Research Project
Grant-in-Aid for Young Scientists (B)
情報流出事故を引き起こす不正アクセスを検知するために,ソフトウエアの挙動をネットワークトラヒックから推定し,プロトコルヘッダなどが改竄された場合でも適切に動作可能なトラヒックの解析・評価方式を構築した.
All 2009 2008 2007
All Journal Article (12 results) (of which Peer Reviewed: 12 results) Presentation (5 results)
SECURITY AND COMMUNICATION NETWORKS Vol.2
Pages: 11-28
SECURITY AND COMMUNICATION NETW ORKS 2
Proc. of WCNC Globecom CDROM
Proc. of Globecom CDROM
IEEE WCNC 2008 (CDROM)
IEEE Globecom 2008 (CDROM)
Proc. of IEEE Wireless Rural and Emergency Communications Conference CDROM
電子情報通信学会論文誌B 90-B, No.7
Pages: 660-669
110007379003
Proc. of 2007 IEEE International Conference on Communications CDROM
Proc. of IEEE Wireless Rural and Emergency Communications Conference (CDROM)
Proc. of 2007 IEEE International Conference on Communications (CDROM)