dblp.uni-trier.dewww.uni-trier.de

Nobutaka Kawaguchi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
8EENobutaka Kawaguchi, Hiroshi Shigeno, Kenichi Okada: A Distributed Detection of Hit-List Worms. ICC 2008: 1566-1572
2007
7EENobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada: Detection of Silent Worms using Anomaly Connection Tree. AINA 2007: 412-419
6EETaro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada: Early containment of worms using dummy addresses and connection trace back. ICPADS 2007: 1-8
5EENobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada: d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms. IPCCC 2007: 510-517
2006
4EEShintaro Ueda, Shin-ichiro Kaneko, Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada: Authenticating Video Streams. AINA (1) 2006: 863-868
3EENobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada: ACTM: Anomaly Connection Tree Method to detect Silent Worms. AINA (1) 2006: 901-908
2005
2EENobutaka Kawaguchi, Shintaro Ueda, Naohiro Obata, Hiroshi Shigeno, Ken-ichi Okada: An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication. AINA 2005: 253-256
2004
1EEShintaro Ueda, Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada: Stream Authentication Scheme for the use over the IP Telephony. AINA (2) 2004: 164-169

Coauthor Index

1Yusuke Azuma [3]
2Taro Inaba [6]
3Shin-ichiro Kaneko [4]
4Naohiro Obata [2]
5Ken-ichi Okada [1] [2] [3] [4] [5] [6] [7]
6Kenichi Okada [8]
7Hiroshi Shigeno [1] [2] [3] [4] [5] [6] [7] [8]
8Shinya Tahara [6]
9Shintaro Ueda [1] [2] [3] [4]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)