Takayuki Sasaki

According to our database1, Takayuki Sasaki authored at least 26 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices.
J. Inf. Process., 2024

Observation of Human-Operated Accesses Using Remote Management Device Honeypot.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

2023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023

Who are youƒ OSINT-based Profiling of Infrastructure Honeypot Visitors.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Complexity Reduction of Graph Signal Denoising Based on Fast Graph Fourier Transform.
Proceedings of the IEEE International Conference on Image Processing, 2023

2022
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding Activities.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Fast-Parallel Singular Value Thresholding for Many Small Matrices based on Geometric Feature of Singular Values.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers.
IEICE Trans. Commun., 2020

Security Architecture for Trustworthy Systems in 5G Era.
CoRR, 2020

Towards a Backdoorless Network Architecture Based on Remote Attestation and Backdoor Inspection.
CoRR, 2020

Secure IoT Device Architecture Using TrustZone.
Proceedings of the 2020 IEEE International Conference on Sensing, 2020

2019
Access Control Architecture for Smart City IoT Platform.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Toward Collaborative Defense Across Organizations.
J. Inf. Process., 2018

Constructing Digital Watermark Based on Orthogonal Functions.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2016
Control-plane isolation and recovery for a secure SDN architecture.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Optical distortion correction for eyeglasses-type wearable device using multi-mirror array.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

SDNsec: Forwarding Accountability for the SDN Data Plane.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2013
Load distribution of an OpenFlow controller for role-based network access control.
Proceedings of the 15th Asia-Pacific Network Operations and Management Symposium, 2013

2012
A Framework for Detecting Insider Threats using Psychological Triggers.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

2011
Towards Detecting Suspicious Insiders by Triggering Digital Data Sealing.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
Content oriented virtual domains for secure information sharing across organizations.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2003
A Practical Approach for Bus Architecture Optimization at Transaction Level.
Proceedings of the 2003 Design, 2003


  Loading...