#author("2024-07-14T09:34:13+00:00","Kinako","Kinako") #contents --- *Çî»Î³Ø°ÌÏÀʸ [#d43b0051] **2021ǯÅÙ [#e47807c0] ***2022ǯ3·î [#wb92f1d8] ´Ø¸ýδ¾¼, ''¥«¡¼¥Ê¥Ó¥²¡¼¥·¥ç¥ó¤Î¤¿¤á¤ÎÃÏÍý¶õ´Ö¾ðÊó¤ÎÅÁã¤Ë´Ø¤¹¤ë¸¦µæ'' Koki Hamada, ''Algorithms for Stable Matching Problems toward Real-World Applications'' **2019ǯÅÙ [#ib6b9c65] ***2020ǯ3·î [#pa4432fe] ¾âËÜÍÌ, ''Web¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤ËÂФ¹¤ë¥µ¥¤¥Ð¡¼¹¶·â¤Î¸úΨŪ¤Ê¸¡ÃÎ'' **2018ǯÅÙ [#i5779c8d] ***2019ǯ3·î [#n9683aef] »û²¬½¨ÉÒ, ''¥Í¥Ã¥È¥ï¡¼¥¯Àܳ¤µ¤ì¤¿Áȹþ¤ß¥·¥¹¥Æ¥à¤Î³ÈÄ¥À¤Ë´Ø¤¹¤ë¸¦µæ'' ***2018ǯ11·î [#x4d94151] À¶¿å¤µ¤ä»Ò, ''Âç³Ø¤Ë¤ª¤±¤ë¥¢¥¯¥»¥¹¥Þ¥Í¥¸¥á¥ó¥È¤Ë´Ø¤¹¤ë¸¦µæ'' **2017ǯÅÙ [#pcf5ba2c] ***2017ǯ5·î [#ib8955ec] ¾¾ËÜμ²ð, ''Web¥µ¡¼¥Ð¤Î¹â½¸ÀÑ¥Þ¥ë¥Á¥Æ¥Ê¥ó¥È¥¢¡¼¥¥Æ¥¯¥Á¥ã¤Ë´Ø¤¹¤ë¸¦µæ'' **2016ǯÅÙ [#n7822095] ***2017ǯ3·î [#e1dd9f62] Èþ¸¶µÁ¹Ô, ''¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯´ÉÍýµ»½Ñ¤È±þÍÑ¥µ¡¼¥Ó¥¹¤Ë´Ø¤¹¤ë¸¦µæ'' **2015ǯÅÙ [#b29dfc5c] ***2016ǯ3·î [#rc08250e] Daisuke Kotani, ''Stability and Robustness of Control Planes in OpenFlow Networks'' **2014ǯÅÙ [#xf627717] ***2014ǯ7·î [#a500ab68] Naoyuki Morimoto, ''Design and Analysis of Algorithms for Graph Exploration and Resource Allocation Problems and Their Application to Energy Management'' **2011ǯÅÙ [#uaa98d61] ***2011ǯ7·î [#dc0c9786] Mitsuo Okada, ''Asymmetric and Pseudo-Blind Digital Watermarking for Fair and Privacy-Secure Digital Content Trading'' **2010ǯÅÙ [#pb51ca40] ***2011ǯ3·î [#rfd7c022] Kazuya Suzuki, ''Studies on Network Monitoring Systems to Reveal Suspicious Activities'' ***2010ǯ7·î [#ad51bac1] ÂçÊ¿·ò»Ê, ''¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÀܳ¤ÎÄã´ÉÍý¥³¥¹¥È¤Ê±¿ÍѤ˴ؤ¹¤ë¸¦µæ'' // (Studies on Low-Cost Management and Operation of Internet Connection) ´Ý»³¿, ''ʬ»¶²½¡¦¾éĹ²½¤òÍѤ¤¤¿¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥à¤Î¹â¿®Íê²½¤Ë´Ø¤¹¤ë¸¦µæ'' **2008ǯÅÙ [#rc400f87] ***2009ǯ3·î [#s6f5d86e] Koji Kobayashi, ''Competitive Analysis of Online Problems on Networks'' Jungsuk Song, ''Studies on High-Performance Network Intrusion Detection System Based on Unsupervised Machine Learning'' *½¤»ÎÏÀʸ [#m3dbab1a] **2023ǯÅÙ [#if11b1a7] ¹¾Ê¿ ÃÒÇ·, ''Distributed Tracing for Cascading Changes of Objects in the Kubernetes Control Plane'' Kubernetes À©¸æ¥×¥ì¡¼¥ó¤Ë¤ª¤±¤ë¥ª¥Ö¥¸¥§¥¯¥È¤ÎÏ¢º¿ÅªÊѹ¹¤Îʬ»¶¥È¥ì¡¼¥·¥ó¥°¼êË¡¡Ë Ê¿°æ ²í¿Í, ''Putting Authorization Serverson User-owned Devices in User-Managed Access'' ¡ÊUser-Managed Access¤Ë¤ª¤±¤ë¥æ¡¼¥¶½êͤÎüËö¤Îǧ²Ä¥µ¡¼¥Ð²½¡Ë üâÅè °ì¼ù, ''DDoS Attack Information Sharing Among CDNs Interconnected Through CDNI'' ¡ÊCDNI ¤òÄ̤·¤ÆÁê¸ßÀܳ¤µ¤ì¤¿ CDN ´Ö¤Ç͸ú¤ÊDDoS ¹¶·â¾ðÊó¶¦Í¼êË¡¡Ë ¼»³ ·òÂÀ, ''Detection of Communication Quality Degradation Based on Similarity Among Time Series Data of TCP Flows Using Passive Measurement'' ¡Ê¥Ñ¥Ã¥·¥Ö·×¬¤òÍѤ¤¤¿ TCP ¥Õ¥í¡¼¤Î»þ·ÏÎó¥Ç¡¼¥¿´Ö¤ÎÎà»÷Å٤˴ð¤Ä゙¤¯ÄÌ¿®ÉʼÁÎô²½¤Î¸¡ÃÎ¡Ë **2022ǯÅÙ [#ua3fcd25] »ûÅÄ ·òÂÀ, ''Breaking Puzzle-Based CAPTCHAs by CNN'' ¡Ê¥Ñ¥º¥ë·¿CAPTCHA¤ËÂФ¹¤ëCNN¤Ë¤è¤ëÆÍÇË¡Ë ßÀÅç ·½Í¤, ''Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents'' ¡Ê¥Þ¥ë¥¦¥§¥¢Æ°Åª²òÀϤˤª¤±¤ë¥Õ¥¡¥¤¥ëÆâÍƤòÈëÆ¿¤·¤¿ÉôʬŪ¤Ê³°Éô°ÑÂ÷¡Ë ¾¾ËÜ Ä¾¼ù, ''Reducing Data Transfer with Binary Delta Encoding in Container Image Updating'' ¡Ê¥³¥ó¥Æ¥Ê¥¤¥á¡¼¥¸¹¹¿·¤Ë¤ª¤±¤ë¥Ð¥¤¥Ê¥êº¹Ê¬Éä¹æ¤Ë´ð¤Å¤¯¥Ç¡¼¥¿Å¾Á÷Î̺︺¡Ë ¿åë ¹äÂç ''Visibility of Attack-related Traffic Trends in Sparsely Populated Darknets'' ¡Ê¾®µ¬ÌÏ¥À¡¼¥¯¥Í¥Ã¥È·²¤òÍѤ¤¤¿¹¶·â´ØÏ¢¥È¥é¥Õ¥£¥Ã¥¯¤Î·¹¸þ¤Î²Ä»ëÀ¡Ë **2021ǯÅÙ [#l4686963] ¾®ÎÓ²íµ¨, ''Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities'' ¡ÊÀȼåÀ¤ÎPoC¥³¡¼¥É¤Ë¤ª¤±¤ëÌÖÍåŪ¤Ê¼Â¹Ô¥Ñ¥¹Ãµº÷¤Ë¤è¤ëIDS ¤Î¥·¥°¥Í¥Á¥ãÀ¸À®¡Ë º´ÃÝÀ¿, ''Competitive Analysis for the Online Facility Assignment Problem on a Line'' ¡ÊľÀþ¾å¤Î¥ª¥ó¥é¥¤¥ó»ÜÀß³äÅöÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ¡Ë È«»³¹·Âç, ''Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication'' ¡Ê¸ø³«¸°Ç§¾Ú¤Ë¤ª¤±¤ëÊ£¿ôǧ¾Ú´ï¤Î½êͼԤ˴ð¤Å¤¯¸°´ÉÍý¡Ë **2020ǯÅÙ [#cdcbc847] ±»ËÜÂóÌé, ''Analysis of AS-Level Maps of the Internet Focusing on Placement of Vantage Points'' ¡ÊVantage Point¤ÎÇÛÃÖ¤ËÃå⽬¤·¤¿AS¥ì¥Ù¥ë¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥Þ¥Ã¥×¤Î²òÀÏ¡Ë ÂçÀ¾·ûÂÀϺ, ''Network Control in a Cloud Platform Using Identities of Workloads'' ¡Ê¥¯¥é¥¦¥É´ðÈפˤª¤±¤ëWorkload ¤ÎIdentity ¤òÍѤ¤¤¿¥Í¥Ã¥È¥ï¡¼¥¯À©¸æ¡Ë À¾²¬¹¬Íè, ''Mutual Secrecy of Attributes and Authorization Policies in Identity Federation'' ¡Êǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë°ÀÃͤÈǧ²Ä¾ò·ï¤ÎÁê¸ßÈëÆ¿¡Ë **2019ǯÅÙ [#ycc3e6da] ¹Ó°æµ£, ''Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning'' ¡Ê¥¯¥é¥¦¥É·¿CAPTCHA¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ëµ¡³£³Ø½¬¤òÍѤ¤¤¿¥Ü¥Ã¥È¤Î¸¡ÃÎ¡Ë ¾¾»³Í´µ®, ''Generating Stable Marriage Instances with Optimal Solutions'' ¡Ê°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ëºÇŬ²òÉÕ¤ÎãÂêÀ¸À®¡Ë ÍûÅìÍÛ, ''Improving Attack Detection Performance in NIDS Using GAN'' ¡ÊŨÂÐŪÀ¸À®¥Í¥Ã¥È¥ï¡¼¥¯(GAN)¤òÍѤ¤¤¿¥Í¥Ã¥È¥ï¡¼¥¯¿¯Æþ¸¡ÃÎ¥·¥¹¥Æ¥à(NIDS) ¤Î¹¶·â¸¡ÃÎÀǽ²þÁ±¡Ë **2018ǯÅÙ [#lc22e169] ß·ÅijÊ, ''Network Routing Optimization Based on Machine Learning Using Graph Networks Robust against Topology Change'' ¡Ê¥È¥Ý¥í¥¸¡¼ÊѲ½¤ËÂбþ¤Ç¤¤ë¥°¥é¥Õ¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿µ¡³£³Ø½¬¤Ë´ð¤Å¤¯¥Í¥Ã¥È¥ï¡¼¥¯·ÐÏ©ºÇŬ²½¡Ë **2017ǯÅÙ [#tc486535] ½©µÈμ, ''Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet'' ¡ÊÄãÂÐÏ÷¿¥Ï¥Ë¡¼¥Ý¥Ã¥È¤È¥À¡¼¥¯¥Í¥Ã¥È¤Î´ØÏ¢ÉÕ¤±¤Ë¤è¤ë¿·¤¿¤ÊÂ絬ÌÏ¥¹¥¥ã¥ó³èÆ°¤Î¸¡ÃÎ¡Ë ¾®´ä¹îµ±, ''A Low-Interaction Honeypot Observing Attacks against HTTP/2'' ¡ÊHTTP/2¤ËÂФ¹¤ë¹¶·â¤ò´Ñ¬¤¹¤ëÄãÂÐÏ÷¿¥Ï¥Ë¡¼¥Ý¥Ã¥È¤Î¹½ÃÛ¡Ë ½¡¸÷Íã, ''Tunneling-based Network Traffic Engineering Using Mixed Integer Programming'' ¡Êº®¹çÀ°¿ô·×²èË¡¤òÍøÍѤ·¤¿¥È¥ó¥Í¥ê¥ó¥°¤Ë¤è¤ë¥È¥é¥Õ¥£¥Ã¥¯¥¨¥ó¥¸¥Ë¥¢¥ê¥ó¥°¡Ë »³ºê·¼ÂÀϺ, ''Xilara: An XSS Filter Based on HTML Template Restoration'' ¡ÊXilara: HTML¥Æ¥ó¥×¥ì¡¼¥È¤ÎÉü¸µ¤òÍѤ¤¤ëXSS¥Õ¥£¥ë¥¿¡Ë **2016ǯÅÙ [#vd6596e0] °Ëƣͧ¹À, ''A Threshold-based Authentication System Which Provides Attributes Using Secret Sharing'' ¡Ê°À¾ðÊó¤òÈë̩ʬ»¶¤·¤¿ïçÃÍ·¿Ç§¾Ú¥·¥¹¥Æ¥à¡Ë ·¬¸¶µ®ÌÀ, ''Mitigating Flooding DDoS Attacks with Per-Service Bandwidth Control at Firewalls'' ¡Ê¥Õ¥¡¥¤¥¢¥¦¥©¡¼¥ë¤Ë¤ª¤±¤ë¥µ¡¼¥Ó¥¹Ã±°Ì¤ÎÂÓ°èÀ©¸æ¤Ë¤è¤ë¥Õ¥é¥Ã¥É·¿DDoS ¹¶·â¤Ø¤ÎÂкö¡Ë ¹âȫͪ, ''An Anonymous Distributed Electronic Voting System Using Zerocoin'', ¡ÊZerocoin ¤òÍøÍѤ·¤¿Æ¿Ì¾Ê¬»¶·¿ÅÅ»ÒÅêɼ¥·¥¹¥Æ¥à¡Ë **2014ǯÅÙ [#r70136e3] //***2015ǯ3·î [#lff519e2] ÅÄÅç¾Èµ×, ''Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN'' ¡Ê̵ÀþLAN¤Ë¤ª¤±¤ëWebÂδ¶ÉʼÁ¸þ¾å¤Î¤¿¤á¤Î¥Ñ¥±¥Ã¥ÈÁ÷¿®À©¸æºÇŬ²½¡Ë ÄÔÈø¾°¼ù, ''A Traceable and Pseudonymous P2P Information Distribution System'' ¡Êȯ¿®¼ÔÄÉÀײÄǽ¤Ê²¾Ì¾·¿ P2P ¾ðÊóȯ¿®¥·¥¹¥Æ¥à¡Ë Andrew Lee, ''The Minimum Diameter Multiple Steiner Tree Problem for Embedding Multiple VLANs'' ¡ÊÊ£¿ôVLANËä¤á¹þ¤ß¤Î¤¿¤á¤ÎºÇ¾®Ä¾·ÂÊ£¿ô¥¹¥¿¥¤¥Ê¡¼ÌÚÌäÂê¡Ë **2013ǯÅÙ [#q03677b8] //***2014ǯ3·î [#m130557e] ÄÛÆâ¾Ç·, ''Digital Watermarking Method on Executable Files for Tracking Illegal Uploaders'' ¡Ê¥½¥Õ¥È¥¦¥§¥¢ÉÔÀµ¥¢¥Ã¥×¥í¡¼¥É¼ÔÄÉÀפΤ¿¤á¤Î¼Â¹Ô·Á¼°¥Õ¥¡¥¤¥ë¤Ø¤ÎÅÅ»ÒÆ©¤«¤·ÁÞÆþ¡Ë **2012ǯÅÙ [#v00b80ca] ***2013ǯ3·î [#uf892044] ²¬ËÜÂç¼ù, ''Cooperative Load Distribution for Addressing Flash Crowds Using PsP File Sharing Network'' ¡ÊP2P¥Õ¥¡¥¤¥ë¶¦Í¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿¥Õ¥é¥Ã¥·¥å¥¯¥é¥¦¥ÉÂÑÀ¤Î¤¢¤ë¶¨Ä´·¿Éé²Ùʬ»¶¼êË¡¡Ë »ûËÜÂÙÂç, ''Managing networks independently of the physical topology by Service Defined Network'' ¡ÊService Defined Network¡Ê£Ó£ö£Ä£Î¡Ë¤Ë¤è¤ëʪÍý¹½À®¤Ë°Í¸¤·¤Ê¤¤¥Í¥Ã¥È¥ï¡¼¥¯´ÉÍý¡Ë ²£È«À¿Ìé, ''An Extension and Evaluation of Power over Ethernet for on-Demand Power Supply'' ¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎ϶¡µë¤Î¤¿¤á¤ÎPower over Ethernet¤Î³ÈÄ¥¡Ë ***2012ǯ9·î [#aefd6cdc] ¾®Ã«ÂçÍ´, ''Stable handling of heavy flows in OpenFlow networks'' ¡Ê£Ï£ð£å£î£Æ£ì£ï£÷¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¹â¥È¥é¥Õ¥£¥Ã¥¯¤Ê¥Õ¥í¡¼¤Î°ÂÄêŪ¤Ê½èÍý¡Ë **2011ǯÅÙ [#s1140f39] Âç¿À¾Ä, ''Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation'' ¡Ê¥»¥¥å¥¢¤ÊID ÊÑ´¹¤Ë¤è¤ëSAMLÏ¢·È¤Ë¤ª¤±¤ë¸Ä¿Í¾ðÊó¤ÎµÕή½Ð¤Ë ÂФ¹¤ë²¾Ì¾ÀÊݸî¡Ë ¹â¶¶¶Ç¹°, ''Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol'' ¡ÊHost Identity Protocol¤òÍѤ¤¤¿¥»¥¥å¥¢¤Ê¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥µ¡¼¥Ó¥¹¥â¥Ç¥ë¤ÎÀ߷פȼÂÁõ¡Ë µÜËÜÂöÌé, ''A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking'' ¡Ê²ÈÄíÆ⥪¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤Ë¤ª¤±¤ëGMPLS·¿ÅÅÎÏ»ñ¸»Í½Ìó¥·¥¹¥Æ¥à¡Ë **2010ǯÅÙ [#v803446b] Àж¶Áï, ''Design and Implementation of a Certified Document Delivery System without a Trusted Intermediate Authority'' ¡Ê¿®Íê¤Ç¤¤ëÃç²ð¼Ô¤òɬÍפȤ·¤Ê¤¤ÅÅ»Òʸ½ñÇÛã¾ÚÌÀ¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ¡Ë ¼ÆÅÄÃε±, ''The Design and Implementation of an Energy On-Demand DC Grid in Home'' ¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâľήÁ÷ÅÅÌÖ¤ÎÀ߷פȼÂÁõ¡Ë ÀÐÅÄÊݵ±, ''High-Performance Intrusion Detection Using OptiGrid and Grid-Based Labelling'' ¡ÊOptiGrid¥¯¥é¥¹¥¿¥ê¥ó¥°¤È¥°¥ê¥Ã¥É¤òÍøÍѤ·¤¿¥é¥Ù¥ê¥ó¥°¤Ë¤è¤ë¹âÀºÅ٤ʰ۾︡ÃÎ¡Ë **2009ǯÅÙ [#b3792ce5] ÃæÅÄ·ò²ð, ''An Analysis of Network IDS Alerts to Grasp Attack Situation'' ¡Ê¥Í¥Ã¥È¥ï¡¼¥¯·¿IDS¤Î¥¢¥é¡¼¥È²òÀϤˤè¤ë¹¶·â¾õ¶·¤ÎÇÄ°®¼êË¡¡Ë Ê¡ÅĹä»Î, ''Online Algorithms for the k-Canadian Traveller Problem on Restricted Graphs'' ¡ÊÀ©¸Â¤µ¤ì¤¿¥°¥é¥Õ¾å¤Ç¤Îk-Canadian Traveller Problem¤ËÂФ¹¤ë¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à¡Ë Æ£ËÜ·½, ''£Ñ£ï£Å£î(Quality of Energy)Power Routing toward Energy-on-Demand Home Network'' ¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤Î£Ñ£ï£Å£î(¥¨¥Í¥ë¥®¡¼ÉʼÁ)¤ò¹Íθ¤·¤¿·ÐÏ©À©¸æ¡Ë **2008ǯÅÙ [#t0f44fe4] À¶¿å·ÉÂÀ, ''Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange'' ¡ÊƱ»þÈëÌ©¸ò´¹¤òÍøÍѤ·¤¿ÇÛãÆâÍƾÚÌÀ¤¬²Äǽ¤ÊÅŻҥ᡼¥ë¥·¥¹¥Æ¥à¤ÎÀ߷פª¤è¤Ó¼ÂÁõ¡Ë Á°Àî·Ä»Ê, ''A Location Privacy Protection Framework with Mobility Using Host Identity Protocol'' ¡ÊHost Identity Protocol¤òÍѤ¤¤¿°ÜÆ°ÄÌ¿®¤Î¤¿¤á¤Î¥í¥±¡¼¥·¥ç¥ó¥×¥é¥¤¥Ð¥·Êݸî¥Õ¥ì¡¼¥à¥ï¡¼¥¯¡Ë **2007ǯÅÙ [#cb30a956] ¹âÌÚ½Ó¹¨, ''Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols'' ¡Ê¥Þ¥¸¥Ã¥¯¥×¥í¥È¥³¥ëÍøÍѤˤè¤ë¥×¥é¥¤¥Ð¥·¡¼¤ËÇÛθ¤·¤¿Shibboleth°À¸ò´¹¤Î³ÈÄ¥¡Ë Á°ÅÄÊþ¹§, ''Path Alternation in Real-Time Video Streaming using PR-SCTP'' ¡ÊPR-SCTP¤ò¤â¤Á¤¤¤¿¥ê¥¢¥ë¥¿¥¤¥à±ÇÁüÅÁÁ÷¤Ë¤ª¤±¤ë·ÐÏ©ÀÚ¤êÂؤ¨¡Ë ¿¹Ëܾ°Ç·, ''Improving Competitive Ratios for the Online Graph Exploration Problem'' ¡Ê¥ª¥ó¥é¥¤¥ó¥°¥é¥Õõº÷ÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ¤Î²þÎÉ¡Ë **2006ǯÅÙ [#z26e5f4a] ÂçÄíÈ»¿Í, ''Analysis of IDS Data over Large Scaled Open Networks and Its Visualization Utilizing Machine Learning'' ¡Ê³«Êü·¿Â絬Ìϥͥåȥ¥¯¤Ë¤ª¤±¤ëIDS¥í¥°¥Ç¡¼¥¿¤Î²òÀϤȵ¡³£³Ø½¬¤òÍѤ¤¤¿²Ä»ë²½¡Ë Æ£¸¶æÆ°ìϯ, ''A Privacy Enhanced Extension of Attribute Exchange in the SAML Framework and its Application to Shibboleth Authorization'' ¡ÊSAML¥Õ¥ì¡¼¥à¥ï¡¼¥¯¤Ë¤ª¤±¤ë°À¸ò´¹¤Î¥×¥é¥¤¥Ð¥·¡¼¤ò¶¯²½¤·¤¿³ÈÄ¥¤ª¤è¤Ó¤½¤ÎShibbolethǧ²Ä¤Ø¤ÎŬÍÑ¡Ë ÅÏÊÕ°ê·Ã, ''Design and Implementation of TCP-Friendly Multi-Path Streaming System'' ¡ÊÊ£¿ô·ÐÏ©¤ò³èÍѤ·¤¿TCP-Friendly¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ¡Ë **2005ǯÅÙ [#q12acf73] ¾®ÎÓ¹ÀÆó, ''Improving Competitive Ratios of Online Buffer Management for Shared-Memory Switches and Multi-Queue Switches'' ¡Ê¶¦Í¥á¥â¥ê·¿¥¹¥¤¥Ã¥Á¤È¥Þ¥ë¥Á¥¥å¡¼¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ª¥ó¥é¥¤¥ó¥Ð¥Ã¥Õ¥¡´ÉÍý¥¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ¤Î²þÎÉ¡Ë ÃæÌîË, ''Analysis for Topological Properties of Networks Feeding Netnews'' ¡Ê¥Í¥Ã¥È¥Ë¥å¡¼¥¹ÇÛÁ÷ÌÖ¤Î¥È¥Ý¥í¥¸¡¼¤Ë¤ª¤±¤ë½ôÀ¼Á¤Î²òÀÏ¡Ë **2004ǯÅÙ [#fcc66ecf] À¾Â¼Í´²ð, ''P2P¥Í¥Ã¥È¥ï¡¼¥¯¾å¤Ç¤Î¥ª¥ó¥é¥¤¥ó¥²¡¼¥à¤Î°ÂÁ´¤Ê¼Â¹Ô'' ²«±Ï, ''Secure Models of Autonomous Distributed Public Wireless Internet Access Services'' ¡Ê¼«Î§Ê¬»¶·¿¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¢¥¯¥»¥¹¥µ¡¼¥Ó¥¹¤Î¥»¥¥å¥ê¥Æ¥£¥â¥Ç¥ë¡Ë **2003ǯÅÙ [#i55f3770] ÂçÊ¿·ò»Ê, ''Address Assignment and Route Selection for IPv6 End-to-End Site Multihoming''¡ÊIPv6¤Ë¤ª¤±¤ë¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥µ¥¤¥È¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¼Â¸½¤Î¤¿¤á¤Î¥¢¥É¥ì¥¹³äÅö¤È·ÐÏ©ÁªÂò¡Ë ½ïÊý¾¡Ìé, ''Mobility Support for RSVP with IPv6 End-to-End Multihoming'' ¡ÊIPv6¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¤Ë¤è¤ëRSVP¤Î¥â¥Ð¥¤¥ëÂбþ¡Ë ²ÃÆ£½Óºö, ''Cheat-Proof Serverless Network Games''¡ÊÉÔÀµ¤òµö¤µ¤Ê¤¤¥µ¡¼¥Ð¥ì¥¹¥Í¥Ã¥È¥ï¡¼¥¯¥²¡¼¥à¡Ë ¾¾Ëܸ»Ë, ''Design and Implementation of End-to-End Mutihoming Systems'' ¡Ê¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°Êý¼°¤ÎÀ߷פȼÂÁõ¡Ë --- **2001ǯÅÙ [#d6beed7e] ¾åÅijٻË, ''²èÁü¤Î¸õÊä¤ò¹Ê¤ê¹þ¤àÊ£¿ô¤Î´ð½à¤Î¼«Æ°À¸À®¤È¤½¤ÎÁªÂò¤Ë´ð¤Å¤¯²èÁüõº÷'' ËÌÀîÂóϺ, ''NOTASIP¤Ë´ð¤Å¤¤¤¿¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÅÅÏÃ¥·¥¹¥Æ¥à'' º´¡¹ÌÚ´ðÀ², ''³¬Áز½QoS¥ë¡¼¥Æ¥£¥ó¥°¥×¥í¥È¥³¥ë¤Ë¤ª¤±¤ë¥ê¥ó¥¯¾ðÊó¹¹ð¼êË¡'' À¹°Ò, ''QoSÊݾڥޥë¥Á¥¥ã¥¹¥ÈÂбþIP¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë²Ý¶â¥×¥í¥È¥³¥ë¤ÎÀ߷פȼÂÁõ'' *¹©³ØÉô¾ðÊó³Ø²Ê·×»»µ¡²Ê³Ø¥³¡¼¥¹ÆÃÊ̸¦µæÊó¹ð½ñ [#w08098fe] **2023ǯÅÙ [#wba6655c] ¾åÅÄÁó°ìϯ, ''unikernel ¤òÍѤ¤¤¿³ÖÎ¥À¡¦²ÄÈÂÀ¤Î¹â¤¤WebAssembly ¤Î¼Â¹Ô´Ä¶'' ÊÒ²¬ËêÇ·²ð, ''¥Í¥Ã¥È¥ï¡¼¥¯µóÆ°¾ðÊó¤òÍøÍѤ·¤¿SPA¥Ù¡¼¥¹¤ÎưŪ¥¢¥¯¥»¥¹À©¸æ'' ½Õ̾·òÂÀϺ, ''P4¤Ç¤ÎXor Filter¤ò⽤¤¤¤¿¥á¥â¥ê¸úΨ¤Î⾼¤¤¥É¥á¥¤¥ó¥Ö¥í¥Ã¥¯¥ê¥¹¥È'' **2022ǯÅÙ [#w64b577d] ÀÄ»³ ÂçÚð, ''TLS¥»¥Ã¥·¥ç¥ó¥ê¥µ¥ó¥×¥·¥ç¥ó¤òÍøÍѤ·¤¿¥¯¥é¥¦¥É´ÉÍýIoT¥Ç¥Ð¥¤¥¹¤Î¾ÚÌÀ½ñ¼º¸ú¸å¤ÎÉüµìÍÑÄÌ¿®Ï©¤Î³ÎÊÝ'' Èø¾å ´²Ìï, ''Ê£¿ô´Ä¶¤Ç¥Þ¥¤¥¯¥í¥µ¡¼¥Ó¥¹¤ò¶¦ÍѤ¹¤ë¤¿¤á¤Î¥×¥í¥È¥³¥ëÈó°Í¸¤Ê¥³¥ó¥Æ¥¯¥¹¥ÈÅÁÇÅ'' ²¼ÅÄ ¹¯À¤, ''¥¢¥Ê¥í¥°¡¦¥Ç¥£¥¸¥¿¥ëÊ»ÍѤΰۼï¾éĹ¤Ê·×¬·Ï¤Ë¤è¤ë¥Ç¡¼¥¿´°Á´À¤È²ÄÍÑÀ¤ÎÊݸî'' **2021ǯÅÙ [#fbbb8c5e] ¹¾Ê¿ÃÒÇ·, ''KubernetesÀ©¸æ¥×¥ì¡¼¥ó¤Ë¤ª¤±¤ë½¾Â°¥ê¥½¡¼¥¹¤ÎÏ¢º¿ÅªÊѹ¹¤Î´Æ»ë'' Ê¿°æ²í¿Í, ''¥¼¥í¥È¥é¥¹¥Èǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë°Û¤Ê¤ë¥Ç¡¼¥¿¥½¡¼¥¹´Ö¤Î¥³¥ó¥Æ¥¥¹¥È¤Îɳ¤Å¤±'' ¼»³·òÂÀ, ''Ê£¿ô¤ÎTCP¥Õ¥í¡¼¤Î¥Ñ¥Ã¥·¥Ö·×¬¤Ë¤è¤ë¾åή¥Í¥Ã¥È¥ï¡¼¥¯¤Î¾õÂÖ¿äÄê'' **2020ǯÅÙ [#c6b7f83e] »ûÅÄ·òÂÀ, ''¥¯¥é¥¦¥É·¿CAPTCHA¤ËÂФ¹¤ëbot¤Ë¤è¤ë¥¢¥¯¥»¥¹¤ÎʬÀÏ'' ßÀÅç ·½Í¤, ''ÂÐÏÃŪ¤ËÄÌ¿®À©¸æ¤¬²Äǽ¤Ê¥Þ¥ë¥¦¥§¥¢²òÀÏ¥·¥¹¥Æ¥à'' ¾¾ËÜľ¼ù, ''¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¥±¥¤¥Ñ¥Ó¥ê¥Æ¥£¤Ë´ð¤Å¤¯¥æ¡¼¥¶¡¼¼çÂΤÎǧ²ÄµÚ¤Ó¥¢¥¯¥»¥¹À©¸æ'' **2019ǯÅÙ [#p745255d] ¾®ÎÓ²íµ¨, ''À©¸æ¥Ñ¥¹¤ÎÁ´Îóµó¤Ë¤è¤ëMetasploit¹¶·â¥³¡¼¥É¤¬½ÐÎϤ¹¤ë¹¶·â¥Ñ¥±¥Ã¥È¤ÎÌÖÍåŪÀ¸À®'' È«»³¹·Âç, ''¥¼¥í¥È¥é¥¹¥Èǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë¥æ¡¼¥¶Æ±°ÕÉÕ¤¥³¥ó¥Æ¥¥¹¥È¶¦Í'' º´ÃÝÀ¿, ''À©¸Â¤µ¤ì¤¿¥ª¥ó¥é¥¤¥óÆóÉô¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ'' **2018ǯÅÙ [#ra1f74fc] ±»ËÜÂóÌé, ''¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Ë¤ª¤±¤ë°Û¤Ê¤ëÃÏ°è¤ÎTier2¤ÎASƱ»Î¤ÎÀܳ´Ø·¸¤ÎʬÀÏ'' ÎÓϹ¬, ''¥µ¥¤¥Ð¡¼¶¼°Ò¾ðÊó¤Ë´ð¤Å¤¯¥¤¥ó¥·¥Ç¥ó¥ÈȯÀ¸·¹¸þ¤Îͽ¬'' À¾²¬¹¬Íè, ''Shibboleth¤Ç¤Î¥·¥ó¥°¥ë¥µ¥¤¥ó¥ª¥ó¤Ë¤ª¤±¤ë¥¢¥«¥¦¥ó¥È°ÜÆ°¤Î°ì³çÀ©¸æ'' ¼ãÎÓ·Ä, ''¥È¥é¥Õ¥£¥Ã¥¯·¹¸þ¤Ë´ð¤Å¤¤¤¿Access Control List¤ÎºÆ¹½ÃÛ'' **2017ǯÅÙ [#k635a758] ¹Ó°æµ£, ''¥¯¥é¥¦¥É·¿CAPTCHA¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ë¥ê¥¹¥¯¥Ù¡¼¥¹Ç§¾Úµ»½Ñ¤ÎÍøÍÑ'' ¾¾»³Í´µ®, ''ºÇÂ祵¥¤¥º°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ëºÇŬ²ò¤¬´ûÃΤÎÎãÂêÀ¸À®'' **2001ǯÅÙ [#p4483d07] ³Þ¾¾·ò°ì, ''¥³¥Þ¥ó¥É¥Ñ¥¤¥×¥é¥¤¥ó¤Ë¤è¤ë¥Þ¥ë¥Á¥á¥Ç¥£¥¢¥¹¥È¥ê¡¼¥à½èÍý'' ¾¾Ëܸ»Ë, ''¥â¥Ð¥¤¥ë¥Í¥Ã¥È¥ï¡¼¥¯¥¢¡¼¥¥Æ¥¯¥Á¥ãLIN6¤Î¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°Âбþ'' [[ÏÀʸ]]