Kubota, Ayumu
102  Ergebnisse:
Personensuche X
?
1

Survey and Experimentation to Compare IoT Device Model Iden..:

, In: 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM),
 
?
2

Extension of Resource Authorization Method with SSI in Edge..:

, In: Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies,
Watanabe, Ryu ; Kubota, Ayumu ; Kurihara, Jun. - p. 385-394 , 2024
 
?
3

A Graph Construction Method for Anomalous Traffic Detection..:

, In: 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC),
Okui, Norihiro ; Akimoto, Yusuke ; Kubota, Ayumu. - p. 1017-1018 , 2023
 
?
4

Smart City Security Based on a Meta-Security Framework for ..:

, In: Engineering Cyber-Physical Systems and Critical Infrastructures; Advances in Engineering and Information Science Toward Smart City and Beyond,
 
?
5

Application of Generalized Deduplication Techniques in Edge..:

, In: Advanced Information Networking and Applications; Lecture Notes in Networks and Systems,
Watanabe, Ryu ; Kubota, Ayumu ; Kurihara, Jun - p. 585-596 , 2023
 
?
6

A Client-Side Evil-Twin Attack Detection System with Thresh..:

, In: 2023 IEEE 13th International Conference on Consumer Electronics - Berlin (ICCE-Berlin),
Ueda, Tomoyuki ; Saif, Amgad ; Miyata, Sumiko.. - p. 68-69 , 2023
 
?
 
?
8

Resource Authorization Methods for Edge Computing:

, In: Advanced Information Networking and Applications; Lecture Notes in Networks and Systems,
Watanabe, Ryu ; Kubota, Ayumu ; Kurihara, Jun - p. 167-179 , 2022
 
?
9

Identification of an IoT Device Model in the Home Domain Us..:

, In: 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC),
 
?
10

Anomaly Traffic Detection with Federated Learning toward Ne..:

, In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference,
 
?
12

Cord blood transplantation with a reduced-intensity conditi..:

Nakano, Nobuaki ; Takatsuka, Yoshifusa ; Kubota, Ayumu...
International Journal of Hematology.  113 (2021)  6 - p. 861-871 , 2021
 
?
13

SeBeST: Security Behavior Stage Model and Its Application t..:

, In: Advanced Information Networking and Applications; Lecture Notes in Networks and Systems,
Sano, Ayane ; Sawaya, Yukiko ; Yamada, Akira. - p. 552-566 , 2021
 
?
15

Human Factors in Homograph Attack Recognition:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
1-15