default search action
Hiroshi Koide
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c31]Yuki Funaoka, Hiroshi Koide:
Improved Vulnerability Handling Framework to Automatically Fix Vulnerable Web Applications. CANDARW 2023: 208-212 - [c30]Xiaojuan Cai, Hiroshi Koide:
New Perspectives on Data Exfiltration Detection for Advanced Persistent Threats Based on Ensemble Deep Learning Tree. WEBIST 2023: 276-285 - 2022
- [j7]Mariama Mbow, Hiroshi Koide, Kouichi Sakurai:
Handling class Imbalance problem in Intrusion Detection System based on deep learning. Int. J. Netw. Comput. 12(2): 467-492 (2022) - [c29]Kouki Inoue, Hiroshi Koide:
Detection and Isolation Malware by Dynamic Routing Moving Target Defense with Proxies. CSCI 2022: 1071-1075 - 2021
- [c28]Mariama Mbow, Hiroshi Koide, Kouichi Sakurai:
An Intrusion Detection System for Imbalanced Dataset Based on Deep Learning. CANDAR 2021: 38-47 - [c27]Yuya Tajima, Hiroshi Koide:
Applying The Attacks Tracer on Advanced Persistent Threats to Real Networks. CANDAR (Workshops) 2021: 392-397 - [c26]Tomoya Terashima, Masahiro Nakayama, Teruaki Yokoyama, Hiroshi Koide:
KAKOI: A New Tool to Make Simple and Secure Build Cyber Ranges Using Public Cloud. CANDAR (Workshops) 2021: 398-404 - [c25]Takeshi Masumoto, Wai Kyi Kyi Oo, Hiroshi Koide:
MTD: Run-time System Call Mapping Randomization. ISCSIC 2021: 257-263 - 2020
- [j6]Zhao Hao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks. Int. J. Netw. Comput. 10(2): 213-226 (2020) - [c24]Kohei Kubota, Wai Kyi Kyi Oo, Hiroshi Koide:
A New Feature to Secure Web Applications. CANDAR (Workshops) 2020: 334-340
2010 – 2019
- 2019
- [j5]Wai Kyi Kyi Oo, Hiroshi Koide, Kouichi Sakurai:
Analyzing the Effect of Moving Target Defense for a Web System. Int. J. Netw. Comput. 9(2): 188-200 (2019) - [c23]Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS. CANDAR 2019: 239-244 - [c22]Katsumi Nagai, Hiroshi Koide, Kouichi Sakurai:
Proposal and Evaluation of a Security Incident Response Training Method using Programming. SIGITE 2019: 165 - [c21]Longjian Ye, Hiroshi Koide, Dirceu Cavendish, Kouichi Sakurai:
Efficient Shortest Path Routing Algorithms for Distributed XML Processing. WEBIST 2019: 265-272 - 2018
- [c20]Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Tracing MIRAI Malware in Networked System. CANDAR Workshops 2018: 534-538 - [c19]Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
A New Design for Evaluating Moving Target Defense System. CANDAR Workshops 2018: 561-563 - 2016
- [c18]Dongli Han, Hiroshi Koide, Ayato Inoue:
Acquisition of Scientific Literatures based on Citation-reason Visualization. VISIGRAPP (2: IVAPP) 2016: 125-132 - 2014
- [c17]Takatoshi Murakami, Shuhei Kumano, Hiroshi Koide:
An implementation of tracing attacks on advanced persistent threats by using actors model. SCIS&ISIS 2014: 1316-1320 - [c16]Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish:
Distributed XML Processing over Multicore Servers. WEBIST (1) 2014: 200-207 - 2012
- [c15]Natsuki Kai, Ryoji Nishinohara, Hiroshi Koide:
A SIMD Parallelization Method for an Application for LSI Logic Simulation. ICPP Workshops 2012: 375-381 - [c14]Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto:
Tracing Advanced Persistent Threats in Networked Systems. SafeConfig 2012: 179-187 - [c13]Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish, Yuji Oie:
Distributed XML Processing over Various Topologies - Pipeline and Parallel Processing Characterization. WEBIST 2012: 116-122 - 2011
- [c12]Yuki Nakamizo, Hiroshi Koide, Kazumi Yoshinaga, Dirceu Cavendish, Yuji Oie:
MVA Modeling of Multi-core Server Distributed Systems. INCoS 2011: 617-620 - [c11]Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish, Yuji Oie:
Characterizing Distributed XML Processing - Moving XML Processing from Servers to Networking Nodes. WEBIST 2011: 41-50 - [c10]Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish, Yuji Oie:
Distributed XML Processing over Various Topologies: Characterizing XML Document Processing Efficiency. WEBIST (Selected Papers) 2011: 57-71 - 2010
- [j4]Dirceu Cavendish, Hiroshi Koide, Yuji Oie, Mario Gerla:
A Mean Value Analysis approach to transaction performance evaluation of multi-server systems. Concurr. Comput. Pract. Exp. 22(10): 1267-1285 (2010) - [c9]Kazumi Yoshinaga, Washizu Shohei, Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish, Yuji Oie:
Characterizing Transactions with Data Transfer on Multi-server Systems. INCoS 2010: 404-408
2000 – 2009
- 2009
- [c8]Dirceu Cavendish, Yuji Oie, Hiroshi Koide, Mario Gerla:
Characterizing Transactions on Multi-server Systems. INCoS 2009: 357-359 - [c7]Dirceu Cavendish, Yuji Oie, Hiroshi Koide, Mario Gerla:
A Mean Value Analysis approach to transaction performance evaluation on multi-server systems. ISCC 2009: 50-55 - 2008
- [c6]Kazumi Yoshinaga, Yoshiyuki Uratani, Hiroshi Koide:
Utilizing Multi-Networks Task Scheduler for Streaming Applications. ICPP Workshops 2008: 25-30 - 2006
- [j3]Hiroshi Koide, Yuji Oie:
A new task scheduling method for distributed programs that require memory management. Concurr. Comput. Pract. Exp. 18(9): 941-958 (2006) - 2005
- [j2]Yoshinori Kitatsuji, Katsuyuki Yamazaki, Hiroshi Koide, Masato Tsuru, Yuji Oie:
Influence of Network Characteristics on Application Performance in a Grid Environment. Telecommun. Syst. 30(1-3): 99-121 (2005) - [c5]Yoshinori Kitatsuji, Satoshi Katsuno, Katsuyuki Yamazaki, Hiroshi Koide, Masato Tsuru, Yuji Oie:
On the Influence of Network Characteristics on Application Performance in the Grid Environment. ICN (1) 2005: 9-18 - 2004
- [c4]Hiroshi Koide, Yuji Oie:
A New Task Scheduling Method for Distributed Programs which Require Memory Management in Grids. SAINT Workshops 2004: 666-673 - 2000
- [c3]Toshiyuki Imamura, Yuichi Tsujita, Hiroshi Koide, Hiroshi Takemiya:
An Architecture of Stampi: MPI Library on a Cluster of Parallel Computers. PVM/MPI 2000: 200-207
1990 – 1999
- 1997
- [j1]Hiroshi Koide, Mitsugu Suzuki, Yasuichi Nakayama:
A new memory allocation method for shared memory multiprocessors with large virtual address space. Concurr. Pract. Exp. 9(9): 897-914 (1997) - 1995
- [c2]Mitsugu Suzuki, Hiroshi Koide, Motoaki Terashima:
MOA - A Fast Sliding Compaction Scheme for a Large Storage Space. IWMM 1995: 197-210 - [c1]Hiroshi Koide:
The generated order preserving real-time garbage collection. RTCSA 1995: 168-173
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint