default search action
Tomohiko Yagyu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j5]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1936-1954 (2022) - 2016
- [j4]Yusaku Hayamizu, Tomohiko Yagyu, Miki Yamamoto:
Energy Efficient Information Retrieval for Content Centric Networks in Disaster Environment. IEICE Trans. Commun. 99-B(12): 2509-2519 (2016) - 2014
- [j3]Shigeyuki Yamashita, Tomohiko Yagyu, Miki Yamamoto:
Time-Dimensional Traffic Engineering with Storage Aware Routing. IEICE Trans. Commun. 97-B(12): 2641-2649 (2014) - 2011
- [j2]Hiroyuki Urabayashi, Miki Yamamoto, Tomohiko Yagyu:
Performance Evaluation of Inter-Layer 3 Networking with ID/Locator Separation Architecture. IEICE Trans. Commun. 94-B(10): 2741-2750 (2011) - 2007
- [j1]Tomohiko Yagyu, Masahiro Jibiki, Kenichi Yoshida:
A Proposal of Wireless Network Routing Protocol for Heterogeneous Mobility. IEICE Trans. Commun. 90-B(10): 2693-2701 (2007)
Conference and Workshop Papers
- 2021
- [c14]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach for Countermeasure Selection Using Attack Graphs. CSF 2021: 1-16 - [c13]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions. KDD 2021: 2574-2583 - 2019
- [c12]Masaki Inokuchi, Yoshinobu Ohta, Shunichi Kinoshita, Tomohiko Yagyu, Orly Stan, Ron Bitton, Yuval Elovici, Asaf Shabtai:
Design Procedure of Knowledge Base for Practical Attack Graph Generation. AsiaCCS 2019: 594-601 - 2018
- [c11]Ron Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation. ESORICS (1) 2018: 533-554 - 2016
- [c10]Atsushi Tagami, Tomohiko Yagyu, Kohei Sugiyama, Mayutan Arumaithurai, Kenichi Nakamura, Toru Hasegawa, Tohru Asami, K. K. Ramakrishnan:
Name-based push/pull message dissemination for disaster message board. LANMAN 2016: 1-6 - 2015
- [c9]Tohru Asami, Byambajav Namsraijav, Yoshihiko Kawahara, Kohei Sugiyama, Atsushi Tagami, Tomohiko Yagyu, Kenichi Nakamura, Toru Hasegawa:
Moderator-Controlled Information Sharing by Identity-Based Aggregate Signatures for Information Centric Networking. ICN 2015: 157-166 - [c8]Kohei Sugiyama, Atsushi Tagami, Tomohiko Yagyu, Toru Hasegawa, Mayutan Arumaithurai, K. K. Ramakrishnan:
Multipath Support for Name-based Information Dissemination in Fragmented Networks. ICN 2015: 201-202 - [c7]Tomohiko Yagyu, Kenichi Nakamura, Tohru Asami, Kohei Sugiyama, Atsushi Tagami, Toru Hasegawa, Mayutan Arumaithurai:
Demo: Content-Based Push/Pull Message Dissemination for Disaster Message Board. ICN 2015: 205-206 - [c6]Tomohiko Yagyu, Miki Yamamoto, Hideki Tode, Chikara Ohta, James F. Kurose:
Demo: Contents sharing among mobile users in breadcrumbs-enabled cache network. CCNC 2015: 150-151 - [c5]Yusaku Hayamizu, Miki Yamamoto, Tomohiko Yagyu:
Energy and Bandwidth Efficient Content Retrieval for Content Centric Networks in DTN Environment. GLOBECOM Workshops 2015: 1-6 - [c4]Jan Seedorf, Atsushi Tagami, Mayutan Arumaithurai, Yuki Koizumi, Nicola Blefari-Melazzi, Dirk Kutscher, Kohei Sugiyama, Toru Hasegawa, Tohru Asami, K. K. Ramakrishnan, Tomohiko Yagyu, Ioannis Psaras:
The Benefit of Information Centric Networking for Enabling Communications in Disaster Scenarios. GLOBECOM Workshops 2015: 1-7 - 2014
- [c3]Tomohiko Yagyu, Shuya Maeda:
Demo overview: reliable contents retrieval in fragmented icns for disaster scenario. ICN 2014: 193-194 - 2007
- [c2]Tomohiko Yagyu, Masahiro Jibiki, Kenichi Yoshida:
SMART: Scalable Mobility Adaptive Routing Techniques for Heterogeneous Mobile Networks. WCNC 2007: 2997-3002 - 2005
- [c1]Katsutoshi Nishida, Shin-ichi Isobe, Tomohiko Yagyu, Ippei Akiyoshi:
Implementation and evaluation of a network-controlled mobility management protocol (IP2MM): performance evaluation compared with mobile IPv6. WCNC 2005: 1402-1408
Informal and Other Publications
- 2020
- [i4]Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai:
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities. CoRR abs/2007.00059 (2020) - [i3]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions. CoRR abs/2008.04377 (2020) - 2019
- [i2]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. CoRR abs/1906.09786 (2019) - [i1]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach Towards Countermeasure Selection using Attack Graphs. CoRR abs/1906.10943 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 17:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint