Countries citing papers authored by Youki Kadobayashi
Since
Specialization
Citations
This map shows the geographic impact of Youki Kadobayashi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Youki Kadobayashi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Youki Kadobayashi more than expected).
Fields of papers citing papers by Youki Kadobayashi
This network shows the impact of papers produced by Youki Kadobayashi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Youki Kadobayashi. The network helps show where Youki Kadobayashi may publish in the future.
Co-authorship network of co-authors of Youki Kadobayashi
This figure shows the co-authorship network connecting the top 25 collaborators of Youki Kadobayashi.
A scholar is included among the top collaborators of Youki Kadobayashi based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Youki Kadobayashi. Youki Kadobayashi is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Kadobayashi, Youki, et al.. (2019). WebSec: Development and Evaluation of game exercise tool for security training. IEICE Technical Report; IEICE Tech. Rep.. 118(427). 13–18.1 indexed citations
Niswar, Muhammad, Shigeru Kashihara, Yuzo Taenaka, et al.. (2010). Seamless vertical handover management for VoIP over intermingled IEEE 802.11g and IEEE 802.16e. 1–6.2 indexed citations
14.
Kadobayashi, Youki, et al.. (2010). Blink: Large-scale P2P network monitoring and visualization system using VM introspection. 351–358.1 indexed citations
Ban, Tao, et al.. (2008). Monitoring and analysis of network traffic in P2P environment. 55. 33–41.2 indexed citations
17.
Hazeyama, Hiroaki, et al.. (2008). Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures. USENIX Security Symposium. 2.2 indexed citations
18.
Kadobayashi, Youki, et al.. (2008). Synchronization of VM probes for observing P2P traffic and application behavior using EtherIP (インターネットコンファレンス2008論文集). 2008. 67–77.
19.
Eto, Masashi, et al.. (2004). Design and Implementation of Policy-Driven Firewall Configuration. 87(10). 1616–1625.
20.
Hazeyama, Hiroaki, et al.. (2003). A Layer-2 Extension to Hash-Based IP Traceback. IEICE Transactions on Information and Systems. 86(11). 2325–2333.15 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.