Skip to main content

Showing 1–3 of 3 results for author: Kadobayashi, Y

.
  1. Choice of Parallelism: Multi-GPU Driven Pipeline for Huge Academic Backbone Network

    Authors: Ruo Ando, Youki Kadobayashi, Hiroki Takakura

    Abstract: Science Information Network (SINET) is a Japanese academic backbone network for more than 800 research institutions and universities. In this paper, we present a multi-GPU-driven pipeline for handling huge session data of SINET. Our pipeline consists of ELK stack, multi-GPU server, and Splunk. A multi-GPU server is responsible for two procedures: discrimination and histogramming. Discrimination is… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: This is an Accepted Manuscript of an article published by Taylor & Francis Group in the International Journal of Parallel, Emergent & Distributed Systems on 24/06/2021 av lable online: http://www.tandfonline.com/ DOI: 10.1080/17445760.2021.1941009

  2. arXiv:2008.06813  [pdf, other

    cs.CR

    Attributes affecting user decision to adopt a Virtual Private Network (VPN) app

    Authors: Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley

    Abstract: A Virtual Private Network (VPN) helps to mitigate security and privacy risks of data transmitting on unsecured network such as public Wi-Fi. However, despite awareness of public Wi-Fi risks becoming increasingly common, the use of VPN when using public Wi-Fi is low. To increase adoption, understanding factors driving user decision to adopt a VPN app is an important first step. This study is the fi… ▽ More

    Submitted 15 August, 2020; originally announced August 2020.

    Comments: First published in the 22nd International Conference on Information and Communications Security (ICICS 2020), Copenhagen, Denmark

  3. Ontological Approach toward Cybersecurity in Cloud Computing

    Authors: Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara

    Abstract: Widespread deployment of the Internet enabled building of an emerging IT delivery model, i.e., cloud computing. Albeit cloud computing-based services have rapidly developed, their security aspects are still at the initial stage of development. In order to preserve cybersecurity in cloud computing, cybersecurity information that will be exchanged within it needs to be identified and discussed. For… ▽ More

    Submitted 1 April, 2014; originally announced May 2014.

    Comments: This is a preprint version of our paper presented in SIN'10, Sept. 7-11, 2010, Taganrog, Rostov Oblast, Russia, International Conference on Security of Information and Networks, 2010