2008 |
8 | EE | Nobutaka Kawaguchi,
Hiroshi Shigeno,
Kenichi Okada:
A Distributed Detection of Hit-List Worms.
ICC 2008: 1566-1572 |
2007 |
7 | EE | Nobutaka Kawaguchi,
Hiroshi Shigeno,
Ken-ichi Okada:
Detection of Silent Worms using Anomaly Connection Tree.
AINA 2007: 412-419 |
6 | EE | Taro Inaba,
Nobutaka Kawaguchi,
Shinya Tahara,
Hiroshi Shigeno,
Ken-ichi Okada:
Early containment of worms using dummy addresses and connection trace back.
ICPADS 2007: 1-8 |
5 | EE | Nobutaka Kawaguchi,
Hiroshi Shigeno,
Ken-ichi Okada:
d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms.
IPCCC 2007: 510-517 |
2006 |
4 | EE | Shintaro Ueda,
Shin-ichiro Kaneko,
Nobutaka Kawaguchi,
Hiroshi Shigeno,
Ken-ichi Okada:
Authenticating Video Streams.
AINA (1) 2006: 863-868 |
3 | EE | Nobutaka Kawaguchi,
Yusuke Azuma,
Shintaro Ueda,
Hiroshi Shigeno,
Ken-ichi Okada:
ACTM: Anomaly Connection Tree Method to detect Silent Worms.
AINA (1) 2006: 901-908 |
2005 |
2 | EE | Nobutaka Kawaguchi,
Shintaro Ueda,
Naohiro Obata,
Hiroshi Shigeno,
Ken-ichi Okada:
An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication.
AINA 2005: 253-256 |
2004 |
1 | EE | Shintaro Ueda,
Nobutaka Kawaguchi,
Hiroshi Shigeno,
Ken-ichi Okada:
Stream Authentication Scheme for the use over the IP Telephony.
AINA (2) 2004: 164-169 |