Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Tomohiro Shigemoto"'
Autor:
Daisuke Tsuji, Junya Fujita, Noritaka Matsumoto, Yu Tamura, Jens Doenhoff, Tomohiro Shigemoto
Publikováno v:
SICE Journal of Control, Measurement, and System Integration, Vol 16, Iss 1, Pp 63-74 (2023)
Cyberattacks against Industrial Control Systems (ICS), which play a crucial role in many industrial domains, could bring environmental and safety damages as well as huge economic loss. To decrease such cybersecurity risks, it is needed to improve the
Externí odkaz:
https://doaj.org/article/4066fecf092848f0a9408c4731f96fdf
Autor:
Shota Fujii, Takayuki Sato, Sho Aoki, Yu Tsuda, Nobutaka Kawaguchi, Tomohiro Shigemoto, Masato Terada
Publikováno v:
IEEE Access, Vol 11, Pp 52750-52762 (2023)
Malicious hosts have come to play a significant and varied role in today’s cyber attacks. Some of these hosts are equipped with a technique called cloaking, which discriminates between access from potential victims and others and then returns malic
Externí odkaz:
https://doaj.org/article/af7fb654b05845f7950feefd5701973a
Publikováno v:
IEICE Communications Express. 11:829-834
Publikováno v:
2022 12th International Congress on Advanced Applied Informatics (IIAI-AAI).
Publikováno v:
Advances in Information and Computer Security ISBN: 9783031152542
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ec3e28ef71bc9a6f90afa56bfc178910
https://doi.org/10.1007/978-3-031-15255-9_5
https://doi.org/10.1007/978-3-031-15255-9_5
Autor:
Katsuya Nishijima, Takao Kondo, Tatsumi Hosokawa, Tomohiro Shigemoto, Nobutaka Kawaguchi, Hiroyuki Hasegawa, Hideyuki Honda, Yasuhito Suzuki, Tadashi Kaji, Osamu Nakamura
Publikováno v:
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW).
Autor:
Takayuki Sato, Tomohiro Shigemoto, Nobutaka Kawaguchi, Yu Tsuda, Shota Fujii, Yusuke Okano, Masato Terada, Aoki Sho
Publikováno v:
CCS
The number of cybersecurity threats has been increasing, and these threats have become more sophisticated year after year. Malicious hosts play a large role in modern cyberattacks, e.g., as a launcher of remote-control attacks or as a receiver of sto
Autor:
Tomohiro Shigemoto, Yasuhiro Fujii, Hiroaki Kikuchi, Shota Fujii, Hirofumi Nakakoji, Ichiro Kuriama, Tetsuro Kito
Publikováno v:
AsiaJCIS
In order to minimize the damage caused by Remote Access Tool (RAT) malware used in targeted attacks, various countermeasures such as the black list and white list approaches have been developed. In the black list approach, we manage servers where the
Autor:
Naoki Shimotsuma, Hirofumi Nakakoji, Hiroaki Kikuchi, Tetsuro Kito, Nobutaka Kawaguchi, Yoshiaki Isobe, Tomohiro Shigemoto, Yasuhiro Fujii, Naoki Hayashi
Publikováno v:
NBiS
In recent years, the damage from cyber attacks caused by sophisticated malware has continuously increased. It is therefore becoming more difficult to take countermeasures using traditional approaches such as antivirus and firewall products. Against t
Autor:
Hirofumi Nakakoji, Tetsuro Kito, Kazuya Okochi, Nobutaka Kawaguchi, Tomohiro Shigemoto, Masato Terada
Publikováno v:
2010 6th IEEE Workshop on Secure Network Protocols.
As P2P (Peer-to-Peer) file sharing software is widely deployed, it causes some serious problems, such as network traffic congestion, unwanted file sharing by computer viruses that abuse P2P software, and so on. Detecting and controlling traffic of P2