Atsushi Kanai

According to our database1, Atsushi Kanai authored at least 85 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Optimal Federation Method for Embedding Internet of Things in Software-Defined Perimeter.
IEEE Consumer Electron. Mag., September, 2023

Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Security Policy Matching Model between Mobile IoT and Public Fog Computing.
Proceedings of the 14th IIAI International Congress on Advanced Applied Informatics, 2023

Digital Twin Configuration Method for Public Services by Citizens.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Dynamic Analysis for Malware Detection Using API Calls and Memory Usage With Machine Learning Approach.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

Risk Countermeasures Based on Five Whys Analysis Considering Offensive Security.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

2022
Common Factor Analysis of Information Security Incidents Based on Psychological Factors.
Proceedings of the Advances in Network-Based Information Systems, 2022

A Study of Risk Assessment Quantification for Secure Telework.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

Risk Assessment Quantification for Remote Learning Based on Lecture Type.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

Multilayer Defense Security Management in Consideration of TPO Conditions.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Malicious investigation of Docker images on basis of vulnerability databases.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

An Extended Visualization Model for Silent Cyber Risks Considering Non-cyber Aspects.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Resource allocation problem in multi-band space-division multiplexing elastic optical networks.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Information Security Fatigue Countermeasures Using Cognitive Strategy Scale Based on Web Questionnaires.
Int. J. Netw. Comput., 2021

Complementary Methods of IoT Reliability for Embedding IoT Devices into SDP.
Proceedings of the 11th IEEE International Conference on Consumer Electronics, 2021

IoT Reliability Improvement Method for Secure Supply Chain Management.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

A Visualization Model for Silent Cyber Risks Contained in Emerging Risks.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

Risk Assessment of Telework for the New Normal Era.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

Blockchain-based Self-scoring Method.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

Utilizing obfuscation information in deep learning-based Android malware detection.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Risk Breakdown Structure and Security Space for Security Management.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020

Service-Oriented Software Design Model for Communication Robot.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020

Proposal of a Perimeter Line Management Method for Fog and Edge Computing with SDP Concept.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Considerations for Using DPDK in a Hypervisor Virtual Environment.
Proceedings of the Advances in Networked-Based Information Systems, 2020

A Study of Multi-viewpoint Risk Assessment of Internet of Things (IoT).
Proceedings of the 9th International Congress on Advanced Applied Informatics, 2020

Risk Management of Mobile Workers based on Multiple Viewpoints.
Proceedings of the 9th International Congress on Advanced Applied Informatics, 2020

A Distributed Log Management Method using a Blockchain Scheme.
Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE), 2020

Information Security Fatigue Countermeasures Based on Cognitive Strategy Scale.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

2019
Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines.
Proceedings of the Advances in Networked-based Information Systems, 2019

Edge Computing Platform Management: Design for F2C and F2F for Small Businesses to Reduce Costs.
Proceedings of the 8th International Congress on Advanced Applied Informatics, 2019

Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems.
Proceedings of the 8th International Congress on Advanced Applied Informatics, 2019

A Botnet Detection Method on SDN using Deep Learning.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

A Study of Risk Assessment for Sharing Economy based on a User's Viewpoint.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Detection of Malicious Communication Using DNS Traffic Small Features.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

The Fast Software Router "Kamuee" vs. Linux.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Communication Robot for Elderly Based on Robotic Process Automation.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Foreword.
IEICE Trans. Inf. Syst., 2018

Adaptive Policy Evaluation Framework for Flexible Service Provision.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

Dynamic Authentication Method Dependent on Surrounding Environment.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
An Application Framework for Smart Education System Based on Mobile and Cloud Systems.
IEICE Trans. Inf. Syst., 2017

Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era.
Proceedings of the Advances in Network-Based Information Systems, 2017

A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud.
Proceedings of the Advances in Network-Based Information Systems, 2017

Personal authentication method against shoulder-surfing attacks for smartphone.
Proceedings of the IEEE International Conference on Consumer Electronics, 2017

Dynamic security level analysis method using attack tree.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

A Concept Proposal on Modeling of Security Fatigue Level.
Proceedings of the 5th International Conference on Applied Computing and Information Technology, 2017

2016
Establishing Trust in the Emerging Era of IoT.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Performance evaluation on data management approach for multiple clouds using secret sharing scheme.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

Risk assessment of BYOD: Bring your own device.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Temporary grouping method using smartphones.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Automatic LOD conversion system of tweet data associated with tourist spots.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Risk assessment quantification of social-media utilization in enterprise.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
Risk assessment of social-media utilization in an enterprise.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Risk Assessment in Cyber-Physical System in Office Environment.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

An Approach to Selecting Cloud Services for Data Storage in Heterogneous-Multicloud Environment with High Availability and Confidentiality.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

Authentication method against shoulder-surfing attacks using secondary channel.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

Cost reduction effect on running costs in ISMS based on sensors.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Secure protocol with variable security level using secret sharing scheme.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Dynamic risk evaluation model as a security field.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

A Study of Cost Structure Visualization for Digital Forensics Deployment.
Proceedings of the 3rd International Conference on Applied Computing and Information Technology, 2015

2014
Risk assessment quantification in life log service.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

A Study of Risk Assessment Quantification in Cloud Computing.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Data Management Approach for Multiple Clouds Using Secret Sharing Scheme.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

2013
A Study of Data Management in Hybrid Cloud Configuration.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement.
J. Inf. Process., 2012

Risk Management to User Perception of Insecurity in Ambient Service.
Proceedings of the 13th ACIS International Conference on Software Engineering, 2012

Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Quantifying Cost Structure of Campus PKI.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Building a Security Aware Cloud by Extending Internal Control to Cloud.
Proceedings of the 10th International Symposium on Autonomous Decentralized Systems, 2011

2010
A Cloud Trust Model in a Security Aware Cloud.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

The Metric Model for Personal Information Disclosure.
Proceedings of the Fourth International Conference on Digital Society, 2010

2007
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Secure Anonymous Communications with Practical Anonymity Revocation Scheme.
Proceedings of the Advances in Information and Computer Security, 2007

2005
DECIDE: a scheme for decentralized identity escrow.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

2004
A Technical Survey of Data Integration and Information Sharing Using Knowledge Representation on the Web.
IEICE Trans. Inf. Syst., 2004

2002
A Proposed Net-space Service Using "InfoLead" Cruising Navigation Technology.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002

InfoLead - A New Concept for Cruising Navigation Technology.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002

2001
Development of Service Integration Platform for One-Stop Service Applications.
Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01), 2001

Service Matching and Collaboration for Electronic Commerce.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

Scenario-Based Service Composition Method in the Open Service Environment.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001


  Loading...