Nobutaka Kawaguchi

According to our database1, Nobutaka Kawaguchi authored at least 25 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the Deployment Control and Runtime Monitoring of Containers Based on Consumer Side SBOMs.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
An Extraction and Validity Evaluation Method Proposal for Monitoring Points for In-Vehicle Systems: Deriving Cybersecurity Requirements.
IEEE Veh. Technol. Mag., 2023

Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of CTI Sources.
J. Inf. Process., 2023

Stargazer: Long-Term and Multiregional Measurement of Timing/ Geolocation-Based Cloaking.
IEEE Access, 2023

2022
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs.
Proceedings of the Advances in Information and Computer Security, 2022

HOUND: Log Analysis Support for Threat Hunting by Log Visualization.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

Design and Implementation of System for URL Signature Construction and Impact Assessment.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

2021
Verification of the Effectiveness to Monitor Darknet across Multiple Organizations.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

2020
Continuous and Multiregional Monitoring of Malicious Hosts.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2017
Locating victims of destructive targeted attacks based on Suspicious Activity Spike Train.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

2016
Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Building suspiciousness cascading graph over multiple hosts for detecting targeted attacks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2011
Hit-list Worm Detection Using Distributed Sliding Window.
J. Inf. Process., 2011

Simulation of Anti-malware User Support System Using Queuing Network Model.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

2010
Enhancing Network Based Bot Detection with Contextual Information.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

2008
d-ACTM/VT: A Distributed Virtual AC Tree Detection Method.
Inf. Media Technol., 2008

A Distributed Detection of Hit-List Worms.
Proceedings of IEEE International Conference on Communications, 2008

2007
d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Early containment of worms using dummy addresses and connection trace back.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

Detection of Silent Worms using Anomaly Connection Tree.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A Real-Time Stream Authentication Scheme for Video Streams.
Inf. Media Technol., 2006

Authenticating Video Streams.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

ACTM: Anomaly Connection Tree Method to detect Silent Worms.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Stream Authentication Scheme for the use over the IP Telephony.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004


  Loading...