Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Glenn Mansfield-Keeni"'
Publikováno v:
2018 5th International Conference on Business and Industrial Research (ICBIR).
Internet threat monitoring (ITM) has been extensively performed by several organizations. To effectively analyze and grasp the trends of various security threats on the Internet, efficient analysis and event detection from traffic observed by ITM s
Autor:
Glenn Mansfield Keeni, Hiroshi Tsunoda
Publikováno v:
IWCMC
In the Internet of Things (IoT) concept, devices communicate autonomously with applications in the Internet. A significant aspect of IoT that makes it stand apart from present day networked devices and applications is a) the very large number of devi
Autor:
Hiroki Nishiyama, Yuji Waizumi, Hiroshi Tsunoda, Akihiro Suzuki, Glenn Mansfield Keeni, Hideliisa Nakayama, Yoshiaki Nemoto, Ryoichi Nagatomi, K. Hashimoto, Kohei Ohta
Publikováno v:
Scopus-Elsevier
In recent years, there has been a rise in epidemiological evidence suggesting the health benefits of a physically active lifestyle. However, it is not always easy for individuals to personally recognize the optimal conditions for exercise and physica
Publikováno v:
Journal of Communications and Networks. 12:382-394
Cross-domain event information sharing is a topic of great interest in the area of event based network management. In this work we use data sets which represent actual attacks in the operational Internet. We analyze the data sets to understand the dy
Publikováno v:
Computers & Security. 29:383-392
IP traceback is used to determine the source and path traversed by a packet received from the Internet. In this work we first show that the Source Path Isolation Engine (SPIE), a classical log-based IP traceback system, can return misleading attack g
Autor:
Kohei Ohta, Glenn Mansfield Keeni
Publikováno v:
Interdisciplinary Information Sciences. 12:173-178
In this paper, we outline a brief history of technologies against Internet-wide threats, especially DDoS attacks, and enumerate the requirements of wide area and cross-organization collaboration mechanism. Subsequently we introduce IODEF, which is un
Autor:
Hiroki Kamiyama, Debasish Chakraborty, Kazuhide Koide, Glenn Mansfield Keeni, Gen Kitagata, Norio Shiratori
Publikováno v:
IEICE Transactions on Communications. :4481-4489
The advent of mobile IP communication has opened up several new areas of mission critical communication applications. But the bandwidth and reliability constraints coupled with handover latency are posing some hurdles which need to be overcome before
Autor:
Glenn Mansfield Keeni, Hiroshi Tsunoda
Publikováno v:
NOMS
The quality and nature of statistics obtained from network monitoring and management have significant implications in accounting, operations, security and quality of service management. In this paper, we take a closer look at the requirements of moni
Autor:
Kohei Ohta, Naoki Nakamura, Glenn Mansfield Keeni, Norio Shiratori, Hiroshi Tsunoda, Satoru Izumi, Masahiro Matsuda, Takuo Suganuma
Publikováno v:
GCCE
In this paper, we propose a 6 type items model of Green-oriented Management Information Base (G-MIB) to monitor the network device status and aim it for standardization in IETF. The G-MIB has versatility and is easy to implement. Thus, the G-MIB has
Autor:
Hiroshi Tsunoda, Kohei Ohta, Yuji Waizumi, Yoshiaki Nemoto, Glenn Mansfield Keeni, Takafumi Maruyama
Publikováno v:
CNSR
Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes,