Shigeaki Tanimoto, Saki Suzuki, Hiroki Koyama, Keita Nagai, Takashi Hatashima, Atsushi Kanai. Improvement Methods for Work Motivation in Telework. Lecture Notes on Data Engineering and Communications Technologies. 2024. 255-267
Hiroki Koyama, Shigeaki Tanimoto, Atsushi Shimoda, Seiko Taki, Atsushi Kanai. Introduction of Information Security Fatigue Scale for Teleworking and its Effectiveness. 2024 IEEE/ACIS 9th International Conference on Big Data, Cloud Computing, and Data Science (BCD). 2024. 239-246
Shigeaki Tanimoto, Ryuya Mishina, Hideki Goromaru, Hiroyuki Sato, Atsushi Kanai. Countermeasure Portfolio Management of Silent Cyber Risks for Suitable Return of Investment. International Journal of Service and Knowledge Management. 2024. 8. 1. 1-1
Yangchen Palmo, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai. Optimal Federation Method for Embedding Internet of Things in Software-Defined Perimeter. IEEE Consumer Electronics Magazine. 2023. 12. 5. 68-75
Shigeaki Tanimoto, Tatsuya Sugio, Hiroyuki Sato, Atsushi Kanai. Security Policy Matching Model between Mobile IoT and Public Fog Computing. 2023 14th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI). 2023. 639-644
A Study on a Detection Method for Slow HTTP DoS Attacks Using Entropy. 2022. 224-231
Tanimoto Shigeaki, Kurose Wataru, Kameda Takumi, Kobayashi Toru, Sato Hiroyuki, Kanai Atsushi. D-9-7 A Concept Proposal of PBL Type Computer-ethics Education: Ethical Security. Proceedings of the IEICE General Conference. 2016. 2016. 1. 119-119
Study on Rogue Access Point detection method. 2015. 115. 334. 25-30
XMLed Service Policy Documents for Access Control. 2014. 2014. 2. 236-243
SHIRAYAMA Tomoyasu, KANAI Atsushi. A quantification method of the degree of personal information disclosure using statistical data. IEICE technical report. Social Implications of Technology and Information Ethics. 2014. 114. 116. 149-154
2019/10/17 - IEEE IEEE 8th Global Conference on Consumer Electronics (GCCE2019) Excellent Paper Award Detection of Malicious Communication Using DNS Traffic Small features