Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kunikazu Yoda is active.

Publication


Featured researches published by Kunikazu Yoda.


european symposium on research in computer security | 2000

Finding a Connection Chain for Tracing Intruders

Kunikazu Yoda; Hiroaki Etoh

Intruders usually log in through a chain of multiple computer systems to hide their origins before breaking into their targets, which makes tracing difficult. In this paper we present a method to find the connection chain of an intruder for tracing back to the origin. We focus on telnet and rlogin as interactive applications intruders use to log in through hosts.


Ibm Journal of Research and Development | 2004

Finishing line scheduling in the steel industry

Hiroyuki Okano; Andrew J. Davenport; Mark Trumbo; Chandra Reddy; Kunikazu Yoda; Masami Amano

A new solution for large-scale scheduling in the steelmaking industry, called Finishing Line Scheduling (FLS), is described. FLS in a major steel mill is a task to create production campaigns (specific production runs) for steel coils on four continuous processes for a one-month horizon. Two process flows are involved in FLS, and the balancing of the two process flows requires resolving conflicts of due dates. There ate also various constraints along the timeline for each process with respect to sequences of campaigns and coils. The two types of constraints--along process flows and timelines--make the FLS problem very complex. We have developed a high-performance solution for this problem as follows: Input coils are clustered by two clustering algorithms to reduce the complexity and size of the problem. Campaigns are created for each process from downstream to upstream processes, while propagating upward the process timings of the clusters. Timing inconsistencies along the process flows are then repaired by scheduling downward. Finally, coils are sequenced within each campaign. The FLS system enabled a steel mill to expand its scheduling horizon from a few days to one month, and to improve decision frequency from monthly to daily.


international world wide web conferences | 2000

Protecting from stack smashing attacks

Hiroaki Etoh; Kunikazu Yoda


knowledge discovery and data mining | 1997

Computing optimized rectilinear regions for association rules

Kunikazu Yoda; Takeshi Fukuda; Yasuhiko Morimoto; Shinichi Morishita; Takeshi Tokuyama


Archive | 2001

ProPolice: Improved stack-smashing attack detection

Hiroaki Etoh; Kunikazu Yoda


Archive | 2001

Memory device, stack protection system, computer system, compiler, stack protection method, storage medium and program transmission apparatus

Hiroaki Etoh; Kunikazu Yoda


very large data bases | 1998

Algorithms for Mining Association Rules for Binary Segmentations of Huge Categorical Databases

Yasuhiko Morimoto; Takeshi Fukuda; Hirofumi Matsuzawa; Takeshi Tokuyama; Kunikazu Yoda


Archive | 2001

Access chain tracing system, network system, and storage medium

Kunikazu Yoda; Hiroaki Etoh


Archive | 2003

Communications monitoring, processing and intrusion detection

Hiroaki Etoh; Kunikazu Yoda


Archive | 1998

Method and apparatus for deriving association rules from data and for segmenting rectilinear regions

Takeshi Fukuda; Kunikazu Yoda; Takeshi Tokuyama; Shinichi Morishita

Researchain Logo
Decentralizing Knowledge