Personal information
Activities
Employment (2)
2022-09-01
to
present
|
Professor
(Information Security)
Employment
Source:
Kuniyasu Suzaki
1991-04-01
to
2022-08-31
|
Senior Researcher
(Cyber Physical Security Research Center)
Employment
Source:
Kuniyasu Suzaki
Education and qualifications (3)
2009-07-23
to
2009-07-23
|
Doctor of Philosophy in the field of Information Science and Technology
(Graduate School of Information Science and Technology)
Education
Source:
Kuniyasu Suzaki
1988-04
to
1990-03
|
Master of Engineering
(Graduate School of Engineering)
Education
Source:
Kuniyasu Suzaki
1983-03
to
1988-03
|
Bachelor of Engineering
(Department of Engineering)
Education
Source:
Kuniyasu Suzaki
Works (50 of 58)
Items per page:
Page 1 of 2
IEEE Access
2021-09-13
|
Journal article
|
Author
Contributors:
Kuniyasu Suzaki;
Kenta Nakajima;
Tsukasa Oi;
Akira Tsukamoto
Source:
Kuniyasu Suzaki
Source:
Kuniyasu Suzaki
IEICE Transactions on Information and Systems
2021-03-01
|
Journal article
Source:
Kuniyasu Suzaki
Source:
Kuniyasu Suzaki
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
2020-12
|
Conference paper
Source:
Kuniyasu Suzaki
Annual Computer Security Applications Conference
2020-12-07
|
Conference paper
Source:
Kuniyasu Suzaki
2020 IEEE International Symposium on Circuits and Systems (ISCAS)
2020-10
|
Conference paper
Source:
Kuniyasu Suzaki
Source:
Kuniyasu Suzaki
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
2019-06
|
Conference paper
Source:
Kuniyasu Suzaki
International Workshop on Security
2018
|
Conference paper
Source:
Kuniyasu Suzaki
High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2016 IEEE 18th International Conference on
2016
|
Conference paper
Source:
Kuniyasu Suzaki
International Journal of Networking and Computing
2015
|
Journal article
Source:
Kuniyasu Suzaki
ACM SIGSOFT Software Engineering Notes
2014
|
Journal article
Source:
Kuniyasu Suzaki
International Workshop on Security
2014
|
Conference paper
Source:
Kuniyasu Suzaki
Proceedings of the 29th Annual ACM Symposium on Applied Computing
2014
|
Conference paper
Source:
Kuniyasu Suzaki
Computing and Networking (CANDAR), 2014 Second International Symposium on
2014
|
Conference paper
Source:
Kuniyasu Suzaki
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
2013
|
Journal article
Source:
Kuniyasu Suzaki
European Workshop on System Security (EuroSec 2012)
2012
|
Conference paper
Source:
Kuniyasu Suzaki
Recent Advances in Computer Science and Information Engineering
2012
|
Book chapter
Source:
Kuniyasu Suzaki
JoWUA
2012
|
Journal article
Source:
Kuniyasu Suzaki
Proceedings of the 9th IEEE Working Conference on Mining Software Repositories
2012
|
Conference paper
Source:
Kuniyasu Suzaki
International Conference on Security Technology
2011
|
Conference paper
Source:
Kuniyasu Suzaki
The 2011 International Conference on Computers, Communications, Control and Automation (CCCA 2011), Hong Kong, China
2011
|
Conference paper
Source:
Kuniyasu Suzaki
2011 Linux Symposium
2011
|
Conference paper
Source:
Kuniyasu Suzaki
Proceedings of the Fourth European Workshop on System Security
2011
|
Conference paper
Source:
Kuniyasu Suzaki
A case study of tradeoff between security and usability
2011
|
Journal article
Source:
Kuniyasu Suzaki
Consumer Communications and Networking Conference (CCNC), 2011 IEEE
2011
|
Conference paper
Source:
Kuniyasu Suzaki
ACM Symposium on Operating Systems Principles (SOSP 2011), Poster session
2011
|
Conference paper
Source:
Kuniyasu Suzaki
arXiv preprint arXiv:1110.1354
2011
|
Journal article
Source:
Kuniyasu Suzaki
HotSec
2010
|
Conference paper
Source:
Kuniyasu Suzaki
Black Hat USA
2010
|
Journal article
Source:
Kuniyasu Suzaki
Proceedings of the Linux Symposium
2009
|
Conference paper
Source:
Kuniyasu Suzaki
3rd Int. Workshop on Analysis of Security APIs
2009
|
Conference paper
Source:
Kuniyasu Suzaki
Trusted Infrastructure Technologies Conference, 2008. APTC'08. Third Asia-Pacific
2008
|
Conference paper
Source:
Kuniyasu Suzaki
online] Virtualization Mini Summit on Linuxsymposium
2008
|
Journal article
Source:
Kuniyasu Suzaki
Electronics and Communications in Japan (Part I: Communications)
2007
|
Journal article
Source:
Kuniyasu Suzaki
PDPTA
2007
|
Conference paper
Source:
Kuniyasu Suzaki
USENIX annual technical conference proceedings
2007
|
Conference paper
Source:
Kuniyasu Suzaki
Linux Conference Australia
2007
|
Conference paper
Source:
Kuniyasu Suzaki
2007-07
|
Other
Source:
Kuniyasu Suzaki
Linux-Kongress, Sept. 2006
2006
|
Conference paper
Source:
Kuniyasu Suzaki
Linux-Kongress, Sept. 2006
2006
|
Conference paper
Source:
Kuniyasu Suzaki
Ottwa Linux Symposium
2006
|
Conference paper
Source:
Kuniyasu Suzaki
International Congress on Mathematical Software
2006
|
Conference paper
Source:
Kuniyasu Suzaki
Linux-Kongress 2006
2006
|
Conference paper
Source:
Kuniyasu Suzaki
Information Technology Based Higher Education and Training, 2005. ITHET 2005. 6th International Conference on
2005
|
Conference paper
Source:
Kuniyasu Suzaki
Distributed Computing Systems Workshops, 2005. 25th IEEE International Conference on
2005
|
Conference paper
Source:
Kuniyasu Suzaki
WEBIST
2005
|
Conference paper
Source:
Kuniyasu Suzaki
null
2003
|
Conference paper
Source:
Kuniyasu Suzaki
Workshop on Job Scheduling Strategies for Parallel Processing
1999
|
Conference paper
Source:
Kuniyasu Suzaki
Items per page:
Page 1 of 2