Yangchen Palmo, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai. Optimal Federation Method for Embedding Internet of Things in Software-Defined Perimeter. IEEE Consumer Electronics Magazine. 2023. 12. 5. 68-75
Shigeaki Tanimoto, Tatsuya Sugio, Hiroyuki Sato, Atsushi Kanai. Security Policy Matching Model between Mobile IoT and Public Fog Computing. 2023 14th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI). 2023. 639-644
Shigeaki Tanimoto, Sogen Hori, Hiroyuki Sato, Atsushi Kanai. Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model. 2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA). 2023. 440-445
Shigeaki Tanimoto, Palmo Yangchen, Hiroyuki Sato, Atsushi Kanai. Suitable Scalability Management Model for Software-Defined Perimeter Based on Zero-Trust Model. International Journal of Service and Knowledge Management. 2023. 7. 1. 1-1
Ryuya Mishina, Shigeaki Tanimoto, Hideki Goromaru, Hiroyuki Sato, Atsushi Kanai. Risk Management of Silent Cyber Risks in Consideration of Emerging Risks. 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI). 2021. 710-716
A Study on a Detection Method for Slow HTTP DoS Attacks Using Entropy. 2022. 224-231
Tanimoto Shigeaki, Kurose Wataru, Kameda Takumi, Kobayashi Toru, Sato Hiroyuki, Kanai Atsushi. D-9-7 A Concept Proposal of PBL Type Computer-ethics Education: Ethical Security. Proceedings of the IEICE General Conference. 2016. 2016. 1. 119-119
Study on Rogue Access Point detection method. 2015. 115. 334. 25-30
XMLed Service Policy Documents for Access Control. 2014. 2014. 2. 236-243
SHIRAYAMA Tomoyasu, KANAI Atsushi. A quantification method of the degree of personal information disclosure using statistical data. IEICE technical report. Social Implications of Technology and Information Ethics. 2014. 114. 116. 149-154
2019/10/17 - IEEE IEEE 8th Global Conference on Consumer Electronics (GCCE2019) Excellent Paper Award Detection of Malicious Communication Using DNS Traffic Small features