Daisuke Kotani

Orcid: 0000-0003-4305-8379

According to our database1, Daisuke Kotani authored at least 34 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Vantage Point Placement Based on Inference of AS-level Connections.
J. Inf. Process., 2023

CREBAS: Enabling Network Access Control in a Home with One Click.
J. Inf. Process., 2023

Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities.
J. Inf. Process., 2023

Monitoring Cascading Changes of Resources in the Kubernetes Control Plane.
CoRR, 2023

Protocol-Independent Context Propagation for Sharing Microservices in Multiple Environments.
Proceedings of the IEEE International Conference on Cloud Engineering, 2023

Efficient Container Image Updating in Low-bandwidth Networks with Delta Encoding.
Proceedings of the IEEE International Conference on Cloud Engineering, 2023

Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation.
CoRR, 2022

Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.
CoRR, 2022

Acila: attaching identities of workloads for efficient packet classification in a cloud data center network.
Proceedings of the FIRA@SIGCOMM 2022: Proceedings of the ACM SIGCOMM Workshop on Future of Internet Routing & Addressing, 2022

Capability Based Network Access Control for Smart Home Devices.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Linking Contexts from Distinct Data Sources in Zero Trust Federation.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2022

2021
Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity Federation.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Analysis of Inter-regional Relationship among Regional Tier-1 ASes in the Internet.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

QoS Network Control for Elderly Support Services.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Traffic-aware Access Control List Reconstruction.
Proceedings of the 2020 International Conference on Information Networking, 2020

Network Routing Optimization Based on Machine Learning Using Graph Networks Robust against Topology Change.
Proceedings of the 2020 International Conference on Information Networking, 2020

Improving Attack Detection Performance in NIDS Using GAN.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Data distribution infrastructure and applications for robotic therapy for blind elderly.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

An Architecture of a Network Controller for QoS Management in Home Networks with Lots of IoTDevices and Services.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Xilara: An XSS Filter Based on HTML Template Restoration.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Mixed Integer Programming Solution for Network Optimization Under Tunneling-Based Traffic Engineering Schemes.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A Threshold-Based Authentication System Which Provides Attributes Using Secret Sharing.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Stability and Robustness of Control Planes in OpenFlow Networks.
PhD thesis, 2016

A Multicast Tree Management Method Supporting Fast Failure Recovery and Dynamic Group Membership Changes in OpenFlow Networks.
J. Inf. Process., 2016

A Packet-In Message Filtering Mechanism for Protection of Control Plane in OpenFlow Switches.
IEICE Trans. Inf. Syst., 2016

2015
Fast Failure Detection of OpenFlow Channels.
Proceedings of the Asian Internet Engineering Conference, 2015

2014
A packet-in message filtering mechanism for protection of control plane in openflow networks.
Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, 2014

2013
A Mail Transfer System Selectively Restricting a Huge Amount of E-Mails.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

2012
A Design and Implementation of OpenFlow Controller Handling IP Multicast with Fast Tree Switching.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Packet-In Message Control for Reducing CPU Load and Control Traffic in OpenFlow Switches.
Proceedings of the European Workshop on Software Defined Networking, 2012

2011
Supporting Sharing of Browsing Information and Search Results in Mobile Collaborative Searches.
Proceedings of the Web Information System Engineering - WISE 2011, 2011


  Loading...