Naonobu Okazaki

According to our database1, Naonobu Okazaki authored at least 85 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar.
Future Internet, August, 2024

RAGESS: A Tool for Real-time Automatic Generation of SwiftDiagram to Support iOS Application Development.
J. Robotics Netw. Artif. Life, 2024

ASLA: Automatic Segmentation and Labeling by Deep Learning for Document Pictures.
J. Robotics Netw. Artif. Life, 2024

2023
Tsunami evacuation simulation considering road width in Aoshima district.
Artif. Life Robotics, November, 2023

Development of keypads which use colors or shapes to prevent shoulder surfing.
Artif. Life Robotics, November, 2023

Development of a system to detect eye misalignment by using an Arm Cooperative Manipulators HMD equipped with eye-tracking capability.
J. Robotics Netw. Artif. Life, 2023

Analysis of Self Determination Factors for Continuance Intention on Online Learning Management System.
J. Robotics Netw. Artif. Life, 2023

2022
Proposal of Gamma Which Is a Messaging Platform for Spatial Data.
J. Robotics Netw. Artif. Life, 2022

Detection of Blob and Feature Envy Smells in a Class Diagram using Class's Features.
J. Robotics Netw. Artif. Life, 2022

Expansion of Application Scope and Addition of a Function for Operations into BWDM which is an Automatic Test Cases Generation Tool for VDM++ Specification.
J. Robotics Netw. Artif. Life, 2022

Correction to: Proposal and evaluation for color constancy CAPTCHA.
Artif. Life Robotics, 2022

Proposal for a blockchain based agricultural input voucher system.
Artif. Life Robotics, 2022

2021
Development of a System to Detect Eye Position Abnormality based on Eye-Tracking.
J. Robotics Netw. Artif. Life, 2021

Measuring Test Suite Reusability Based on the Usage Frequency and Coverage of Reused Test Cases.
J. Robotics Netw. Artif. Life, 2021

Measuring Redundancy Score for Test Suite Evaluation by Using Test Cases Matching Approach.
J. Robotics Netw. Artif. Life, 2021

Proposal and evaluation for color constancy CAPTCHA.
Artif. Life Robotics, 2021

Development and Evaluation of Swahili Text Based CAPTCHA.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language.
Proceedings of the Advances in Information and Computer Security, 2021

Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Performance Evaluation of Blockchain Based Agricultural Input Voucher System.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

2020
Proposal of an Algorithm to Generate VDM++ Specification Based on its Grammar by Using Word Lists Extracted from the Natural Language Specification.
J. Robotics Netw. Artif. Life, 2020

On a user authentication method to realise an authentication system using s-EMG.
Int. J. Grid Util. Comput., 2020

Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication.
Proceedings of the Advances in Internet, 2020

Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit.
J. Robotics Netw. Artif. Life, 2019

Implementation of Tamias to Check Production Rules for Parsing Expression Grammar.
J. Robotics Netw. Artif. Life, 2019

Application of Pairwise Testing into BWDM which is a Test Case Generation Tool for the VDM++ Specification.
J. Robotics Netw. Artif. Life, 2019

Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker.
Int. J. Netw. Comput., 2019

HMD-based cover test system for the diagnosis of ocular misalignment.
Artif. Life Robotics, 2019

Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic.
Artif. Life Robotics, 2019

Evaluation of Manual Alphabets Based Gestures for a User Authentication Method Using s-EMG.
Proceedings of the Advances in Networked-based Information Systems, 2019

Gait-Based Authentication for Smart Locks Using Accelerometers in Two Devices.
Proceedings of the Advances in Networked-based Information Systems, 2019

Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift Rule.
Proceedings of the Advances in Networked-based Information Systems, 2019

Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files.
Proceedings of the Advances in Networked-based Information Systems, 2019

Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart Lock.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

2018
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time.
J. Robotics Netw. Artif. Life, 2018

A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method.
J. Inf. Process., 2018

Evaluation of Farmers Market Information System to Connect with Some Social Stakeholders.
J. Inf. Process., 2018

On applying support vector machines to a user authentication method using surface electromyogram signals.
Artif. Life Robotics, 2018

Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG.
Proceedings of the Advances in Network-Based Information Systems, 2018

Interactive Video CAPTCHA for Better Resistance to Automated Attack.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

An Examination of Pairing Method with Camera and Acceleration Sensor.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

A Proposal of New Reading Text CAPTCHA using Random Dot Patterns.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks.
Proceedings of the Advances in Internet, 2018

Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance.
Proceedings of the Advances in Internet, 2018

A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG.
Proceedings of the Advances in Internet, 2018

Evaluation of Index Poisoning Method in Large Scale Winny Network.
Proceedings of the Advances in Internet, 2018

2017
BWDM: Test Cases Automatic Generation Tool Based on Boundary Value Analysis with VDM++.
J. Robotics Netw. Artif. Life, 2017

Development of a Tool to Keep Consistency between a Model and a Source Code in Software Development Using MDA.
J. Robotics Netw. Artif. Life, 2017

Evaluation of feature values of surface electromyograms for user authentication on mobile devices.
Artif. Life Robotics, 2017

Novel Unsupervised SPITters Detection Scheme by Automatically Solving Unbalanced Situation.
IEEE Access, 2017

Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method.
Proceedings of the Advances in Network-Based Information Systems, 2017

Evaluation and Improvement of Farmers Market Information System to Connect with Some Social Stakeholders.
Proceedings of the Advances in Network-Based Information Systems, 2017

Empirical Evaluation of Rhythm-Based Authentication Method for Mobile Devices.
Proceedings of the Advances in Network-Based Information Systems, 2017

Development of a Monitoring System Based on Power Consumption.
Proceedings of the Advances in Network-Based Information Systems, 2017

2016
SGM: A Subgroup Management Scheme Using K-Means Clustering in M2M Systems.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Unsupervised SPITters Detection Scheme for Unbalanced Callers.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
An Authentication Method Independent of Tap Operation on the Touchscreen of a Mobile Device.
J. Robotics Netw. Artif. Life, 2015

Security Evaluation System for Android Applications Using User's Reviews and Permissions.
J. Robotics Netw. Artif. Life, 2015

Prototype of a Supporting Tool to Generate Testing Communication Diagram.
J. Robotics Netw. Artif. Life, 2015

Prototype of a Decision Table Generation Tool from the Formal Specification.
J. Robotics Netw. Artif. Life, 2015

TFVIS: a Supporting Debugging Tool for Java Programs by Visualizing Data Transitions and Execution Flows.
J. Robotics Netw. Artif. Life, 2015

Proposal of a Testing Method Using Similarity of Interleaving for Java Multi-threaded Programs.
J. Robotics Netw. Artif. Life, 2015

Proposal of a Modification Method of a Source Code to Correspond with a Modified Model in MDA.
J. Robotics Netw. Artif. Life, 2015

Proposal and Its Evaluation of Neighbors Based Routing for ad hoc networks.
J. Robotics Netw. Artif. Life, 2015

Proposal of Rhythm Authentication Method Using Users Classification by Self-Organizing Map.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Study of Filter Sharing Method Using Virtual Peers in P2P Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Content Access Control Scheme for P2P Networks Using a Reputation Value.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Proposal of a Method to Build Markov Chain Usage Model from UML Diagrams for Communication Delay Testing in Distributed Systems.
J. Robotics Netw. Artif. Life, 2014

Proposal of a Supporting Method to Generate a Decision Table from the Formal Specification.
J. Robotics Netw. Artif. Life, 2014

Proposal of a Visualizing Method of Data Transitions to Support Debugging for Java Programs.
J. Robotics Netw. Artif. Life, 2014

Proposal of a Supporting Method for Debugging to Reproduce Java Multi-threaded Programs by Petri-net.
J. Robotics Netw. Artif. Life, 2014

Representation of human preference using folksonomy and the idea called concept.
Artif. Life Robotics, 2014

Proposal of a Puzzle Authentication Method with Shoulder-surfing Attack Resistance.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Investigation of the routing method based on the number of neighbor nodes.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014

2013
On a serendipity-oriented recommender system based on folksonomy.
Artif. Life Robotics, 2013

On a Serendipity-oriented Recommender System based on Folksonomy and its Evaluation.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013

A Conversion Method from an ETSC to a Timed Petri Net to Improve the Matrix-based Discrete Event Controller and its Unified Support System.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013

2006
A proposal and its evaluations of a re-keying system for dynamic secure group communications.
Syst. Comput. Jpn., 2006

A New User Authentication Protocol for Mobile Terminals in Wireless Network.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

Proposal for a Practical Cipher Communication Protocol That Can Coexist with NAT and Firewalls.
Proceedings of the Information Networking, 2006

2004
A Proposal and its Evaluations of a Re-keying Method for Dynamic Secure Group Communications.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004


  Loading...