default search action
Noriaki Yoshiura
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c44]Rei Kasuya, Noriaki Yoshiura:
Obfuscating LLVM IR with the Application of Lambda Calculus. ACIIDS (2) 2023: 27-39 - 2022
- [c43]Tej Narayan Thakur, Noriaki Yoshiura:
AntiPhiMBS-TRN: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Transaction Level. ACIIDS (2) 2022: 595-607 - [c42]Kohichi Ogawa, Nobukuni Hamamoto, Noriaki Yoshiura:
Smart Help Desk to support user's PC settings. ICCE-TW 2022: 527-528 - [c41]Tej Narayan Thakur, Noriaki Yoshiura:
Modeling and Verification of a Hybrid Model of Mobile Banking Based Branchless Banking System in E-Banking Using SPIN. ICSCA 2022: 149-156 - 2021
- [c40]Tej Narayan Thakur, Noriaki Yoshiura:
AntiPhiMBS: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Application Level. ACIIDS 2021: 399-412 - [c39]Tej Narayan Thakur, Noriaki Yoshiura:
AntiPhiMBS-Auth: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Authentication Level. DASFAA (Workshops) 2021: 365-380 - [c38]Tej Narayan Thakur, Noriaki Yoshiura:
Modeling and Verification of Contactless Mobile Banking System in E-Banking Using SPIN. ICCSA (6) 2021: 581-597 - 2020
- [c37]Masato Ishikawa, Noriaki Yoshiura:
Privacy Protection in Location Based Service by Secure Computation. ACIIDS (2) 2020: 493-504 - [c36]Noriaki Yoshiura, Keigo Sugiyama:
Packet Reachability Verification in OpenFlow Networks. ICSCA 2020: 227-231 - [c35]Noriaki Yoshiura, Kento Koizumi:
A Method of Collecting the IP Addresses of Hidden Server in Tor Networks. ICSCA 2020: 242-246 - [c34]Noriaki Yoshiura, Kaichiro Iida:
Identification of Writing on Bulletin Board via Tor. ICSIM 2020: 135-139 - [c33]Noriaki Yoshiura, Hayata Yano:
IP Traceback method by OpenFlow. ICSIM 2020: 194-198
2010 – 2019
- 2018
- [c32]Chen Kuo, Noriaki Yoshiura:
A Browser Application for Keyword Recommendation Based on User Web Search. ICCSA (3) 2018: 147-162 - [c31]Shuxin Liu, Noriaki Yoshiura:
Model Checking of TTCAN Protocol Using UPPAAL. ICCSA (4) 2018: 550-564 - [c30]Kohichi Ogawa, Noriaki Yoshiura:
Development of a Support System to Resolve Network Troubles by Mobile Robots. IDCS 2018: 209-220 - 2017
- [c29]Noriaki Yoshiura:
The Relation Between Syntax Restriction of Temporal Logic and Properties of Reactive System Specification. ACIIDS (2) 2017: 105-114 - 2016
- [j3]Yusaku Fujii, Noriaki Yoshiura, Naoya Ohta, Akihiro Takita, Hiroshi Ueda, Koichi Maru:
Abuse Prevention of Street Camera Network by Browsing-History Disclosure. J. Community Informatics 12(1) (2016) - [c28]Hiroaki Date, Noriaki Yoshiura:
Computational Verification of Network Programs for Several OpenFlow Switches in Coq. ICCSA (2) 2016: 223-238 - 2015
- [c27]Yuichi Fukaya, Noriaki Yoshiura:
Extracting Environmental Constraints in Reactive System Specifications. ICCSA (4) 2015: 671-685 - [c26]Noriaki Yoshiura, Yuma Hirayanagi:
Implementation of Decision Procedure of Stepwise Satisfiability of Reactive System Specifications. ICCSA (4) 2015: 686-698 - [c25]Noriaki Yoshiura:
Implementation of Theorem Prover of Relevant Logic. IEA/AIE 2015: 13-22 - 2014
- [c24]Koichi Ogawa, Noriaki Yoshiura:
Network operational method by using software-defined networking for improvement of communication quality at disasters. APNOMS 2014: 1-4 - [c23]Noriaki Yoshiura, Wei Wei:
Static Data Race Detection for Java Programs with Dynamic Class Loading. IDCS 2014: 161-173 - [c22]Noriaki Yoshiura, Keita Omi:
Resolving Fallback and Path MTU Problems Caused by Denying ICMP Packets in IPv6. IDCS 2014: 227-236 - 2013
- [c21]Natsuki Kimura, Noriaki Yoshiura:
Construction and Verification of Mobile Ad Hoc Network Protocols. CSS 2013: 198-212 - [c20]Yusaku Fujii, Noriaki Yoshiura, Akihiro Takita, Naoya Ohta:
Smart street light system with energy saving function based on the sensor network. e-Energy 2013: 271-272 - [c19]Shunichi Yokoo, Noriaki Yoshiura:
Indicating Important Parts in Searched Web Pages by Retrieval Keywords. BSI@PAKDD/BSIC@IJCAI 2013: 250-263 - 2012
- [c18]Hirokazu Sayama, Noriaki Yoshiura:
Test tool for equivalence of access control list. APNOMS 2012: 1-4 - [c17]Daisuke Yamakawa, Noriaki Yoshiura:
Applying Tesseract-OCR to detection of image spam mails. APNOMS 2012: 1-4 - [c16]Yoshinori Neya, Noriaki Yoshiura:
Stepwise Satisfiability Checking Procedure for Reactive System Specifications by Tableau Method and Proof System. ICFEM 2012: 283-298 - [c15]Kohichi Ogawa, Noriaki Yoshiura:
Operational experiences from the viewpoint of university IT system administrators in the metropolitan area on east Japan great earthquake. SIGUCCS 2012: 239-244 - 2010
- [c14]Daisuke Yamakawa, Noriaki Yoshiura:
Analysis of spam mail sent to Japanese mail addresses in the long term. NOMS 2010: 833-836
2000 – 2009
- 2009
- [j2]Krishan Sabaragamu Koralalage, Noriaki Yoshiura:
OTag: Architecture to Represent Real World Objects in RF Tags to Improve Future Intelligent Transportation Systems. J. Convergence Inf. Technol. 4(2): 30-48 (2009) - [c13]Krishan Sabaragamu Koralalage, Noriaki Yoshiura:
Object Tag Architecture for Innovative Intelligent Transportation Systems. ADBIS 2009: 314-329 - [c12]Takumichi Ishikawa, Noriaki Yoshiura:
Decreasing Access Control List Processed in Hardware. APNOMS 2009: 453-457 - [c11]Krishan Sabaragamu Koralalage, Noriaki Yoshiura:
uCard: A Novel Privacy Friendly Radio Frequency Tag Architecture for Universal Loyalty Card. DigiBiz 2009: 53-63 - [c10]Krishan Sabaragamu Koralalage, Noriaki Yoshiura:
iRail: A novel architecture towards autonomous locomotives and intelligent infrastructures for developing countries. ITSC 2009: 1-6 - [c9]Krishan Sabaragamu Koralalage, Noriaki Yoshiura:
iPark: A Universal Solution for Vehicle Parking. WSKS (1) 2009: 594-604 - 2008
- [c8]Noriaki Yoshiura:
Statistical Analysis of Slow Portsweep. APNOMS 2008: 470-473 - [c7]Takanori Moroi, Noriaki Yoshiura:
Discovering Web Pages Censored by Search Engines in Japan. CIMCA/IAWTIC/ISE 2008: 1171-1176 - [c6]Noriaki Yoshiura:
Formal Definition of Relevant Logical Symbol Occurrence. KES (2) 2008: 508-516 - 2005
- [j1]Yusaku Fujii, Noriaki Yoshiura, Naoya Ohta:
Community Security By Widely Available Information Technology. J. Community Informatics 2(1) (2005) - [c5]Michihiro Inoue, Noriaki Yoshiura, Yoshikuni Onozato:
Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks. ICDCIT 2005: 82-92 - 2004
- [c4]Noriaki Yoshiura:
Finding the Causes of Unrealizability of Reactive System Formal Specifications. SEFM 2004: 34-43 - 2003
- [c3]Noriaki Yoshiura:
Decision Procedures for Several Properties of Reactive System Specifications. ISSS 2003: 154-173 - 2001
- [c2]Noriaki Yoshiura:
Evolution Mechanism of Reactive System Programs. IWPSE 2001: 170-173
1990 – 1999
- 1993
- [c1]Noriaki Yoshiura, Naoki Yonezaki:
More Expressive Temporal Logic for Specifications. SEKE 1993: 363-366
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint