| 2008 |
| 8 | EE | Nobutaka Kawaguchi,
Hiroshi Shigeno,
Kenichi Okada:
A Distributed Detection of Hit-List Worms.
ICC 2008: 1566-1572 |
| 2007 |
| 7 | EE | Nobutaka Kawaguchi,
Hiroshi Shigeno,
Ken-ichi Okada:
Detection of Silent Worms using Anomaly Connection Tree.
AINA 2007: 412-419 |
| 6 | EE | Taro Inaba,
Nobutaka Kawaguchi,
Shinya Tahara,
Hiroshi Shigeno,
Ken-ichi Okada:
Early containment of worms using dummy addresses and connection trace back.
ICPADS 2007: 1-8 |
| 5 | EE | Nobutaka Kawaguchi,
Hiroshi Shigeno,
Ken-ichi Okada:
d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms.
IPCCC 2007: 510-517 |
| 2006 |
| 4 | EE | Shintaro Ueda,
Shin-ichiro Kaneko,
Nobutaka Kawaguchi,
Hiroshi Shigeno,
Ken-ichi Okada:
Authenticating Video Streams.
AINA (1) 2006: 863-868 |
| 3 | EE | Nobutaka Kawaguchi,
Yusuke Azuma,
Shintaro Ueda,
Hiroshi Shigeno,
Ken-ichi Okada:
ACTM: Anomaly Connection Tree Method to detect Silent Worms.
AINA (1) 2006: 901-908 |
| 2005 |
| 2 | EE | Nobutaka Kawaguchi,
Shintaro Ueda,
Naohiro Obata,
Hiroshi Shigeno,
Ken-ichi Okada:
An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication.
AINA 2005: 253-256 |
| 2004 |
| 1 | EE | Shintaro Ueda,
Nobutaka Kawaguchi,
Hiroshi Shigeno,
Ken-ichi Okada:
Stream Authentication Scheme for the use over the IP Telephony.
AINA (2) 2004: 164-169 |