Name
Papers
Collaborators
YUJI SEKIYA
25
60
Citations 
PageRank 
Referers 
25
9.50
86
Referees 
References 
311
91
Search Limit
100311
Title
Citations
PageRank
Year
Demonstrating Flower Jelly Printer for Parametrically Designed Flower Jelly00.342021
A Convolutional Autoencoder Based Method with SMOTE for Cyber Intrusion Detection.00.342021
Flower Jelly Printer: Slit Injection Printing for Parametrically Designed Flower Jelly00.342021
Slow Scan Attack Detection Based on Communication Behavior.00.342020
Alchemy: Stochastic Feature Regeneration For Malicious Network Traffic Classification00.342019
Distributed Hayabusa: Scalable Syslog Search Engine Optimized For Time-Dimensional Search10.352019
An Alternative Fast Packet I/O with Native System Calls00.342019
Classification of URL bitstreams using bag of bytes00.342018
Task and Instance Quadratic Ordering for Active Online Multitask Learning.00.342018
Grafting sockets for fast container networking.30.532018
Unsupervised Scanning Behavior Detection Based on Distribution of Network Traffic Features Using Robust Autoencoders.00.342018
Hayabusa: Simple and Fast Full-Text Search Engine for Massive System Log Data00.342017
Cyber Attack Prediction Using Social Data Analysis20.472017
Protocol-Independent FIB Architecture for Network Overlays.10.482016
A common data plane for multiple overlay networks00.342015
Layer-3 Multipathing In Commodity-Based Data Center Networks00.342015
FlowFall: A Service Chaining Architecture with Commodity Technologies00.342015
ovstack: A protocol stack of common data plane for overlay networks10.362014
MATATABI: Multi-layer Threat Analysis Platform with Hadoop10.382014
Implementation and Operation of User Defined Network on IaaS Clouds using Layer 3 Overlay.00.342013
Designing an IPv6-Oriented Datacenter with IPv4-IPv6 Translation Technology for Future Datacenter Operation.00.342012
Design, Implementation, and Operation of IPv6-only IaaS System with IPv4-iPv6 Translator for Transition toward the Future Internet Datacenter.00.342012
Availability and effectiveness of root DNS servers: A long term study50.512010
Proposal Of A Method To Detect Black Hole Attack In Manet110.672009
ShowNet on INTEROP Tokyo 200200.342003