Top/Çî»Î³Ø°ÌÏÀʸ¡¦½¤»ÎÏÀʸ

#author("2024-07-14T09:34:13+00:00","Kinako","Kinako")
#contents
---

*Çî»Î³Ø°ÌÏÀʸ [#d43b0051]
**2021ǯÅÙ [#e47807c0]
***2022ǯ3·î [#wb92f1d8]
´Ø¸ýδ¾¼,
''¥«¡¼¥Ê¥Ó¥²¡¼¥·¥ç¥ó¤Î¤¿¤á¤ÎÃÏÍý¶õ´Ö¾ðÊó¤ÎÅÁã¤Ë´Ø¤¹¤ë¸¦µæ''
Koki Hamada,
''Algorithms for Stable Matching Problems toward Real-World Applications''
**2019ǯÅÙ [#ib6b9c65]
***2020ǯ3·î [#pa4432fe]
¾âËÜÍÌ,
''Web¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤ËÂФ¹¤ë¥µ¥¤¥Ð¡¼¹¶·â¤Î¸úΨŪ¤Ê¸¡ÃÎ''
**2018ǯÅÙ [#i5779c8d]
***2019ǯ3·î [#n9683aef]
»û²¬½¨ÉÒ,
''¥Í¥Ã¥È¥ï¡¼¥¯Àܳ¤µ¤ì¤¿Áȹþ¤ß¥·¥¹¥Æ¥à¤Î³ÈÄ¥À­¤Ë´Ø¤¹¤ë¸¦µæ''
***2018ǯ11·î [#x4d94151]
À¶¿å¤µ¤ä»Ò,
''Âç³Ø¤Ë¤ª¤±¤ë¥¢¥¯¥»¥¹¥Þ¥Í¥¸¥á¥ó¥È¤Ë´Ø¤¹¤ë¸¦µæ''
**2017ǯÅÙ [#pcf5ba2c]
***2017ǯ5·î [#ib8955ec]
¾¾ËÜμ²ð, ''Web¥µ¡¼¥Ð¤Î¹â½¸ÀÑ¥Þ¥ë¥Á¥Æ¥Ê¥ó¥È¥¢¡¼¥­¥Æ¥¯¥Á¥ã¤Ë´Ø¤¹¤ë¸¦µæ''
**2016ǯÅÙ [#n7822095]
***2017ǯ3·î [#e1dd9f62]
Èþ¸¶µÁ¹Ô, ''¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯´ÉÍýµ»½Ñ¤È±þÍÑ¥µ¡¼¥Ó¥¹¤Ë´Ø¤¹¤ë¸¦µæ''
**2015ǯÅÙ [#b29dfc5c]
***2016ǯ3·î [#rc08250e]
Daisuke Kotani, ''Stability and Robustness of Control Planes in OpenFlow Networks''
**2014ǯÅÙ [#xf627717]
***2014ǯ7·î [#a500ab68]
Naoyuki Morimoto, ''Design and Analysis of Algorithms for Graph Exploration and Resource Allocation Problems and Their Application to Energy Management''
**2011ǯÅÙ [#uaa98d61]
***2011ǯ7·î [#dc0c9786]
Mitsuo Okada,
''Asymmetric and Pseudo-Blind Digital Watermarking for Fair and Privacy-Secure Digital Content Trading''
**2010ǯÅÙ [#pb51ca40]
***2011ǯ3·î [#rfd7c022]
Kazuya Suzuki, ''Studies on Network Monitoring Systems to Reveal Suspicious Activities''
***2010ǯ7·î [#ad51bac1]
ÂçÊ¿·ò»Ê, ''¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÀܳ¤ÎÄã´ÉÍý¥³¥¹¥È¤Ê±¿ÍѤ˴ؤ¹¤ë¸¦µæ''
// (Studies on Low-Cost Management and Operation of Internet Connection)
´Ý»³¿­, ''ʬ»¶²½¡¦¾éĹ²½¤òÍѤ¤¤¿¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥à¤Î¹â¿®Íê²½¤Ë´Ø¤¹¤ë¸¦µæ''
**2008ǯÅÙ [#rc400f87]
***2009ǯ3·î [#s6f5d86e]
Koji Kobayashi, ''Competitive Analysis of Online Problems on Networks''
Jungsuk Song, ''Studies on High-Performance Network Intrusion Detection System Based on Unsupervised Machine Learning''

*½¤»ÎÏÀʸ [#m3dbab1a]
**2023ǯÅÙ [#if11b1a7]
¹¾Ê¿ ÃÒÇ·, 
''Distributed Tracing for Cascading Changes of Objects in the Kubernetes Control Plane''
Kubernetes À©¸æ¥×¥ì¡¼¥ó¤Ë¤ª¤±¤ë¥ª¥Ö¥¸¥§¥¯¥È¤ÎÏ¢º¿ÅªÊѹ¹¤Îʬ»¶¥È¥ì¡¼¥·¥ó¥°¼êË¡¡Ë
Ê¿°æ ²í¿Í, 
''Putting Authorization Serverson User-owned Devices in User-Managed Access''
¡ÊUser-Managed Access¤Ë¤ª¤±¤ë¥æ¡¼¥¶½êÍ­¤ÎüËö¤Îǧ²Ä¥µ¡¼¥Ð²½¡Ë
üâÅè °ì¼ù, 
''DDoS Attack Information Sharing Among CDNs Interconnected Through CDNI''
¡ÊCDNI ¤òÄ̤·¤ÆÁê¸ßÀܳ¤µ¤ì¤¿ CDN ´Ö¤ÇÍ­¸ú¤ÊDDoS ¹¶·â¾ðÊó¶¦Í­¼êË¡¡Ë
¼»³ ·òÂÀ, 
''Detection of Communication Quality Degradation Based on Similarity Among Time Series Data of TCP Flows Using Passive Measurement''
¡Ê¥Ñ¥Ã¥·¥Ö·×¬¤òÍѤ¤¤¿ TCP ¥Õ¥í¡¼¤Î»þ·ÏÎó¥Ç¡¼¥¿´Ö¤ÎÎà»÷Å٤˴ð¤Ä゙¤¯ÄÌ¿®ÉʼÁÎô²½¤Î¸¡ÃΡË

**2022ǯÅÙ [#ua3fcd25]
»ûÅÄ ·òÂÀ,
''Breaking Puzzle-Based CAPTCHAs by CNN''
¡Ê¥Ñ¥º¥ë·¿CAPTCHA¤ËÂФ¹¤ëCNN¤Ë¤è¤ëÆÍÇË¡Ë
ßÀÅç ·½Í¤,
''Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents''
¡Ê¥Þ¥ë¥¦¥§¥¢Æ°Åª²òÀϤˤª¤±¤ë¥Õ¥¡¥¤¥ëÆâÍƤòÈëÆ¿¤·¤¿ÉôʬŪ¤Ê³°Éô°ÑÂ÷¡Ë
¾¾ËÜ Ä¾¼ù,
''Reducing Data Transfer with Binary Delta Encoding in Container Image Updating''
¡Ê¥³¥ó¥Æ¥Ê¥¤¥á¡¼¥¸¹¹¿·¤Ë¤ª¤±¤ë¥Ð¥¤¥Ê¥êº¹Ê¬Éä¹æ¤Ë´ð¤Å¤¯¥Ç¡¼¥¿Å¾Á÷Î̺︺¡Ë
¿åë ¹äÂç
''Visibility of Attack-related Traffic Trends in Sparsely Populated Darknets''
¡Ê¾®µ¬ÌÏ¥À¡¼¥¯¥Í¥Ã¥È·²¤òÍѤ¤¤¿¹¶·â´ØÏ¢¥È¥é¥Õ¥£¥Ã¥¯¤Î·¹¸þ¤Î²Ä»ëÀ­¡Ë
**2021ǯÅÙ [#l4686963]
¾®ÎÓ²íµ¨,
''Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities''
¡ÊÀȼåÀ­¤ÎPoC¥³¡¼¥É¤Ë¤ª¤±¤ëÌÖÍåŪ¤Ê¼Â¹Ô¥Ñ¥¹Ãµº÷¤Ë¤è¤ëIDS ¤Î¥·¥°¥Í¥Á¥ãÀ¸À®¡Ë
º´ÃÝÀ¿,
''Competitive Analysis for the Online Facility Assignment Problem on a Line''
¡ÊľÀþ¾å¤Î¥ª¥ó¥é¥¤¥ó»ÜÀß³äÅöÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ¡Ë
È«»³¹·Âç,
''Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication''
¡Ê¸ø³«¸°Ç§¾Ú¤Ë¤ª¤±¤ëÊ£¿ôǧ¾Ú´ï¤Î½êÍ­¼Ô¤Ë´ð¤Å¤¯¸°´ÉÍý¡Ë
**2020ǯÅÙ [#cdcbc847]
±»ËÜÂóÌé,
''Analysis of AS-Level Maps of the Internet Focusing on Placement of Vantage Points''
¡ÊVantage Point¤ÎÇÛÃÖ¤ËÃå⽬¤·¤¿AS¥ì¥Ù¥ë¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥Þ¥Ã¥×¤Î²òÀÏ¡Ë
ÂçÀ¾·ûÂÀϺ,
''Network Control in a Cloud Platform Using Identities of Workloads''
¡Ê¥¯¥é¥¦¥É´ðÈפˤª¤±¤ëWorkload ¤ÎIdentity ¤òÍѤ¤¤¿¥Í¥Ã¥È¥ï¡¼¥¯À©¸æ¡Ë
À¾²¬¹¬Íè,
''Mutual Secrecy of Attributes and Authorization Policies in Identity Federation''
¡Êǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë°À­ÃͤÈǧ²Ä¾ò·ï¤ÎÁê¸ßÈëÆ¿¡Ë
**2019ǯÅÙ [#ycc3e6da]
¹Ó°æµ£,
''Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning''
¡Ê¥¯¥é¥¦¥É·¿CAPTCHA¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ëµ¡³£³Ø½¬¤òÍѤ¤¤¿¥Ü¥Ã¥È¤Î¸¡ÃΡË
¾¾»³Í´µ®,
''Generating Stable Marriage Instances with Optimal Solutions''
¡Ê°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ëºÇŬ²òÉÕ¤­ÎãÂêÀ¸À®¡Ë
ÍûÅìÍÛ,
''Improving Attack Detection Performance in NIDS Using GAN''
¡ÊŨÂÐŪÀ¸À®¥Í¥Ã¥È¥ï¡¼¥¯(GAN)¤òÍѤ¤¤¿¥Í¥Ã¥È¥ï¡¼¥¯¿¯Æþ¸¡ÃÎ¥·¥¹¥Æ¥à(NIDS) ¤Î¹¶·â¸¡ÃÎÀ­Ç½²þÁ±¡Ë
**2018ǯÅÙ [#lc22e169]
ß·ÅijÊ,
''Network Routing Optimization Based on Machine Learning Using Graph Networks Robust against Topology Change''
¡Ê¥È¥Ý¥í¥¸¡¼ÊѲ½¤ËÂбþ¤Ç¤­¤ë¥°¥é¥Õ¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿µ¡³£³Ø½¬¤Ë´ð¤Å¤¯¥Í¥Ã¥È¥ï¡¼¥¯·ÐÏ©ºÇŬ²½¡Ë

**2017ǯÅÙ [#tc486535]
½©µÈμ,
''Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet''
¡ÊÄãÂÐÏ÷¿¥Ï¥Ë¡¼¥Ý¥Ã¥È¤È¥À¡¼¥¯¥Í¥Ã¥È¤Î´ØÏ¢ÉÕ¤±¤Ë¤è¤ë¿·¤¿¤ÊÂ絬ÌÏ¥¹¥­¥ã¥ó³èÆ°¤Î¸¡ÃΡË
¾®´ä¹îµ±,
''A Low-Interaction Honeypot Observing Attacks against HTTP/2''
¡ÊHTTP/2¤ËÂФ¹¤ë¹¶·â¤ò´Ñ¬¤¹¤ëÄãÂÐÏ÷¿¥Ï¥Ë¡¼¥Ý¥Ã¥È¤Î¹½ÃÛ¡Ë
½¡¸÷Íã,
''Tunneling-based Network Traffic Engineering Using Mixed Integer Programming''
¡Êº®¹çÀ°¿ô·×²èË¡¤òÍøÍѤ·¤¿¥È¥ó¥Í¥ê¥ó¥°¤Ë¤è¤ë¥È¥é¥Õ¥£¥Ã¥¯¥¨¥ó¥¸¥Ë¥¢¥ê¥ó¥°¡Ë
»³ºê·¼ÂÀϺ,
''Xilara: An XSS Filter Based on HTML Template Restoration''
¡ÊXilara: HTML¥Æ¥ó¥×¥ì¡¼¥È¤ÎÉü¸µ¤òÍѤ¤¤ëXSS¥Õ¥£¥ë¥¿¡Ë


**2016ǯÅÙ [#vd6596e0]
°Ëƣͧ¹À,
''A Threshold-based Authentication System Which Provides Attributes Using Secret Sharing''
¡Ê°À­¾ðÊó¤òÈë̩ʬ»¶¤·¤¿ïçÃÍ·¿Ç§¾Ú¥·¥¹¥Æ¥à¡Ë
·¬¸¶µ®ÌÀ,
''Mitigating Flooding DDoS Attacks with Per-Service Bandwidth Control at Firewalls''
¡Ê¥Õ¥¡¥¤¥¢¥¦¥©¡¼¥ë¤Ë¤ª¤±¤ë¥µ¡¼¥Ó¥¹Ã±°Ì¤ÎÂÓ°èÀ©¸æ¤Ë¤è¤ë¥Õ¥é¥Ã¥É·¿DDoS ¹¶·â¤Ø¤ÎÂкö¡Ë
¹âȫͪ,
''An Anonymous Distributed Electronic Voting System Using Zerocoin'',
¡ÊZerocoin ¤òÍøÍѤ·¤¿Æ¿Ì¾Ê¬»¶·¿ÅÅ»ÒÅêɼ¥·¥¹¥Æ¥à¡Ë
**2014ǯÅÙ [#r70136e3]
//***2015ǯ3·î [#lff519e2]
ÅÄÅç¾Èµ×,
''Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN''
¡Ê̵ÀþLAN¤Ë¤ª¤±¤ëWebÂδ¶ÉʼÁ¸þ¾å¤Î¤¿¤á¤Î¥Ñ¥±¥Ã¥ÈÁ÷¿®À©¸æºÇŬ²½¡Ë
ÄÔÈø¾°¼ù,
''A Traceable and Pseudonymous P2P Information Distribution System''
¡Êȯ¿®¼ÔÄÉÀײÄǽ¤Ê²¾Ì¾·¿ P2P ¾ðÊóȯ¿®¥·¥¹¥Æ¥à¡Ë
Andrew Lee,
''The Minimum Diameter Multiple Steiner Tree Problem for Embedding Multiple VLANs''
¡ÊÊ£¿ôVLANËä¤á¹þ¤ß¤Î¤¿¤á¤ÎºÇ¾®Ä¾·ÂÊ£¿ô¥¹¥¿¥¤¥Ê¡¼ÌÚÌäÂê¡Ë
**2013ǯÅÙ [#q03677b8]
//***2014ǯ3·î [#m130557e]
ÄÛÆâ¾­Ç·,
''Digital Watermarking Method on Executable Files for Tracking Illegal Uploaders''
¡Ê¥½¥Õ¥È¥¦¥§¥¢ÉÔÀµ¥¢¥Ã¥×¥í¡¼¥É¼ÔÄÉÀפΤ¿¤á¤Î¼Â¹Ô·Á¼°¥Õ¥¡¥¤¥ë¤Ø¤ÎÅÅ»ÒÆ©¤«¤·ÁÞÆþ¡Ë
**2012ǯÅÙ [#v00b80ca]
***2013ǯ3·î [#uf892044]
²¬ËÜÂç¼ù,
''Cooperative Load Distribution for Addressing Flash Crowds Using PsP File Sharing Network''
¡ÊP2P¥Õ¥¡¥¤¥ë¶¦Í­¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿¥Õ¥é¥Ã¥·¥å¥¯¥é¥¦¥ÉÂÑÀ­¤Î¤¢¤ë¶¨Ä´·¿Éé²Ùʬ»¶¼êË¡¡Ë
»ûËÜÂÙÂç,
''Managing networks independently of the physical topology by Service Defined Network''
¡ÊService Defined Network¡Ê£Ó£ö£Ä£Î¡Ë¤Ë¤è¤ëʪÍý¹½À®¤Ë°Í¸¤·¤Ê¤¤¥Í¥Ã¥È¥ï¡¼¥¯´ÉÍý¡Ë
²£È«À¿Ìé,
''An Extension and Evaluation of Power over Ethernet for on-Demand Power Supply''
¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎ϶¡µë¤Î¤¿¤á¤ÎPower over Ethernet¤Î³ÈÄ¥¡Ë

***2012ǯ9·î [#aefd6cdc]
¾®Ã«ÂçÍ´,
''Stable handling of heavy flows in OpenFlow networks''
¡Ê£Ï£ð£å£î£Æ£ì£ï£÷¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¹â¥È¥é¥Õ¥£¥Ã¥¯¤Ê¥Õ¥í¡¼¤Î°ÂÄêŪ¤Ê½èÍý¡Ë
**2011ǯÅÙ [#s1140f39]
Âç¿À¾Ä, ''Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation''
¡Ê¥»¥­¥å¥¢¤ÊID ÊÑ´¹¤Ë¤è¤ëSAMLÏ¢·È¤Ë¤ª¤±¤ë¸Ä¿Í¾ðÊó¤ÎµÕή½Ð¤Ë
ÂФ¹¤ë²¾Ì¾À­Êݸî¡Ë
¹â¶¶¶Ç¹°, ''Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol''
¡ÊHost Identity Protocol¤òÍѤ¤¤¿¥»¥­¥å¥¢¤Ê¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥µ¡¼¥Ó¥¹¥â¥Ç¥ë¤ÎÀ߷פȼÂÁõ¡Ë
µÜËÜÂöÌé, ''A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking''
¡Ê²ÈÄíÆ⥪¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤Ë¤ª¤±¤ëGMPLS·¿ÅÅÎÏ»ñ¸»Í½Ìó¥·¥¹¥Æ¥à¡Ë
**2010ǯÅÙ [#v803446b]
Àж¶Áï, ''Design and Implementation of a Certified Document Delivery System without a Trusted Intermediate Authority''
¡Ê¿®Íê¤Ç¤­¤ëÃç²ð¼Ô¤òɬÍפȤ·¤Ê¤¤ÅÅ»Òʸ½ñÇÛã¾ÚÌÀ¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ¡Ë
¼ÆÅÄÃε±, ''The Design and Implementation of an Energy On-Demand DC Grid in Home''
¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâľήÁ÷ÅÅÌÖ¤ÎÀ߷פȼÂÁõ¡Ë
ÀÐÅÄÊݵ±, ''High-Performance Intrusion Detection Using OptiGrid and Grid-Based Labelling''
¡ÊOptiGrid¥¯¥é¥¹¥¿¥ê¥ó¥°¤È¥°¥ê¥Ã¥É¤òÍøÍѤ·¤¿¥é¥Ù¥ê¥ó¥°¤Ë¤è¤ë¹âÀºÅ٤ʰ۾︡ÃΡË
**2009ǯÅÙ [#b3792ce5]
ÃæÅÄ·ò²ð, ''An Analysis of Network IDS Alerts to Grasp Attack Situation''
¡Ê¥Í¥Ã¥È¥ï¡¼¥¯·¿IDS¤Î¥¢¥é¡¼¥È²òÀϤˤè¤ë¹¶·â¾õ¶·¤ÎÇÄ°®¼êË¡¡Ë
Ê¡ÅĹä»Î, ''Online Algorithms for the k-Canadian Traveller Problem on Restricted Graphs''
¡ÊÀ©¸Â¤µ¤ì¤¿¥°¥é¥Õ¾å¤Ç¤Îk-Canadian Traveller Problem¤ËÂФ¹¤ë¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à¡Ë
Æ£ËÜ·½, ''£Ñ£ï£Å£î(Quality of Energy)Power Routing toward Energy-on-Demand Home Network''
¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤Î£Ñ£ï£Å£î(¥¨¥Í¥ë¥®¡¼ÉʼÁ)¤ò¹Íθ¤·¤¿·ÐÏ©À©¸æ¡Ë
**2008ǯÅÙ [#t0f44fe4]
À¶¿å·ÉÂÀ, ''Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange''
¡ÊƱ»þÈëÌ©¸ò´¹¤òÍøÍѤ·¤¿ÇÛãÆâÍƾÚÌÀ¤¬²Äǽ¤ÊÅŻҥ᡼¥ë¥·¥¹¥Æ¥à¤ÎÀ߷פª¤è¤Ó¼ÂÁõ¡Ë
Á°Àî·Ä»Ê, ''A Location Privacy Protection Framework with Mobility Using Host Identity Protocol''
¡ÊHost Identity Protocol¤òÍѤ¤¤¿°ÜÆ°ÄÌ¿®¤Î¤¿¤á¤Î¥í¥±¡¼¥·¥ç¥ó¥×¥é¥¤¥Ð¥·Êݸî¥Õ¥ì¡¼¥à¥ï¡¼¥¯¡Ë
**2007ǯÅÙ [#cb30a956]
¹âÌÚ½Ó¹¨, ''Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols''
¡Ê¥Þ¥¸¥Ã¥¯¥×¥í¥È¥³¥ëÍøÍѤˤè¤ë¥×¥é¥¤¥Ð¥·¡¼¤ËÇÛθ¤·¤¿Shibboleth°À­¸ò´¹¤Î³ÈÄ¥¡Ë
Á°ÅÄÊþ¹§, ''Path Alternation in Real-Time Video Streaming using PR-SCTP''
¡ÊPR-SCTP¤ò¤â¤Á¤¤¤¿¥ê¥¢¥ë¥¿¥¤¥à±ÇÁüÅÁÁ÷¤Ë¤ª¤±¤ë·ÐÏ©ÀÚ¤êÂؤ¨¡Ë
¿¹Ëܾ°Ç·, ''Improving Competitive Ratios for the Online Graph Exploration Problem''
¡Ê¥ª¥ó¥é¥¤¥ó¥°¥é¥Õõº÷ÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ¤Î²þÎÉ¡Ë
**2006ǯÅÙ [#z26e5f4a]
ÂçÄíÈ»¿Í, ''Analysis of IDS Data over Large Scaled Open Networks and Its Visualization Utilizing Machine Learning''
¡Ê³«Êü·¿Â絬Ìϥͥåȥ¥¯¤Ë¤ª¤±¤ëIDS¥í¥°¥Ç¡¼¥¿¤Î²òÀϤȵ¡³£³Ø½¬¤òÍѤ¤¤¿²Ä»ë²½¡Ë
Æ£¸¶æÆ°ìϯ, ''A Privacy Enhanced Extension of Attribute Exchange in the SAML Framework and its Application to Shibboleth Authorization''
¡ÊSAML¥Õ¥ì¡¼¥à¥ï¡¼¥¯¤Ë¤ª¤±¤ë°À­¸ò´¹¤Î¥×¥é¥¤¥Ð¥·¡¼¤ò¶¯²½¤·¤¿³ÈÄ¥¤ª¤è¤Ó¤½¤ÎShibbolethǧ²Ä¤Ø¤ÎŬÍÑ¡Ë
ÅÏÊÕ°ê·Ã, ''Design and Implementation of TCP-Friendly Multi-Path Streaming System''
¡ÊÊ£¿ô·ÐÏ©¤ò³èÍѤ·¤¿TCP-Friendly¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ¡Ë
**2005ǯÅÙ [#q12acf73]
¾®ÎÓ¹ÀÆó, ''Improving Competitive Ratios of Online Buffer Management for Shared-Memory Switches and Multi-Queue Switches''
¡Ê¶¦Í­¥á¥â¥ê·¿¥¹¥¤¥Ã¥Á¤È¥Þ¥ë¥Á¥­¥å¡¼¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ª¥ó¥é¥¤¥ó¥Ð¥Ã¥Õ¥¡´ÉÍý¥¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ¤Î²þÎÉ¡Ë
ÃæÌîË­, ''Analysis for Topological Properties of Networks Feeding Netnews''
¡Ê¥Í¥Ã¥È¥Ë¥å¡¼¥¹ÇÛÁ÷ÌÖ¤Î¥È¥Ý¥í¥¸¡¼¤Ë¤ª¤±¤ë½ôÀ­¼Á¤Î²òÀÏ¡Ë
**2004ǯÅÙ [#fcc66ecf]
À¾Â¼Í´²ð, ''P2P¥Í¥Ã¥È¥ï¡¼¥¯¾å¤Ç¤Î¥ª¥ó¥é¥¤¥ó¥²¡¼¥à¤Î°ÂÁ´¤Ê¼Â¹Ô''
²«±Ï, ''Secure Models of Autonomous Distributed Public Wireless Internet Access Services''
¡Ê¼«Î§Ê¬»¶·¿¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¢¥¯¥»¥¹¥µ¡¼¥Ó¥¹¤Î¥»¥­¥å¥ê¥Æ¥£¥â¥Ç¥ë¡Ë
**2003ǯÅÙ [#i55f3770]
ÂçÊ¿·ò»Ê, ''Address Assignment and Route Selection for IPv6 End-to-End Site Multihoming''¡ÊIPv6¤Ë¤ª¤±¤ë¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥µ¥¤¥È¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¼Â¸½¤Î¤¿¤á¤Î¥¢¥É¥ì¥¹³äÅö¤È·ÐÏ©ÁªÂò¡Ë
½ïÊý¾¡Ìé, ''Mobility Support for RSVP with IPv6 End-to-End Multihoming''
¡ÊIPv6¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¤Ë¤è¤ëRSVP¤Î¥â¥Ð¥¤¥ëÂбþ¡Ë
²ÃÆ£½Óºö, ''Cheat-Proof Serverless Network Games''¡ÊÉÔÀµ¤òµö¤µ¤Ê¤¤¥µ¡¼¥Ð¥ì¥¹¥Í¥Ã¥È¥ï¡¼¥¯¥²¡¼¥à¡Ë
¾¾Ëܸ»Ë, ''Design and Implementation of End-to-End Mutihoming Systems''
¡Ê¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°Êý¼°¤ÎÀ߷פȼÂÁõ¡Ë

---
**2001ǯÅÙ [#d6beed7e]
¾åÅijٻË, ''²èÁü¤Î¸õÊä¤ò¹Ê¤ê¹þ¤àÊ£¿ô¤Î´ð½à¤Î¼«Æ°À¸À®¤È¤½¤ÎÁªÂò¤Ë´ð¤Å¤¯²èÁüõº÷''
ËÌÀîÂóϺ, ''NOTASIP¤Ë´ð¤Å¤¤¤¿¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÅÅÏÃ¥·¥¹¥Æ¥à''
º´¡¹ÌÚ´ðÀ², ''³¬Áز½QoS¥ë¡¼¥Æ¥£¥ó¥°¥×¥í¥È¥³¥ë¤Ë¤ª¤±¤ë¥ê¥ó¥¯¾ðÊó¹­¹ð¼êË¡''
À¹°Ò, ''QoSÊݾڥޥë¥Á¥­¥ã¥¹¥ÈÂбþIP¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë²Ý¶â¥×¥í¥È¥³¥ë¤ÎÀ߷פȼÂÁõ''

*¹©³ØÉô¾ðÊó³Ø²Ê·×»»µ¡²Ê³Ø¥³¡¼¥¹ÆÃÊ̸¦µæÊó¹ð½ñ [#w08098fe]
**2023ǯÅÙ [#wba6655c]
¾åÅÄÁó°ìϯ, ''unikernel ¤òÍѤ¤¤¿³ÖÎ¥À­¡¦²ÄÈÂÀ­¤Î¹â¤¤WebAssembly ¤Î¼Â¹Ô´Ä¶­''
ÊÒ²¬ËêÇ·²ð, ''¥Í¥Ã¥È¥ï¡¼¥¯µóÆ°¾ðÊó¤òÍøÍѤ·¤¿SPA¥Ù¡¼¥¹¤ÎưŪ¥¢¥¯¥»¥¹À©¸æ''
½Õ̾·òÂÀϺ, ''P4¤Ç¤ÎXor Filter¤ò⽤¤¤¤¿¥á¥â¥ê¸úΨ¤Î⾼¤¤¥É¥á¥¤¥ó¥Ö¥í¥Ã¥¯¥ê¥¹¥È''

**2022ǯÅÙ [#w64b577d]
ÀÄ»³ ÂçÚð,
''TLS¥»¥Ã¥·¥ç¥ó¥ê¥µ¥ó¥×¥·¥ç¥ó¤òÍøÍѤ·¤¿¥¯¥é¥¦¥É´ÉÍýIoT¥Ç¥Ð¥¤¥¹¤Î¾ÚÌÀ½ñ¼º¸ú¸å¤ÎÉüµìÍÑÄÌ¿®Ï©¤Î³ÎÊÝ''
Èø¾å ´²Ìï,
''Ê£¿ô´Ä¶­¤Ç¥Þ¥¤¥¯¥í¥µ¡¼¥Ó¥¹¤ò¶¦ÍѤ¹¤ë¤¿¤á¤Î¥×¥í¥È¥³¥ëÈó°Í¸¤Ê¥³¥ó¥Æ¥¯¥¹¥ÈÅÁÇÅ''
²¼ÅÄ ¹¯À¤,
''¥¢¥Ê¥í¥°¡¦¥Ç¥£¥¸¥¿¥ëÊ»ÍѤΰۼï¾éĹ¤Ê·×¬·Ï¤Ë¤è¤ë¥Ç¡¼¥¿´°Á´À­¤È²ÄÍÑÀ­¤ÎÊݸî''
**2021ǯÅÙ [#fbbb8c5e]
¹¾Ê¿ÃÒÇ·,
''KubernetesÀ©¸æ¥×¥ì¡¼¥ó¤Ë¤ª¤±¤ë½¾Â°¥ê¥½¡¼¥¹¤ÎÏ¢º¿ÅªÊѹ¹¤Î´Æ»ë''
Ê¿°æ²í¿Í,
''¥¼¥í¥È¥é¥¹¥Èǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë°Û¤Ê¤ë¥Ç¡¼¥¿¥½¡¼¥¹´Ö¤Î¥³¥ó¥Æ¥­¥¹¥È¤Îɳ¤Å¤±''
¼»³·òÂÀ,
''Ê£¿ô¤ÎTCP¥Õ¥í¡¼¤Î¥Ñ¥Ã¥·¥Ö·×¬¤Ë¤è¤ë¾åή¥Í¥Ã¥È¥ï¡¼¥¯¤Î¾õÂÖ¿äÄê''
**2020ǯÅÙ [#c6b7f83e]
»ûÅÄ·òÂÀ,
''¥¯¥é¥¦¥É·¿CAPTCHA¤ËÂФ¹¤ëbot¤Ë¤è¤ë¥¢¥¯¥»¥¹¤ÎʬÀÏ''
ßÀÅç ·½Í¤,
''ÂÐÏÃŪ¤ËÄÌ¿®À©¸æ¤¬²Äǽ¤Ê¥Þ¥ë¥¦¥§¥¢²òÀÏ¥·¥¹¥Æ¥à''
¾¾ËÜľ¼ù,
''¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¥±¥¤¥Ñ¥Ó¥ê¥Æ¥£¤Ë´ð¤Å¤¯¥æ¡¼¥¶¡¼¼çÂΤÎǧ²ÄµÚ¤Ó¥¢¥¯¥»¥¹À©¸æ''
**2019ǯÅÙ [#p745255d]
¾®ÎÓ²íµ¨,
''À©¸æ¥Ñ¥¹¤ÎÁ´Îóµó¤Ë¤è¤ëMetasploit¹¶·â¥³¡¼¥É¤¬½ÐÎϤ¹¤ë¹¶·â¥Ñ¥±¥Ã¥È¤ÎÌÖÍåŪÀ¸À®''
È«»³¹·Âç,
''¥¼¥í¥È¥é¥¹¥Èǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë¥æ¡¼¥¶Æ±°ÕÉÕ¤­¥³¥ó¥Æ¥­¥¹¥È¶¦Í­''
º´ÃÝÀ¿,
''À©¸Â¤µ¤ì¤¿¥ª¥ó¥é¥¤¥óÆóÉô¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ''

**2018ǯÅÙ [#ra1f74fc]
±»ËÜÂóÌé,
''¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Ë¤ª¤±¤ë°Û¤Ê¤ëÃÏ°è¤ÎTier2¤ÎASƱ»Î¤ÎÀܳ´Ø·¸¤ÎʬÀÏ''
ÎÓϹ¬,
''¥µ¥¤¥Ð¡¼¶¼°Ò¾ðÊó¤Ë´ð¤Å¤¯¥¤¥ó¥·¥Ç¥ó¥ÈȯÀ¸·¹¸þ¤Îͽ¬''
À¾²¬¹¬Íè,
''Shibboleth¤Ç¤Î¥·¥ó¥°¥ë¥µ¥¤¥ó¥ª¥ó¤Ë¤ª¤±¤ë¥¢¥«¥¦¥ó¥È°ÜÆ°¤Î°ì³çÀ©¸æ''
¼ãÎÓ·Ä,
''¥È¥é¥Õ¥£¥Ã¥¯·¹¸þ¤Ë´ð¤Å¤¤¤¿Access Control List¤ÎºÆ¹½ÃÛ''

**2017ǯÅÙ [#k635a758]
¹Ó°æµ£,
''¥¯¥é¥¦¥É·¿CAPTCHA¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ë¥ê¥¹¥¯¥Ù¡¼¥¹Ç§¾Úµ»½Ñ¤ÎÍøÍÑ''
¾¾»³Í´µ®,
''ºÇÂ祵¥¤¥º°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ëºÇŬ²ò¤¬´ûÃΤÎÎãÂêÀ¸À®''

**2001ǯÅÙ [#p4483d07]
³Þ¾¾·ò°ì, ''¥³¥Þ¥ó¥É¥Ñ¥¤¥×¥é¥¤¥ó¤Ë¤è¤ë¥Þ¥ë¥Á¥á¥Ç¥£¥¢¥¹¥È¥ê¡¼¥à½èÍý''
¾¾Ëܸ»Ë, ''¥â¥Ð¥¤¥ë¥Í¥Ã¥È¥ï¡¼¥¯¥¢¡¼¥­¥Æ¥¯¥Á¥ãLIN6¤Î¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°Âбþ''


[[ÏÀʸ]]