外部発表等
論文誌
- 機械学習とプッシュ配信を活用したサイバーパトロール活動促進システム
- 横山 未有, 角田 裕
- 情報処理学会論文誌, Vol.65, No.5, pp. 914-926, 2024年5月
- Feasibility of Societal Model for Securing Internet of Things
- Hiroshi Tsunoda, Rodrigo Roman-Castro, Javier Lopez, and Glenn Mansfield Keeni
- KSII Transactions on Internet and Information Systems, Vol. 12, No. 8, pp. 3567-3588, Aug. 2018
- Detecting Active Devices in Intranets Using Existing Network Management Information
- Hiroshi Tsunoda, Masahiro Matsuda, Yuusuke Syouji, Kohei. Ohta, and Glenn Mansfield Keeni
- International Journal of Energy, Information and Communications, Special Issue on IW-STEIC2012 Vol. 4, Issue 2, pp. 21-40 , Apr. 2013
- A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
- Yuji Waizumi, Hiroshi Tsunoda, Masashi Tsuji and Yoshiaki Nemoto
- Journal of Information Security Vol. 3, No. 1, pp. 18-24, Jan. 2012
- Development of a WLAN Based Monitoring System for Group Activity Measurement in Real-time
- Hiroshi Tsunoda, Hidehisa Nakayama, Kohei Ohta, Akihiro Suzuki, Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi, Glenn. M. Keeni, and Yoshiaki Nemoto
- Journal of Communications and Networks, vol. 13, no. 2, pp. 86-94, Apr. 2011
- Network Application Identification Based on Communication Characteristics of Application Messages
- Yuji Waizumi, Yuya Tsukabe, Hiroshi Tsunoda, Yoshiaki Nemoto and Kazuyuki Tanaka
- Journal of Communication and Computer, No. 2, pp. 111-119, Feb. 2011
- Wireless Telemedicine Services Over Integrated IEEE 802.11/WLAN and IEEE 802.16/WiMAX Networks
- Zhang Yan, Nirwan Ansari, Hiroshi Tsunoda
- IEEE Wireless Communications Magazine,Vol. 17, Issue 1, pp. 30-36, Feb. 2010
- 地理的位置情報と軌道情報を併用したWalker Delta型LEO衛星ネットワーク向け移動管理方式
- 角田 裕,太田 耕平,根元義章
- 電子情報通信学会論文誌B, Vol. J91-B, No. 12, pp. 1600-1610, 2008年12月
- Detecting DRDoS Attacks by a Simple Response Packet Confirmation Mechanism
- Hiroshi Tsunoda, Kohei Ohta, Atsunori Yamamoto, Nirwan Ansari, Yuji Waizumi, and Yoshiaki Nemoto
- Computer Communications, Vol. 31, pp. 3299-330, Sep. 2008
- トラヒックの最小流量に着目したトラヒックパターンのフィルタリングによるDDoS攻撃追跡の精度向上方式
- 角田裕,内海宏律,和泉勇治,根元義章
- 電子情報通信学会和文論文誌B, Vol. 90-B, No. 10, pp. 969-979, 2007年10月
- 相関係数発生確率行列を利用したネットワーク状態評価方式
- 和泉勇治,廣瀬淳一,角田裕,根元義章
- 電子情報通信学会和文論文誌B, Vol. 90-B, No. 7, pp. 660-669, 2007年7月
- イントラネットセキュリティシステムにおける協調型DoS追跡技術
- 角田裕,太田耕平,田中真一,和泉勇治,加藤 寧,キニ グレン マンスフィールド,根元義章
- 情報処理学会論文誌, Vol. 48, No. 2, pp. 733-742, 2007年2月
- Pulsing Denial-of-Service Attacks Tolerant Sack-based TCP with Adaptive Bandwidth Estimation Mechanism
- Hiroshi Tsunoda, Kenjirou Arai, Nei Kato, and Yoshiaki Nemoto
- WSEAS Transactions on Information Science& Applications, Vol. 6, No. 3, pp. 1130-1137, Jun. 2006
- 適応型帯域推定とSACKを組み合わせた無線ネットワーク向けTCP
- 佐々木貴之,角田裕,太田耕平,加藤寧,根元義章
- 電子情報通信学会和文論文誌 B, Vol. J87-B No. 10, pp. 1657-1667 2004年10月
- A Satellite Selection Method for Walker Delta LEO Satellite Networks
- Umith Dharmaratna, Hiroshi Tsunoda, Nei Kato, and Yoshiaki Nemoto
- IEICE Transactions on Communications Vol. E87-B, No. 8, pp. 2124-2131, Aug. 2004
- Supporting IP/LEO Satellite Networks by Handover-Independent IP Mobility Management
- Hiroshi Tsunoda, Kohei Ohta, Nei Kato, and Yoshiaki Nemoto
- IEEE Journal on Selected Areas in Communications, Vol. 22, No. 2, pp. 300-307, Feb. 2004
- TTL情報を用いた LEO衛星ネットワークにおける TCPの誤再送回避手法
- 角田裕,太田耕平,加藤寧,根元義章
- 電子情報通信学会和文論文誌 B, Vol. J86-B, No. 8, pp. 1570-1577, 2003年8月
- Mobility Management for IP/LEO Satellite Networks using Geographical Location
- Hiroshi Tsunoda, Kohei Ohta, Nei Kato, and Yoshiaki Nemoto
- IEICE Transactions on Communications, Vol. E86-B, No. 2, pp. 490-497, Feb. 2003
- RFC 8502 L2L3 VPN Multicast MIB
- Zhaohui (Jeffrey) Zhang, Hiroshi Tsunoda
- December 2018
- RFC 8503 BGP/MPLS Layer 3 VPN Multicast Management Information Base
- Hiroshi Tsunoda
- December 2018
査読付き国際会議
- Characterizing Internet-Wide Research Scanning in Darknet Traffic Through Comparative Analysis of Detection Methods
- Takuma Shikanai and Hiroshi Tsundoa
- 2025 10th International Conference on Business and Industrial Research (ICBIR) (accepted)
- An eBPF-based packet capture system with embedded application metadata for network forensics
- Masaya Okabe and Hiroshi Tsunoda
- 2024 Twelfth International Symposium on Computing and Networking Workshops (CANDARW), Nov. 2024
- Push-Based Information Distribution System for Efficient Cyber Patrolling
- Miyu Yokoyama and Hiroshi Tsunoda
- 2023 8th International Conference on Business and Industrial Research (ICBIR), pp. 651-656, May 2023
- Security and Privacy Awareness: for Software Creators and Users
- Glenn Mansfield Keeni, Hiroshi Tsunoda
- 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST), Oct 23-25, 2019
- Event detection in traffic observed by internet threat monitoring system by focusing occurrence probability matrices of correlation coefficient
- Hiroshi Tsunoda, Kohei Mayama, Glenn Mansfield Keeni
- 2018 5th International Conference on Business and Industrial Research (ICBIR), May 17-18, 2018
- Using normalized entropy to compare traffic differences in stable and unstable time slots
- Napaphat Vichaidis, Hiroshi Tsunoda
- 2018 5th International Conference on Business and Industrial Research (ICBIR), May 17-18, 2018
- Analyzing Darknet TCP Traffic Stability at Different Timescales
- Napaphat Vichaidis, Hiroshi Tsunoda, and Glenn Mansfield Keeni
- The 32nd International Conference on Information Networking (ICOIN 2018), January 12-13, 2018
- Feasibility of Societal Model for Securing Internet of Things
- Hiroshi Tsunoda and Glenn Mansfield Keeni
- 13th International Wireless Communications and Mobile Computing Conference (IWCMC2017), June 2017
- Societal Model for Securing Internet of Things
- Hiroshi Tsunoda Glenn Mansfield Keeni
- International Conference on Business and Industrial Research 2016 (ICBIR2016), May 12-13, 2015
- Darknet Traffic Analysis by Focusing on the Stability of Traffic
- Napaphat Vichaidis, Hiroshi Tsunoda, and Glenn Mansfield Keeni
- International Conference on Business and Industrial Research 2016 (ICBIR2016), May 12-13, 2016
- Managing Syslog
- Hiroshi Tsunoda, Glenn Mansfield Keeni
- The 16th Asia-Pacific Network Operations and Management Symposium (APNOMS2014), September 17-19, 2014
- Focus on Accuracy and Consistency of Advanced Applications for Monitoring the Future Internet
- Hiroshi Tsunoda, Glenn Mansfield KeenI
- The Sixth IEEE/IFIP International Workshop on Management of the Future Internet (ManFI2014), May 2014
- G-MIB: Green-oriented Management Information Base and Its Standardization in IETF
- Satoru Izumi, Naoki Nakamura, Hiroshi Tsunoda, Masahiro Matsuda, Kohei Ohta, Takuo Suganuma, Glenn M. Keeni, Norio Shiratori
- 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE2013), Oct. 2013
- Estimating Device Activities Using Network-based Information in the Intranet
- H.Tsunoda, M. Matsuda, K. Ohta, and G. M. Keeni
- The 1st International Workshop on Smart Technologies for Energy, Information and Communication (IW-STEIC2012) pp.11-18, Oct. 2012
- Security by Simple Network Traffic Monitoring
- H. Tsunoda and G. M. Keeni
- The 5th ACM International Conference on Security of Information and Networks (SIN2012), pp.29-32, Oct. 2012
- Network Application Identification Based on Communication Characteristics of Application Messages
- Yuji Waizumi, Yuya Tsukabe, Hiroshi Tsunoda, and Yoshiaki Nemoto
- World Academy of Science, Engineering and Technology, Issue 60 Dec. 2009
- A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages
- Hiroshi Tsunoda, Takafumi Maruyama, Kohei Ohta, Yuji Waizumi, Glenn Mansfield Keeni, and Yoshiaki Nemoto
- 7th Annual Communications Networks and Services Research Conference, May 2009
- Improving the Efficiency of DoS Traceback Based on the Enhanced ITrace-CP Method for Mobile Environment (Invited Paper)
- Hiroshi Tsunoda, Taishi Tochiori, Yuji Waizumi, Nei Kato, and Yoshiaki Nemoto
- International Conference on Communications and Networking in China (CHINACOM), 2008, pp.680-685, Aug. 2008
- A Reliable Network Application Identification Based on Transition Pattern of Payload Length
- Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, and Yoshiaki Nemoto
- IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, pp. 1-5, Dec. 2008
- Ultra-Mobile Echo Network in Health Care System
- Yoshifumi Saijo, Takahiro Iwamoto, Kazuto Kobayashi, Satoshi Yamaguchi, Hiroshi Tsunoda, Hidehisa Nakayama, Nei Kato, and Yoshiaki Nemoto
- 2008 21st IEEE International Symposium on Computer-Based Medical Systems (CBMS '08), pp. 164-166, Jun. 2008
- Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition
- Hiroshi Tsunoda, Kenjiro Arai, Yuji Waizumi, Nirwan Aansari, and Yoshiaki Nemoto
- IEEE International Conference on Communications (ICC), 2008, pp.1670-1674, May 2008
- Network Application Identiffication Using Transition Pattern of Payload Length
- Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Abbas Jamalipour, Nei Kato, and Yoshiaki Nemoto
- IEEE Wireless Communication and Network Conference (WCNC) Apr. 2008
- Performance Evaluation of SCTP with Adaptive Multistreaming over LEO Satellite Networks
- Hiroshi Tsunoda, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto
- 2007 International Workshop on Satellite and Space Communications (IWSSC2007), Sep. 2007
- Distributed Early Worm Detection Based on Payload Histogram Similarity
- Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirwan Ansari, Yoshiaki Nemoto
- 2007 IEEE International Conference on Communications (ICC2007), Jun. 2007
- An Adaptive Stream Allocation Method for Improving SCTP Performance over LEO Satellite Networks
- Hiroshi Tsunoda, Abbas Jamalipour, and Yoshiaki Nemoto
- 25th AIAA International Communications Satellite Systems Conference, Apr. 2007
- A Low Cost Worm Detection Technique based on Flow Payload Similarity
- Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda and Yoshiaki Nemoto
- International Conference on Web Information Systems and Technologies, Mar. 2007
- Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks
- Hiroshi Tsunoda, Umith Dharmaratna, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto
- 2006 IEEE Global Communication Conference (Globecom2006), Nov. 2006
- Geographical and Orbital Information Based Mobility Management to Overcome Last-Hop Ambiguity over IP/LEO Satellite Networks
- Hiroshi Tsunoda, Kohei Ohta, Nei Kato, Yoshiaki Nemoto
- 2006 IEEE International Conference on Communications (ICC2006), pp.1849-1854, Jun. 2006
- A New Mechanism for Improving Robustness of TCP against Pulsing Denial-of-Service Attacks
- Hiroshi TSUNODA, Kenjiro ARAI, Nei KATO, and Yoshiaki NEMOTO
- 5th WSEAS International Conference on Applied Computer Science (ACOS2006), Apr. 2006
- A Simple Response Packet Confirmation Method for DRDoS Detection
- Hiroshi TSUNODA, Kohei OHTA, Atsunori YAMAMOTO, and Yoshiaki NEMOTO
- 8th International Conference on Advanced Communication Technology (ICACT2006), Feb. 2006
- Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures
- Kumar Simkhada, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto
- 7th IEEE International Symposium on Multimedia (ISM2005), Dec. 2005
- A Flow Reduction Method for Anomaly Detection based on Multi-Stage Traffic Analysis
- Masashi TSUJI, Yuji WAIZUMI, Hiroshi TSUNODA, and Yoshiaki NEMOTO
- 21th Annual Computer Security Application Conference (ACSAC), Dec. 2005
- Traffic Pattern Filtering Based on Lower Bounds of Traffic Volume for DDoS Traceback
- Hironori UTSUMI, Hiroshi TSUNODA, Yuji WAIZUMI, and Yoshiaki NEMOTO
- 21th Annual Computer Security Application Conference (ACSAC), Dec. 2005
- Improving TCP Performance Using Observed Hop Count over LEO Satellite Networks
- Hiroshi TSUNODA, Kohei OHTA, Nei KATO, Yoshiaki NEMOTO
- 21st AIAA International Communications Satellite System Conference (ICSSC2003), Apr. 2003