default search action
Kensuke Fukuda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c140]Guannan Hu, Kensuke Fukuda:
Privacy Leakage of DNS over QUIC: Analysis and Countermeasure. ICAIIC 2024: 518-523 - [c139]Uyen Do, Laura Lahesoo, Rodrigo Matos Carnier, Kensuke Fukuda:
Evaluation of XAI Algorithms in IoT Traffic Anomaly Detection. ICAIIC 2024: 669-674 - [c138]Alex Huang Feng, Pierre François, Kensuke Fukuda, Wanting Du, Thomas Graf, Paolo Lucente, Stéphane Frénot:
Practical Anomaly Detection in Internet Services: An ISP centric approach. NOMS 2024: 1-4 - [c137]Liang Zhao, Satoru Kobayashi, Kensuke Fukuda:
Exploring the Discovery Process of Fresh IPv6 Prefixes: An Analysis of Scanning Behavior in Darknet and Honeynet. PAM (1) 2024: 95-111 - [c136]Malte Tashiro, Romain Fontugne, Kensuke Fukuda:
Following the Data Trail: An Analysis of IXP Dependencies. PAM (2) 2024: 199-227 - [c135]Manuel Poisson, Rodrigo Matos Carnier, Kensuke Fukuda:
GothX: a generator of customizable, legitimate and malicious IoT network traffic. CSET @ USENIX Security Symposium 2024: 65-73 - [i6]Manuel Poisson, Kensuke Fukuda, Rodrigo Matos Carnier:
GothX: a generator of customizable, legitimate and malicious IoT network traffic. CoRR abs/2407.07456 (2024) - 2023
- [j40]Guannan Hu, Kensuke Fukuda:
Characterizing Privacy Leakage in Encrypted DNS Traffic. IEICE Trans. Commun. 106(2): 156-165 (2023) - [j39]Ha Dao, Quoc-Huy Vo, Tien-Huy Pham, Kensuke Fukuda:
I Never Trust My University for This! Investigating Student PII Leakage at Vietnamese Universities. IEICE Trans. Inf. Syst. 106(12): 2048-2056 (2023) - [c134]Tien-Huy Pham, Quoc-Huy Vo, Ha Dao, Kensuke Fukuda:
SSOLogin: A framework for automated web privacy measurement with SSO logins. AINTEC 2023: 69-77 - [c133]Laura Lahesoo, Uyen Do, Rodrigo Matos Carnier, Kensuke Fukuda:
SIURU: A Framework for Machine Learning Based Anomaly Detection in IoT Network Traffic. AINTEC 2023: 87-95 - [c132]Satoru Kobayashi, Ryusei Shiiba, Ryosuke Miura, Shinsuke Miwa, Toshiyuki Miyachi, Kensuke Fukuda:
dot2net: A Labeled Graph Approach for Template-Based Configuration of Emulation Networks. CNSM 2023: 1-9 - [c131]Mateo Ormeno, Ha Dao, Kensuke Fukuda:
Investigating Search Engines Terms Leakage. StudentWorkshop@CoNEXT 2023: 15-16 - [c130]Ismael Castell-Uroz, Kensuke Fukuda, Pere Barlet-Ros:
ASTrack: Automatic Detection and Removal of Web Tracking Code with Minimal Functionality Loss. INFOCOM 2023: 1-10 - [i5]Ismael Castell-Uroz, Kensuke Fukuda, Pere Barlet-Ros:
ASTrack: Automatic Detection and Removal of Web Tracking Code with Minimal Functionality Loss. CoRR abs/2301.10895 (2023) - 2022
- [j38]Satoru Kobayashi, Yuya Yamashiro, Kazuki Otomo, Kensuke Fukuda:
amulog: A general log analysis framework for comparison and combination of diverse template generation methods. Int. J. Netw. Manag. 32(4) (2022) - [c129]Masato Hayashi, Takeo Tadono, Osamu Ochiai, Ko Hamamoto, Sota Hirayama, Hideki Saito, Masayoshi Takahashi, Gen Takao, Takashi Yamanobe, Kazushi Matsuura, Kensuke Fukuda, Takuya Itoh:
Advancement of Logging Monitoring Using ALOS-2/PALSAR-2 for Japanese Forest Management. IGARSS 2022: 4443-4444 - [c128]Kensuke Fukuda, Yoshitaka Aharen, Shinta Sato, Takeshi Mitamura:
Characterizing DNS query response sizes through active and passive measurements. NOMS 2022: 1-6 - [c127]Satoru Kobayashi, Keiichi Shima, Kenjiro Cho, Osamu Akashi, Kensuke Fukuda:
Comparative Causal Analysis of Network Log Data in Two Large ISPs. NOMS 2022: 1-6 - 2021
- [j37]Ha Dao, Johan Mazel, Kensuke Fukuda:
CNAME Cloaking-Based Tracking on the Web: Characterization, Detection, and Protection. IEEE Trans. Netw. Serv. Manag. 18(3): 3873-3888 (2021) - [c126]Ryusei Shiiba, Satoru Kobayashi, Osamu Akashi, Kensuke Fukuda:
Verifying Network Properties in SRv6 based Service Function Chaining. AINTEC 2021: 18-26 - [c125]Richard Jarry, Satoru Kobayashi, Kensuke Fukuda:
A Quantitative Causal Analysis for Network Log Data. COMPSAC 2021: 1437-1442 - [c124]Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Osamu Akashi, Kimihiro Mizutani, Hiroshi Esaki:
Towards Extracting Semantics of Network Config Blocks. COMPSAC 2021: 1443-1448 - [c123]Guannan Hu, Kensuke Fukuda:
An analysis of privacy leakage in DoQ traffic. StudentWorkshop@CoNEXT 2021: 7-8 - [c122]Ha Dao, Kensuke Fukuda:
Alternative to third-party cookies: investigating persistent PII leakage-based web tracking. CoNEXT 2021: 223-229 - [c121]Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
Latent Semantics Approach for Network Log Analysis: Modeling and its application. IM 2021: 215-223 - [c120]Thieu Nguyen, Satoru Kobayashi, Kensuke Fukuda:
LogDTL: Network Log Template Generation with Deep Transfer Learning. IM 2021: 848-853 - 2020
- [c119]Satoru Kobayashi, Yuya Yamashiro, Kazuki Otomo, Kensuke Fukuda:
amulog: A General Log Analysis Framework for Diverse Template Generation Methods. CNSM 2020: 1-5 - [c118]Takumi Uchida, Keisuke Ishibashi, Kensuke Fukuda:
Routing and Capacity Optimization Based on Estimated Latent OD Traffic Demand. COMPSAC 2020: 1169-1175 - [c117]Pavol Mulinka, Kensuke Fukuda, Pedro Casas, Lukas Kencl:
WhatsThat? On the Usage of Hierarchical Clustering for Unsupervised Detection & Interpretation of Network Attacks. EuroS&P Workshops 2020: 574-583 - [c116]Ha Dao, Kensuke Fukuda:
A machine learning approach for detecting CNAME cloaking-based tracking on the Web. GLOBECOM 2020: 1-6 - [c115]Guannan Hu, Kensuke Fukuda:
Toward Detecting IoT Device Traffic in Transit Networks. ICAIIC 2020: 525-530 - [c114]Pavol Mulinka, Pedro Casas, Kensuke Fukuda, Lukas Kencl:
HUMAN - Hierarchical Clustering for Unsupervised Anomaly Detection & Interpretation. NOF 2020: 132-140 - [c113]Kensuke Fukuda, Yoshiro Yoneya, Takeshi Mitamura:
Towards detecting DNSSEC validation failure with passive measurements. NOMS 2020: 1-6 - [c112]Ha Dao, Kensuke Fukuda:
Characterizing CNAME Cloaking-based Tracking on the Web. TMA 2020 - [i4]Ha Dao, Kensuke Fukuda:
A machine learning approach for detecting CNAME cloaking-based tracking on the Web. CoRR abs/2009.14330 (2020)
2010 – 2019
- 2019
- [j36]Saran Tarnoi, Wuttipong Kumwilaisak, Vorapong Suppakitpaisarn, Kensuke Fukuda, Yusheng Ji:
Adaptive probabilistic caching technique for caching networks with dynamic content popularity. Comput. Commun. 139: 1-15 (2019) - [j35]Johan Mazel, Richard Garnier, Kensuke Fukuda:
A comparison of web privacy protection techniques. Comput. Commun. 144: 162-174 (2019) - [j34]Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
Latent Variable Based Anomaly Detection in Network System Logs. IEICE Trans. Inf. Syst. 102-D(9): 1644-1652 (2019) - [c111]Satoru Kobayashi, Kazuki Otomo, Kensuke Fukuda:
Causal analysis of network logs with layered protocols and topology knowledge. CNSM 2019: 1-9 - [c110]Romain Fontugne, Esteban Bautista, Colin Petrie, Yutaro Nomura, Patrice Abry, Paulo Gonçalves, Kensuke Fukuda, Emile Aben:
BGP Zombies: An Analysis of Beacons Stuck Routes. PAM 2019: 197-209 - [i3]Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke Fukuda, Aruna Seneviratne:
Characterizing and Detecting Money Laundering Activities on the Bitcoin Network. CoRR abs/1912.12060 (2019) - 2018
- [j33]Jun Liu, Kensuke Fukuda:
An Evaluation of Darknet Traffic Taxonomy. J. Inf. Process. 26: 148-157 (2018) - [j32]Satoru Kobayashi, Kazuki Otomo, Kensuke Fukuda, Hiroshi Esaki:
Mining Causality of Network Events in Log Data. IEEE Trans. Netw. Serv. Manag. 15(1): 53-67 (2018) - [c109]Sophon Mongkolluksamee, Vasaka Visoottiviseth, Kensuke Fukuda:
Robust Peer to Peer Mobile Botnet Detection by Using Communication Patterns. AINTEC 2018: 38-45 - [c108]Ha Dao, Johan Mazel, Kensuke Fukuda:
Understanding abusive web resources: characteristics and counter-measures of malicious web resources and cryptocurrency mining. AINTEC 2018: 54-61 - [c107]Kensuke Fukuda, John S. Heidemann:
Who Knocks at the IPv6 Door?: Detecting IPv6 Scanning. Internet Measurement Conference 2018: 231-237 - [c106]Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
Finding Anomalies in Network System Logs with Latent Variables. Big-DAMA@SIGCOMM 2018: 8-14 - 2017
- [j31]João Taveira Araújo, Raul Landa, Richard G. Clegg, George Pavlou, Kensuke Fukuda:
On rate limitation mechanisms for TCP throughput: A longitudinal analysis. Comput. Networks 113: 159-175 (2017) - [j30]Xuan Thien Phan, Kensuke Fukuda:
SDN-Mon: Fine-Grained Traffic Monitoring Framework in Software-Defined Networks. J. Inf. Process. 25: 182-190 (2017) - [j29]Romain Fontugne, Patrice Abry, Kensuke Fukuda, Darryl Veitch, Kenjiro Cho, Pierre Borgnat, Herwig Wendt:
Scaling in Internet Traffic: A 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections. IEEE/ACM Trans. Netw. 25(4): 2152-2165 (2017) - [j28]Kensuke Fukuda, John S. Heidemann, Abdul Qadeer:
Detecting Malicious Activity With DNS Backscatter Over Time. IEEE/ACM Trans. Netw. 25(5): 3203-3218 (2017) - [c105]Xuan Thien Phan, Kensuke Fukuda:
Toward a Flexible and Scalable Monitoring Framework in Software-Defined Networks. AINA Workshops 2017: 403-408 - [c104]Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
An Analysis of Burstiness and Causality of System Logs. AINTEC 2017: 16-23 - [c103]Pedro Casas, Juan Martin Vanerio, Kensuke Fukuda:
GML learning, a generic machine learning model for network measurements analysis. CNSM 2017: 1-9 - [c102]Xuan Thien Phan, Ignacio Dominguez Martinez-Casanueva, Kensuke Fukuda:
Adaptive and distributed monitoring mechanism in software-defined networks. CNSM 2017: 1-5 - [c101]Takashi Kurimoto, Shigeo Urushidani, Hiroshi Yamada, Kenjiro Yamanaka, Motonori Nakamura, Shunji Abe, Kensuke Fukuda, Michihiro Koibuchi, Hiroki Takakura, Shigeki Yamada, Yusheng Ji:
SINET5: A low-latency and high-bandwidth backbone network for SDN/NFV Era. ICC 2017: 1-7 - [c100]Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
Mining causes of network events in log data with causal inference. IM 2017: 45-53 - [c99]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
Profiling internet scanners: Spatiotemporal structures and measurement ethics. TMA 2017: 1-9 - [i2]Romain Fontugne, Patrice Abry, Kensuke Fukuda, Darryl Veitch, Kenjiro Cho, Pierre Borgnat, Herwig Wendt:
Scaling in Internet Traffic: a 14 year and 3 day longitudinal study, with multiscale analyses and random projections. CoRR abs/1703.02005 (2017) - [i1]Johan Mazel, Richard Garnier, Kensuke Fukuda:
A comparison of web privacy protection techniques. CoRR abs/1712.06850 (2017) - 2016
- [j27]Alessandro D'Alconzo, Pere Barlet-Ros, Kensuke Fukuda, David R. Choffnes:
Machine learning, data mining and Big Data frameworks for network monitoring and troubleshooting. Comput. Networks 107: 1-4 (2016) - [j26]Sophon Mongkolluksamee, Vasaka Visoottiviseth, Kensuke Fukuda:
Combining Communication Patterns & Traffic Patterns to Enhance Mobile Traffic Identification Performance. J. Inf. Process. 24(2): 247-254 (2016) - [j25]Valentín Carela-Español, Pere Barlet-Ros, Albert Bifet, Kensuke Fukuda:
A streaming flow-based technique for traffic classification applied to 12 + 1 years of Internet traffic. Telecommun. Syst. 63(2): 191-204 (2016) - [c98]Jordan Frécon, Romain Fontugne, Gustavo Didier, Nelly Pustelnik, Kensuke Fukuda, Patrice Abry:
Non-linear regression for bivariate self-similarity identification - application to anomaly detection in Internet traffic based on a joint scaling analysis of packet and byte counts. ICASSP 2016: 4184-4188 - [c97]Takashi Kurimoto, Shigeo Urushidani, Hiroshi Yamada, Kenjiro Yamanaka, Motonori Nakamura, Shunji Abe, Kensuke Fukuda, Michihiro Koibuchi, Yusheng Ji, Hiroki Takakura, Shigeki Yamada:
A fully meshed backbone network for data-intensive sciences and SDN services. ICUFN 2016: 909-911 - [c96]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
Identifying Coordination of Network Scans Using Probed Address Structure. TMA 2016 - 2015
- [j24]Shigeo Urushidani, Shunji Abe, Kenjiro Yamanaka, Kento Aida, Shigetoshi Yokoyama, Hiroshi Yamada, Motonori Nakamura, Kensuke Fukuda, Michihiro Koibuchi, Shigeki Yamada:
New Directions for a Japanese Academic Backbone Network. IEICE Trans. Inf. Syst. 98-D(3): 546-556 (2015) - [j23]Johan Mazel, Pedro Casas, Romain Fontugne, Kensuke Fukuda, Philippe Owezarski:
Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection. Int. J. Netw. Manag. 25(5): 283-305 (2015) - [c95]Sophon Mongkolluksamee, Vasaka Visoottiviseth, Kensuke Fukuda:
Enhancing the Performance of Mobile Traffic Identification with Communication Patterns. COMPSAC 2015: 336-345 - [c94]Romain Fontugne, Patrice Abry, Kensuke Fukuda, Pierre Borgnat, Johan Mazel, Herwig Wendt, Darryl Veitch:
Random projection and multiscale wavelet leader based anomaly detection and address identification in internet traffic. ICASSP 2015: 5530-5534 - [c93]Kensuke Fukuda, John S. Heidemann:
Detecting Malicious Activity with DNS Backscatter. Internet Measurement Conference 2015: 197-210 - [c92]Kensuke Fukuda, Hirochika Asai, Kenichi Nagami:
Tracking the Evolution and Diversity in Network Usage of Smartphones. Internet Measurement Conference 2015: 253-266 - [c91]Romain Fontugne, Johan Mazel, Kensuke Fukuda:
An empirical mixture model for large-scale RTT measurements. INFOCOM 2015: 2470-2478 - [e2]Kenjiro Cho, Kensuke Fukuda, Vivek S. Pai, Neil Spring:
Proceedings of the 2015 ACM Internet Measurement Conference, IMC 2015, Tokyo, Japan, October 28-30, 2015. ACM 2015, ISBN 978-1-4503-3848-6 [contents] - 2014
- [j22]Kriangkrai Limthong, Kensuke Fukuda, Yusheng Ji, Shigeki Yamada:
Unsupervised Learning Model for Real-Time Anomaly Detection in Computer Networks. IEICE Trans. Inf. Syst. 97-D(8): 2084-2094 (2014) - [j21]Hirochika Asai, Kensuke Fukuda, Patrice Abry, Pierre Borgnat, Hiroshi Esaki:
Network application profiling with traffic causality graphs. Int. J. Netw. Manag. 24(4): 289-303 (2014) - [j20]Shigeo Urushidani, Michihiro Aoki, Kensuke Fukuda, Shunji Abe, Motonori Nakamura, Michihiro Koibuchi, Yusheng Ji, Shigeki Yamada:
Highly available network design and resource management of SINET4. Telecommun. Syst. 56(1): 33-47 (2014) - [c90]Jianxing Chen, Romain Fontugne, Akira Kato, Kensuke Fukuda:
Clustering Spam Campaigns with Fuzzy Hashing. AINTEC 2014: 66 - [c89]Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
Towards an NLP-based log template generation algorithm for system log analysis. CFI 2014: 11:1-11:4 - [c88]Romain Fontugne, Johan Mazel, Kensuke Fukuda:
Hashdoop: A MapReduce framework for network anomaly detection. INFOCOM Workshops 2014: 494-499 - [c87]João Taveira Araújo, Raul Landa, Richard G. Clegg, George Pavlou, Kensuke Fukuda:
A longitudinal analysis of Internet rate limitations. INFOCOM 2014: 1438-1446 - [c86]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
A taxonomy of anomalies in backbone network traffic. IWCMC 2014: 30-36 - [c85]Jun Liu, Kensuke Fukuda:
Towards a taxonomy of darknet traffic. IWCMC 2014: 37-43 - [c84]Kensuke Fukuda, Shinta Sato, Takeshi Mitamura:
Towards evaluation of DNS server selection with geodesic distance. NOMS 2014: 1-8 - [c83]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
Visual comparison of network anomaly detectors with chord diagrams. SAC 2014: 473-480 - 2013
- [j19]Yoshiki Kanda, Romain Fontugne, Kensuke Fukuda, Toshiharu Sugawara:
ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches. Comput. Commun. 36(5): 575-588 (2013) - [j18]Kimihiro Mizutani, Toru Mano, Osamu Akashi, Kensuke Fukuda:
MARIF: Multiple Queries Look-Up Architecture Using Range Information Feedback in a DHT Network. IEICE Trans. Commun. 96-B(7): 1680-1690 (2013) - [j17]Yosuke Himura, Kensuke Fukuda, Kenjiro Cho, Pierre Borgnat, Patrice Abry, Hiroshi Esaki:
Synoptic Graphlet: Bridging the Gap Between Supervised and Unsupervised Profiling of Host-Level Network Traffic. IEEE/ACM Trans. Netw. 21(4): 1284-1297 (2013) - [c82]Yutaro Mishima, Kensuke Fukuda, Hiroshi Esaki:
An Analysis of Players and Bots Behaviors in MMORPG. AINA 2013: 870-876 - [c81]Ruetee Chitpranee, Kensuke Fukuda:
Towards passive DNS software fingerprinting. AINTEC 2013: 9-16 - [c80]Yuta Kazato, Kensuke Fukuda, Toshiharu Sugawara:
Towards classification of DNS erroneous queries. AINTEC 2013: 25-32 - [c79]Youngjoon Won, Romain Fontugne, Kenjiro Cho, Hiroshi Esaki, Kensuke Fukuda:
Nine years of observing traffic anomalies: Trending analysis in backbone networks. IM 2013: 636-642 - [c78]Kensuke Fukuda, Shinta Sato, Takeshi Mitamura:
A technique for counting DNSSEC validators. INFOCOM 2013: 80-84 - [c77]Romain Fontugne, Jorge Ortiz, Nicolas Tremblay, Pierre Borgnat, Patrick Flandrin, Kensuke Fukuda, David E. Culler, Hiroshi Esaki:
Strip, bind, and search: a method for identifying abnormal energy consumption in buildings. IPSN 2013: 129-140 - [c76]Kalika Suksomboon, Saran Tarnoi, Yusheng Ji, Michihiro Koibuchi, Kensuke Fukuda, Shunji Abe, Motonori Nakamura, Michihiro Aoki, Shigeo Urushidani, Shigeki Yamada:
PopCache: Cache more or less based on content popularity for information-centric networking. LCN 2013: 236-243 - [c75]Kensuke Fukuda, Kenichi Nagami:
A Measurement of Mobile Traffic Offloading. PAM 2013: 73-82 - 2012
- [c74]Kalika Suksomboon, Yusheng Ji, Michihiro Koibuchi, Kensuke Fukuda, Shunji Abe, Motonori Nakamura, Michihiro Aoki, Shigeo Urushidani, Shigeki Yamada:
On incentive-based inter-domain caching for content delivery in future internet architectures. AINTEC 2012: 1-8 - [c73]Johan Mazel, Hiroshi Esaki, Romain Fontugne, Kensuke Fukuda:
Improving an SVD-based combination strategy of anomaly detectors for traffic labelling. AINTEC 2012: 69-76 - [c72]Kimihiro Mizutani, Toru Mano, Osamu Akashi, Kensuke Fukuda:
Efficient query bundling mechanism in a DHT network. GLOBECOM 2012: 2695-2700 - [c71]Sophon Mongkolluksamee, Kensuke Fukuda, Panita Pongpaibool:
Counting NATted hosts by observing TCP/IP field behaviors. ICC 2012: 1265-1270 - 2011
- [j16]Atsushi Terauchi, Kensuke Fukuda, Osamu Akashi:
IM-DB: Information Retrieval System for Interactive Network-Status Analysis. Inf. Media Technol. 6(3): 903-913 (2011) - [j15]Romain Fontugne, Toshio Hirotsu, Kensuke Fukuda:
A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies. J. Networks 6(4): 577-586 (2011) - [c70]Masayuki Ohta, Yoshiki Kanda, Kensuke Fukuda, Toshiharu Sugawara:
Analysis of Spoofed IP Traffic Using Time-to-Live and Identification Fields in IP Headers. AINA Workshops 2011: 355-361 - [c69]Kensuke Fukuda, Michihiro Aoki, Shunji Abe, Yusheng Ji, Michihiro Koibuchi, Motonori Nakamura, Shigeki Yamada, Shigeo Urushidani:
Impact of Tohoku earthquake on R&E network in Japan. SWID@CoNEXT 2011: 1:1-1:6 - [c68]João Taveira Araújo, Kensuke Fukuda:
MALAWI: aggregated longitudinal analysis of the MAWI dataset. StudentWorkshop@CoNEXT 2011: 2:1-2:2 - [c67]Romain Fontugne, Kenjiro Cho, Youngjoon Won, Kensuke Fukuda:
Disasters seen through Flickr cameras. SWID@CoNEXT 2011: 5:1-5:10 - [c66]Kensuke Fukuda:
On the use of weighted syslog time series for anomaly detection. Integrated Network Management 2011: 393-398 - [c65]Romain Fontugne, Kensuke Fukuda:
A Hough-transform-based anomaly detector with an adaptive time interval. SAC 2011: 471-477 - [c64]Hirochika Asai, Kensuke Fukuda, Hiroshi Esaki:
Traffic causality graphs: Profiling network applications through temporal and spatial causality of flows. ITC 2011: 95-102 - [c63]Kensuke Fukuda:
An Analysis of Longitudinal TCP Passive Measurements (Short Paper). TMA 2011: 29-36 - 2010
- [j14]Shigeo Urushidani, Kensuke Fukuda, Michihiro Koibuchi, Motonori Nakamura, Shunji Abe, Yusheng Ji, Michihiro Aoki, Shigeki Yamada:
Dynamic Resource Allocation and QoS Control Capabilities of the Japanese Academic Backbone Network. Future Internet 2(3): 295-307 (2010) - [j13]Romain Fontugne, Yosuke Himura, Kensuke Fukuda:
Evaluation of Anomaly Detection Method Based on Pattern Recognition. IEICE Trans. Commun. 93-B(2): 328-335 (2010) - [j12]Yosuke Himura, Kensuke Fukuda, Patrice Abry, Kenjiro Cho, Hiroshi Esaki:
Characterization of Host-Level Application Traffic with Multi-Scale Gamma Model. IEICE Trans. Commun. 93-B(11): 3048-3057 (2010) - [j11]Yosuke Himura, Kensuke Fukuda, Kenjiro Cho, Hiroshi Esaki:
An evaluation of automatic parameter tuning of a statistics-based anomaly detection algorithm. Int. J. Netw. Manag. 20(5): 295-316 (2010) - [j10]Guillaume Dewaele, Yosuke Himura, Pierre Borgnat, Kensuke Fukuda, Patrice Abry, Olivier J. J. Michel, Romain Fontugne, Kenjiro Cho, Hiroshi Esaki:
Unsupervised host behavior classification from connection patterns. Int. J. Netw. Manag. 20(5): 317-337 (2010) - [j9]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Shin-ya Sato, Osamu Akashi, Satoshi Kurihara:
Fluctuated peer selection policy and its performance in large-scale multi-agent systems. Web Intell. Agent Syst. 8(3): 255-268 (2010) - [c62]Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara:
A PCA Analysis of Daily Unwanted Traffic. AINA 2010: 377-384 - [c61]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara:
Effect of probabilistic task allocation based on statistical analysis of bid values. AAMAS 2010: 1603-1604 - [c60]Kensuke Fukuda:
Difficulties of identifying application type in backbone traffic. CNSM 2010: 358-361 - [c59]Hirochika Asai, Kensuke Fukuda, Hiroshi Esaki:
Towards characterization of wireless traffic in coexisting 802.11a/g and 802.11n network. StudentWorkshop@CoNEXT 2010: 1:1-1:2 - [c58]Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda:
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. CoNEXT 2010: 8 - [c57]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara:
Adaptive probabilistic task allocation in large-scale multi-agent systems and its evaluation. GECCO 2010: 1311-1312 - [c56]Yoshiki Kanda, Kensuke Fukuda, Toshiharu Sugawara:
Evaluation of Anomaly Detection Based on Sketch and PCA. GLOBECOM 2010: 1-5 - [c55]Toshiharu Sugawara, Toshio Hirotsu, Kensuke Fukuda:
Probabilistic Award Strategy for Contract Net Protocol in Massively Multi-agent Systems. ICAART (2) 2010: 165-171 - [c54]Toshio Hirotsu, Shinnosuke Nishitani, Hirotake Abe, Kyoji Umemura, Kensuke Fukuda, Satoshi Kurihara, Toshiharu Sugawara:
A Light-Weight Autonomous Power Saving Method for Wireless Sensor Networks. ICAS 2010: 188-193 - [c53]Kensuke Fukuda, Romain Fontugne:
Estimating Speed of Scanning Activities with a Hough Transform. ICC 2010: 1-5 - [c52]Yoshiki Kanda, Kensuke Fukuda, Toshiharu Sugawara:
A Flow Analysis for Mining Traffic Anomalies. ICC 2010: 1-5 - [c51]Toshio Hirotsu, Satoshi Kurihara, Kensuke Fukuda, Osamu Akashi, Hirotake Abe, Toshiharu Sugawara:
Dynamic and distributed routing control for virtualized local area networks. LCN 2010: 212-215 - [c50]Atsushi Terauchi, Osamu Akashi, Kensuke Fukuda:
IM-DB: Information retrieval system for interactive network-status analysis. NOMS 2010: 922-925 - [c49]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara:
Effect of Alternative Distributed Task Allocation Strategy Based on Local Observations in Contract Net Protocol. PRIMA 2010: 90-104 - [c48]Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda:
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory. TMA 2010: 101-114
2000 – 2009
- 2009
- [j8]Shigeo Urushidani, Shunji Abe, Yusheng Ji, Kensuke Fukuda, Michihiro Koibuchi, Motonori Nakamura, Shigeki Yamada, Kaori Shimizu, Rie Hayashi, Ichiro Inoue, Kohei Shiomoto:
Design of versatile academic infrastructure for multilayer network services. IEEE J. Sel. Areas Commun. 27(3): 253-267 (2009) - [j7]Jumpot Phuritatkul, Kien Nguyen, Michihiro Koibuchi, Yusheng Ji, Kensuke Fukuda, Shunji Abe, Jun Matsukata, Shigeo Urushidani, Shigeki Yamada:
Impact of QoS operations on an experimental testbed network. Simul. Model. Pract. Theory 17(3): 528-537 (2009) - [c47]Patrice Abry, Pierre Borgnat, Kensuke Fukuda, Kenjiro Cho:
Combining multiresolution and random projections for robust statistical analysis and anomaly detection. AINTEC 2009: 1-2 - [c46]Shingo Nomoto, Kensuke Fukuda, Minoru Uehara, Hideki Mori:
A Visualization of Internet AS Topology with Valley-free Rules. CISIS 2009: 279-286 - [c45]Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda:
Towards systematic traffic annotation. StudentWorkshop@CoNEXT 2009: 15-16 - [c44]Yosuke Himura, Kensuke Fukuda, Kenjiro Cho, Hiroshi Esaki:
An Automatic and Dynamic Parameter Tuning of a Statistics-Based Anomaly Detection Algorithm. ICC 2009: 1-6 - [c43]Shigeo Urushidani, Kensuke Fukuda, Yusheng Ji, Michihiro Koibuchi, Shunji Abe, Motonori Nakamura, Shigeki Yamada, Kaori Shimizu, Rie Hayashi, Ichiro Inoue, Kohei Shiomoto:
Implementation and Evaluation of Layer-1 Bandwidth-on-Demand Capabilities in SINET3. ICC 2009: 1-6 - [c42]Pierre Borgnat, Guillaume Dewaele, Kensuke Fukuda, Patrice Abry, Kenjiro Cho:
Seven Years and One Day: Sketching the Evolution of Internet Traffic. INFOCOM 2009: 711-719 - [c41]Shin-ya Sato, Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara, Toshiharu Sugawara:
Estimating Relevance of Items on Basis of Proximity of User Groups on Blogspace. Web Intelligence 2009: 157-164 - [e1]Kanchana Kanchanasut, Jens B. Schmitt, Kensuke Fukuda, Mario Gerla:
AINTEC '09, Asian Internet Engineering Conference, Bangkok, Thailand, November 18-20, 2009, Proceedings. ACM 2009, ISBN 978-1-60558-614-4 [contents] - 2008
- [j6]Osamu Akashi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara:
Policy-based BGP-control architecture for inter-AS routing adjustment. Comput. Commun. 31(13): 2996-3002 (2008) - [c40]Romain Fontugne, Toshio Hirotsu, Kensuke Fukuda:
An image processing approach to traffic anomaly detection. AINTEC 2008: 17-26 - [c39]Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda:
Adaptive manager-side control policy in contract net protocol for massively multi-agent systems. AAMAS (3) 2008: 1433-1436 - [c38]Toshiharu Sugawara, Toshio Hirotsu, Satoshi Kurihara, Kensuke Fukuda:
Controling Contract Net Protocol by Local Observation for Large-Scale Multi-Agent Systems. CIA 2008: 206-220 - [c37]Kenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira Kato:
Observing slow crustal movement in residential user traffic. CoNEXT 2008: 12 - [c36]Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara:
Correlation Among Piecewise Unwanted Traffic Time Series. GLOBECOM 2008: 1616-1620 - [c35]Kensuke Fukuda:
Towards Modeling of Traffic Demand of Node in Large Scale Network. ICC 2008: 214-218 - [c34]Shingo Nomoto, Kensuke Fukuda, Minoru Uehara, Hideki Mori:
Graphic Drawing Tools for Network Traffic Simulation. NBiS 2008: 293-302 - [c33]Shin-ya Sato, Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara, Toshiharu Sugawara:
Co-occurrence Analysis Focused on Blogger Communities. Web Intelligence 2008: 372-376 - 2007
- [j5]Shigeo Urushidani, Shunji Abe, Kensuke Fukuda, Jun Matsukata, Yusheng Ji, Michihiro Koibuchi, Shigeki Yamada:
Architectural Design of Next-Generation Science Information Network. IEICE Trans. Commun. 90-B(5): 1061-1070 (2007) - [c32]Satoshi Kurihara, Kensuke Fukuda, Shin-ya Sato, Toshiharu Sugawara:
Multi-Agent Coordination Mechanism Based on Indirect Interaction. AINA Workshops (1) 2007: 68-72 - [c31]Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda, Toshihiro Takada:
Conflict estimation of abstract plans for multiagent systems. AAMAS 2007: 125 - [c30]Toshiharu Sugawara, Toshio Hirotsu, Satoshi Kurihara, Kensuke Fukuda:
Performance variation due to interference among a large number of self-interested agents. IEEE Congress on Evolutionary Computation 2007: 766-773 - [c29]Shigeo Urushidani, Jun Matsukata, Kensuke Fukuda, Shunji Abe, Yusheng Ji, Michihiro Koibuchi, Shigeki Yamada, Kaori Shimizu, Tomonori Takeda, Ichiro Inoue, Kohei Shiomoto:
Layer-1 Bandwidth on Demand Services in SINET3. GLOBECOM 2007: 2286-2291 - [c28]Osamu Akashi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara:
Analysis of Diagnostic Capability for Hijacked Route Problem. IPOM 2007: 37-48 - [c27]Osamu Akashi, Atsushi Terauchi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara:
Lisp-based agent platform and applications for inter-domain network management. ILC 2007: 14 - [c26]Kensuke Fukuda, Masato Tsuru:
Message from the Organizers of the Workshop on Internet Measurement Technology and its Applications to Building Next Generation Internet. SAINT Workshops 2007 - [c25]Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda, Toshihiro Takada:
Effective Selection of Abstract Plans for Multi-Agent Systems. SGAI Conf. 2007: 223-236 - [c24]Guillaume Dewaele, Kensuke Fukuda, Pierre Borgnat, Patrice Abry, Kenjiro Cho:
Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures. LSAD@SIGCOMM 2007: 145-152 - [c23]Shin-ya Sato, Kensuke Fukuda, Satoshi Kurihara, Toshio Hirotsu, Toshiharu Sugawara:
Generating Extensional Definitions of Concepts from Ostensive Definitions by Using Web. WISE 2007: 583-592 - [p2]Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara, Osamu Akashi, Shin-ya Sato, Toshiharu Sugawara:
The Impact of Network Model on Performance of Load-balancing. Emergent Intelligence of Networked Agents 2007: 23-37 - [p1]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Shin-ya Sato, Satoshi Kurihara:
Improvements in Performance of Large-Scale Multi-Agent Systems Based on the Adaptive/ Non-Adaptive Agent Selection. Emergent Intelligence of Networked Agents 2007: 217-230 - 2006
- [c22]Osamu Akashi, Kensuke Fukuda, Satoshi Kurihara, Toshio Hirotsu, Toshiharu Sugawara:
Application of a Massively Multi-Agent System to Internet Routing Management. MMAS/LSMAS/CCMMS 2006: 131-145 - [c21]Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda, Shin-ya Sato, Osamu Akashi:
Total performance by local agent selection strategies in multi-agent systems. AAMAS 2006: 601-608 - [c20]Satoshi Kurihara, Shin-ya Sato, Kensuke Fukuda, Toshiharu Sugawara:
How can agent know the global information without close coordination? AAMAS 2006: 682-684 - [c19]Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara, Shin-ya Sato, Osamu Akashi, Toshiharu Sugawara:
Dependency of Network Structures in Agent Selection and Deployment. IAT 2006: 37-44 - [c18]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Shin-ya Sato, Satoshi Kurihara:
Multi-Agent Systems Performance by Adaptive/Non-Adaptive Agent Selection. IAT 2006: 555-559 - [c17]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Shin-ya Sato, Satoshi Kurihara:
Adaptive Agent Selection in Large-Scale Multi-Agent Systems. PRICAI 2006: 818-822 - [c16]Osamu Akashi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara:
Policy-based BGP control architecture for autonomous routing management. INM@SIGCOMM 2006: 77-82 - [c15]Kenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira Kato:
The impact and implications of the growth in residential user-to-user traffic. SIGCOMM 2006: 207-218 - 2005
- [j4]Susumu Shimizu, Kensuke Fukuda, Ken-ichiro Murakami, Shigeki Goto:
Traffic Matrix Estimation Using Spike Flow Detection. IEICE Trans. Commun. 88-B(4): 1484-1492 (2005) - [j3]Kensuke Fukuda, Misako Takayasu, Hideki Takayasu:
A cause of self-similarity in TCP traffic. Int. J. Commun. Syst. 18(6): 603-617 (2005) - [c14]Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda, Toshihiro Takada:
Predicting possible conflicts in hierarchical planning for multi-agent systems. AAMAS 2005: 813-820 - [c13]Osamu Akashi, Atsushi Terauchi, Kensuke Fukuda, Toshio Hirotsu, Mitsuru Maruyama, Toshiharu Sugawara:
Detection and Diagnosis of Inter-AS Routing Anomalies by Cooperative Intelligent Agents. DSOM 2005: 181-192 - [c12]Kensuke Fukuda, Shin-ya Sato, Osamu Akashi, Toshio Hirotsu, Satoshi Kurihara, Toshiharu Sugawara:
On the Use of Hierarchical Power-law Network Topology for Server Selection and Allocation in Multi-Agent Systems. IAT 2005: 81-88 - [c11]Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara:
Time and Space Correlation in BGP Messages. ICOIN 2005: 215-222 - [c10]Kazuhiro Kazama, Shin-ya Sato, Kensuke Fukuda, Ken-ichiro Murakami, Hiroshi Kawakami, Osamu Katai:
Evaluation of Using Human Relationships on the Web as Information Navigation Paths. JSAI Workshops 2005: 302-313 - [c9]Atsushi Terauchi, Osamu Akashi, Mitsuru Maruyama, Kensuke Fukuda, Toshiharu Sugawara, Toshio Hirotsu, Satoshi Kurihara:
ARTISTE: Agent Organization Management System for Multi-Agent Systems. PRIMA 2005: 207-221 - [c8]Satoshi Kurihara, Kensuke Fukuda, Shin-ya Sato, Toshiharu Sugawara:
Effective Decision Making by Self-evaluation in the Multi-agent Environment. WINE 2005: 631-640 - 2004
- [j2]Kensuke Fukuda, Kenjiro Cho, Hiroshi Esaki:
The impact of residential broadband traffic on Japanese ISP backbones. Comput. Commun. Rev. 35(1): 15-22 (2004) - [j1]Kensuke Fukuda, Hideki Takayasu, Misako Takayasu:
A Stochastic Map Model of Phase Transition in Internet Traffic. Comput. Sci. J. Moldova 12(2): 197-216 (2004) - [c7]Toshiharu Sugawara, Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Shigemi Aoyagi, Toshihiro Takada:
Reusing Coordination and Negotiation Strategies in Multi-Agent Systems for Ubiquitous Network Environment. AAMAS 2004: 496-503 - [c6]Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Shin-ya Sato, Toshiharu Sugawara:
How Collective Intelligence Emerge in Complex Environment? BioADIT 2004: 484-495 - [c5]Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Shigemi Aoyagi, Toshihiro Takada, Toshiharu Sugawara:
Multi-agent Human-Environment Interaction Framework for the Ubiquitous Environment. MMAS 2004: 217-223 - 2003
- [c4]Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Shin-ya Sato, Toshiharu Sugawara:
Simple but efficient collaboration in a complex competitive situation. AAMAS 2003: 1042-1043 - [c3]Kensuke Fukuda, Luís A. Nunes Amaral, Harry Eugene Stanley:
Dynamics of temporal correlation in daily Internet traffic. GLOBECOM 2003: 4069-4073 - [c2]Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu Akashi, Kensuke Fukuda, Toshiharu Sugawara, Shigeru Chiba:
Secure and Manageable Virtual Private Networks for End-users. LCN 2003: 385-394 - 2002
- [c1]Koji Sato, Toshio Hirotsu, Kensuke Fukuda, Osamu Akashi, Toshiharu Sugawara:
Clea: A framework for the Coordination of Applications and Networks. JCIS 2002: 948-951
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint