load scalability of IPv6 transition technologies: A black-box analysis. ISCC 2015: 329-334 - 2014
- [j6]Noppawat Chaisamran, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
SIP Flooding Attack Detection Using a Trust Model and Statistical Algorithms. J. Inf. Process. 22(2): 118-129 (2014) - [c20]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture. TRUST 2014: 127-142 - 2013
- [j5]Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:
Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships. Inf. Media Technol. 8(2): 528-537 (2013) - [j4]Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:
Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships. J. Inf. Process. 21(2): 188-197 (2013) - [c19]Kazuya Okada, Takeshi Okuda, Suguru Yamaguchi:
Design of Geographically Aggregatable Address and Routing Toward Location Based Multicast. AINA Workshops 2013: 1307-1312 - [c18]Noppawat Chaisamran, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Trust-based SPIT detection by using call duration and social reliability. APCC 2013: 98-103 - [c17]Doudou Fall, Takeshi Okuda, Noppawat Chaisamran, Youki Kadobayashi, Suguru Yamaguchi:
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing. CLOSER 2013: 145-148 - [c16]Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:
Using a Trust Model to Reduce False Positives of SIP Flooding Attack Detection in IMS. COMPSAC Workshops 2013: 254-259 - [c15]Junya Niwa, Kazuya Okada, Takeshi Okuda, Suguru Yamaguchi:
MPSDataStore: a sensor data repository system for mobile participatory sensing. MCC@SIGCOMM 2013: 3-8 - 2012
- [c14]Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:
A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving Average. SAINT 2012: 278-283 - 2011
- [c13]Noppawat Chaisamran, Takeshi Okuda, Gregory Blanc, Suguru Yamaguchi:
Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships. SAINT 2011: 451-456 - 2010
- [c12]Takeshi Okuda, Yotaro Nagai, Yoshihiro Okamoto, Eiji Kawai:
A Remote Swap Management Framework in a Virtual Machine Cluster. IEEE CLOUD 2010: 546-547 - [c11]Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
A Mechanism of Flexible Memory Exchange in Cloud Computing Environments. CloudCom 2010: 75-80
2000 – 2009
- 2009
- [c10]Manabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
T-PIM: Trusted Password Input Method against Data Stealing Malware. ITNG 2009: 429-434 - [c9]Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
A Two-Step Execution Mechanism for Thin Secure Hypervisors. SECURWARE 2009: 129-135 - 2008
- [j3]Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi:
Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership. Inf. Media Technol. 3(2): 258-271 (2008) - [j2]Takeshi Okuda, Suguru Yamaguchi:
Lightweight Vulnerability Management System. Inf. Media Technol. 3(4): 964-971 (2008) - [j1]Takeshi Okuda, Suguru Yamaguchi:
Lightweight Vulnerability Management System. J. Inf. Process. 16: 157-164 (2008) - [c8]Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. APSCC 2008: 1225-1230 - [c7]Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi:
Inter-device Communication Paradigm: Requirements Analysis for Its Security Mechanisms. SAINT 2008: 345-348 - [c6]Kazumasa Kojima, Shigeru Kashihara, Teruaki Yokoyama, Takeshi Okuda, Suguru Yamaguchi:
Obtaining Sensing Data Based on the Proximity of Sensor Nodes. SAINT 2008: 409-412 - 2007
- [c5]Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi:
Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. SAINT Workshops 2007: 31 - [c4]Teruaki Yokoyama, Shigeru Kashihara, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
A Generic API for Retrieving Human-Oriented Information from Social Network Services. SAINT Workshops 2007: 33 - [c3]Mio Suzuki, Teruaki Yokoyama, Takuji Iimura, Shigeru Kashihara, Takeshi Okuda, Suguru Yamaguchi:
Nazca: A Geographic Location Service. SAINT Workshops 2007: 51 - 2006
- [c2]Yuki Yokohata, Yoji Yamato, Michiharu Takemoto, Erika Tanaka, Kenya Nishiki, Takeshi Okuda, Yuuichi Teranishi:
Context-aware content-provision service for shopping malls based on ubiquitous service-oriented network framework and authentication and access control agent framework. CCNC 2006: 1330-1331 - 2005
- [c1]Takeshi Okuda, Takahiro Miyamoto, Susumu Takeuchi, Kaname Harumoto, Shinji Shimojo:
Unified Architecture for Managing User Profiles. SAINT Workshops 2005: 192-195
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint