Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2023

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
会議への寄与

検索結果

  • 2012

    Information hiding of two-dimensional code by multi-layer optical

    Teraura, N. & Sakurai, K., 10月 15 2012, Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012. p. 770-777 8 p. 6280373. (Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Mixed-strategy game based trust management for clustered wireless sensor networks

    Hao, D., Adhikari, A. & Sakurai, K., 2012, Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers. p. 239-257 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7222 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • Multi-user keyword search scheme for secure data sharing with fine-grained access control

    Zhao, F., Nishide, T. & Sakurai, K., 8月 13 2012, Information Security and Cryptology, ICISC 2011 - 14th International Conference, Revised Selected Papers. p. 406-418 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7259 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    56 被引用数 (Scopus)
  • On revenue driven server management incloud

    Zhao, L. & Sakurai, K., 8月 16 2012, CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. p. 295-305 11 p. (CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Preventing the access of fraudulent WEB sites by using a special two-dimensional code

    Teraura, N. & Sakurai, K., 10月 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 645-650 6 p. 6296930. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Proposal of the hierarchical file server groups for implementing mandatory access control

    Sakuraba, T. & Sakurai, K., 10月 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 639-644 6 p. 6296929. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Reducing the key size of rainbow using non-commutative rings

    Yasuda, T., Sakurai, K. & Takagi, T., 3月 8 2012, Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings. p. 68-83 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7178 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    10 被引用数 (Scopus)
  • Revocation and tracing based on ternary tree: Towards optimal broadcast encryption scheme

    Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., 12月 1 2012, E-Business and Telecommunications: International Joint Conference, ICETE 2011 Seville, Spain, July 18-21, 2011 Revised Selected Papers. Sevillano, J. L. & Filipe, J. (eds.). p. 233-248 16 p. (Communications in Computer and Information Science; vol. 314).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Secure keyword search using bloom filter with specified character positions

    Suga, T., Nishide, T. & Sakurai, K., 9月 14 2012, Provable Security - 6th International Conference, ProvSec 2012, Proceedings. p. 235-252 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7496 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    26 被引用数 (Scopus)
  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 3月 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 274-288 15 p. (Communications in Computer and Information Science; vol. 222 CCIS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Weakness of provably secure searchable encryption against frequency analysis

    Suga, T., Nishide, T. & Sakurai, K., 12月 1 2012, Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012. p. 142-147 6 p. 6516798. (Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • 2011

    Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach

    Liao, X., Hao, D. & Sakurai, K., 2011, 17th Asia Pacific Conference on Communications, APCC 2011. p. 806-811 6 p. 6152918. (17th Asia-Pacific Conference on Communications, APCC 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • A game theory-based surveillance mechanism against suspicious insiders in MANETs (work-in-progress)

    Hao, D., Ren, Y. & Sakurai, K., 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 237-252 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • A generic evaluation method for key management schemes in wireless sensor network

    Na, R., Ren, Y., Hori, Y. & Sakurai, K., 5月 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 55. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • An efficient key generation method in audio zero-watermarking

    Ciptasari, R. W., Fajar, A., Yulianto, F. A. & Sakurai, K., 12月 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 336-339 4 p. 6079595

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • A new scrambling evaluation scheme based on spatial distribution entropy and centroid difference of bit-plane

    Zhao, L., Adhikari, A. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    4 被引用数 (Scopus)
  • A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems

    Zhao, L., Ren, Y. & Sakurai, K., 2011, Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011. p. 275-282 8 p. 5763377. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    16 被引用数 (Scopus)
  • A robust and compression-combined digital image encryption method based on compressive sensing

    Huang, R. & Sakurai, K., 12月 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 105-108 4 p. 6079545. (Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    58 被引用数 (Scopus)
  • A security analysis of uniformly-layered rainbow: Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm

    Yasuda, T. & Sakurai, K., 12月 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 275-294 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • A SMS-based mobile botnet using flooding algorithm

    Hua, J. & Sakurai, K., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Proceedings. p. 264-279 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6633 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    31 被引用数 (Scopus)
  • A study of communication route selection considering route security

    Etoh, F., Hori, Y. & Sakurai, K., 9月 26 2011, Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011. p. 360-365 6 p. 6004186. (Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Classification on attacks in wireless ad hoc networks: A game theoretic view

    Liao, X., Hao, D. & Sakurai, K., 2011, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 144-149 6 p. 5967534. (Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    14 被引用数 (Scopus)
  • Cryptanalysis on an image scrambling encryption scheme based on pixel bit

    Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • Customized program protection for a user customized data protection framework

    Takahashi, K., Matsuzaki, T., Mine, T. & Sakurai, K., 8月 25 2011, Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011. p. 643-649 7 p. 5953301. (Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011; vol. 1).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Design and implementation of a forced encryption kernel module

    Furukawa, J., Sakai, A., Nishide, T., Hori, Y. & Sakurai, K., 9月 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 607-611 5 p. 5976283. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Design and implementation of document access control model based on role and security policy

    Mao, L., Yao, S., Zhang, K. & Sakurai, K., 11月 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 26-36 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Distributed Paillier cryptosystem without trusted dealer

    Nishide, T. & Sakurai, K., 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. Springer Verlag, p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6513 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    26 被引用数 (Scopus)
  • General fault attacks on multivariate public key cryptosystems

    Hashimoto, Y., Takagi, T. & Sakurai, K., 12月 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    12 被引用数 (Scopus)
  • Improvement on secrecy capacity of wireless LAN using matched filter

    Nishi, R., Morozov, K., Hori, Y. & Sakurai, K., 12月 1 2011, Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011. p. 463-469 7 p. 6117466. (Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Integrity for the In-flight web page based on a fragile watermarking chain scheme

    Gao, P., Nishide, T., Hori, Y. & Sakurai, K., 5月 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 86. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Performance analysis of key management schemes in wireless sensor network using analytic hierarchy process

    Ruan, N., Ren, Y., Hori, Y. & Sakurai, K., 12月 1 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 1739-1744 6 p. 6121040. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration

    Fukushima, Y., Hori, Y. & Sakurai, K., 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 352-361 10 p. 6120839. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    18 被引用数 (Scopus)
  • Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems

    Zhao, F., Nishide, T. & Sakurai, K., 5月 26 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    63 被引用数 (Scopus)
  • Realizing proxy re-encryption in the symmetric world

    Syalim, A., Nishide, T. & Sakurai, K., 2011, Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding. PART 1 ed. p. 259-274 16 p. (Communications in Computer and Information Science; vol. 251 CCIS, no. PART 1).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    23 被引用数 (Scopus)
  • Securing location-aware services based on online/offline signatures in VANETs

    Sur, C., Park, Y., Nishide, T., Sakurai, K. & Rhee, K. H., 2011, Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Proceedings. p. 271-285 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6908 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    Open Access
    1 被引用数 (Scopus)
  • Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited

    Nishide, T. & Sakurai, K., 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 656-661 6 p. 6132887. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • Towards countermeasure of insider threat in network security

    Hori, Y., Nishide, T. & Sakurai, K., 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 634-636 3 p. 6132882. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • Towards optimal revocation and tracing schemes - The power of the ternary tree

    Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., 9月 12 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 37-49 13 p.

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Traceback framework against botmaster by sharing network communication pattern information

    Mizoguchi, S., Takemori, K., Miyake, Y., Hori, Y. & Sakurai, K., 9月 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 639-644 6 p. 5976289. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    7 被引用数 (Scopus)
  • 2010

    A behavior based malware detection scheme for avoiding false positive

    Fukushima, Y., Sakai, A., Hori, Y. & Sakurai, K., 12月 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 79-84 6 p. 5634444. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    27 被引用数 (Scopus)
  • Adaptive and composable non-committing encryptions

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 12月 13 2010, Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. p. 135-144 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6168 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • Adaptive and composable non-interactive string-commitment protocols

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 12月 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 354-361 8 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • A design of history based traffic filtering with probabilistic packet marking against DoS attacks

    Kiuchi, T., Hori, Y. & Sakurai, K., 11月 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 261-264 4 p. 5598129. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    7 被引用数 (Scopus)
  • Behavior control based on dynamic code translation

    Sakai, A., Hori, Y. & Sakurai, K., 11月 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 375-378 4 p. 5598037. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Darknet monitoring on real-operated networks

    Mizoguchi, S., Fukushima, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2010, Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010. p. 278-285 8 p. 5633172

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

    Zhao, L., Ren, Y., Xiang, Y. & Sakurai, K., 2010, Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010. p. 434-441 8 p.

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    61 被引用数 (Scopus)
  • Image encryption design based on multi-dimensional matrix map and partitioning substitution and diffusion-integration substitution network structure

    Zhao, L., Xiao, D. & Sakurai, K., 7月 15 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480269. (2010 International Conference on Information Science and Applications, ICISA 2010).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Implementation and evaluation of bot detection scheme based on data transmission intervals

    Mizoguchi, S., Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 12月 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 73-78 6 p. 5634446. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Model-based intrusion detection by abstract interpretation

    Hua, J., Nishide, T. & Sakurai, K., 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 359-362 4 p. 5598041. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Modeling and containment of search worms targeting web applications

    Hua, J. & Sakurai, K., 2010, Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings. p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6201 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)