コンテンツにスキップ

外部発表等

論文誌

  1. 機械学習とプッシュ配信を活用したサイバーパトロール活動促進システム
    • 横山 未有, 角田 裕
    • 情報処理学会論文誌, Vol.65, No.5, pp. 914-926, 2024年5月
  2. Feasibility of Societal Model for Securing Internet of Things
    • Hiroshi Tsunoda, Rodrigo Roman-Castro, Javier Lopez, and Glenn Mansfield Keeni
    • KSII Transactions on Internet and Information Systems, Vol. 12, No. 8, pp. 3567-3588, Aug. 2018
  3. Detecting Active Devices in Intranets Using Existing Network Management Information
    • Hiroshi Tsunoda, Masahiro Matsuda, Yuusuke Syouji, Kohei. Ohta, and Glenn Mansfield Keeni
    • International Journal of Energy, Information and Communications, Special Issue on IW-STEIC2012 Vol. 4, Issue 2, pp. 21-40 , Apr. 2013
  4. A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
    • Yuji Waizumi, Hiroshi Tsunoda, Masashi Tsuji and Yoshiaki Nemoto
    • Journal of Information Security Vol. 3, No. 1, pp. 18-24, Jan. 2012
  5. Development of a WLAN Based Monitoring System for Group Activity Measurement in Real-time
    • Hiroshi Tsunoda, Hidehisa Nakayama, Kohei Ohta, Akihiro Suzuki, Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi, Glenn. M. Keeni, and Yoshiaki Nemoto
    • Journal of Communications and Networks, vol. 13, no. 2, pp. 86-94, Apr. 2011
  6. Network Application Identification Based on Communication Characteristics of Application Messages
    • Yuji Waizumi, Yuya Tsukabe, Hiroshi Tsunoda, Yoshiaki Nemoto and Kazuyuki Tanaka
    • Journal of Communication and Computer, No. 2, pp. 111-119, Feb. 2011
  7. Wireless Telemedicine Services Over Integrated IEEE 802.11/WLAN and IEEE 802.16/WiMAX Networks
    • Zhang Yan, Nirwan Ansari, Hiroshi Tsunoda
    • IEEE Wireless Communications Magazine,Vol. 17, Issue 1, pp. 30-36, Feb. 2010
  8. 地理的位置情報と軌道情報を併用したWalker Delta型LEO衛星ネットワーク向け移動管理方式
    • 角田 裕,太田 耕平,根元義章
    • 電子情報通信学会論文誌B, Vol. J91-B, No. 12, pp. 1600-1610, 2008年12月
  9. Detecting DRDoS Attacks by a Simple Response Packet Confirmation Mechanism
    • Hiroshi Tsunoda, Kohei Ohta, Atsunori Yamamoto, Nirwan Ansari, Yuji Waizumi, and Yoshiaki Nemoto
    • Computer Communications, Vol. 31, pp. 3299-330, Sep. 2008
  10. トラヒックの最小流量に着目したトラヒックパターンのフィルタリングによるDDoS攻撃追跡の精度向上方式
    • 角田裕,内海宏律,和泉勇治,根元義章
    • 電子情報通信学会和文論文誌B, Vol. 90-B, No. 10, pp. 969-979, 2007年10月
  11. 相関係数発生確率行列を利用したネットワーク状態評価方式
    • 和泉勇治,廣瀬淳一,角田裕,根元義章
    • 電子情報通信学会和文論文誌B, Vol. 90-B, No. 7, pp. 660-669, 2007年7月
  12. イントラネットセキュリティシステムにおける協調型DoS追跡技術
    • 角田裕,太田耕平,田中真一,和泉勇治,加藤 寧,キニ グレン マンスフィールド,根元義章
    • 情報処理学会論文誌, Vol. 48, No. 2, pp. 733-742, 2007年2月
  13. Pulsing Denial-of-Service Attacks Tolerant Sack-based TCP with Adaptive Bandwidth Estimation Mechanism
    • Hiroshi Tsunoda, Kenjirou Arai, Nei Kato, and Yoshiaki Nemoto
    • WSEAS Transactions on Information Science& Applications, Vol. 6, No. 3, pp. 1130-1137, Jun. 2006
  14. 適応型帯域推定とSACKを組み合わせた無線ネットワーク向けTCP
    • 佐々木貴之,角田裕,太田耕平,加藤寧,根元義章
    • 電子情報通信学会和文論文誌 B, Vol. J87-B No. 10, pp. 1657-1667 2004年10月
  15. A Satellite Selection Method for Walker Delta LEO Satellite Networks
    • Umith Dharmaratna, Hiroshi Tsunoda, Nei Kato, and Yoshiaki Nemoto
    • IEICE Transactions on Communications Vol. E87-B, No. 8, pp. 2124-2131, Aug. 2004
  16. Supporting IP/LEO Satellite Networks by Handover-Independent IP Mobility Management
    • Hiroshi Tsunoda, Kohei Ohta, Nei Kato, and Yoshiaki Nemoto
    • IEEE Journal on Selected Areas in Communications, Vol. 22, No. 2, pp. 300-307, Feb. 2004
  17. TTL情報を用いた LEO衛星ネットワークにおける TCPの誤再送回避手法
    • 角田裕,太田耕平,加藤寧,根元義章
    • 電子情報通信学会和文論文誌 B, Vol. J86-B, No. 8, pp. 1570-1577, 2003年8月
  18. Mobility Management for IP/LEO Satellite Networks using Geographical Location
    • Hiroshi Tsunoda, Kohei Ohta, Nei Kato, and Yoshiaki Nemoto
    • IEICE Transactions on Communications, Vol. E86-B, No. 2, pp. 490-497, Feb. 2003

RFC (Request for Comments)

  1. RFC 8502 L2L3 VPN Multicast MIB
    • Zhaohui (Jeffrey) Zhang, Hiroshi Tsunoda
    • December 2018
  2. RFC 8503 BGP/MPLS Layer 3 VPN Multicast Management Information Base
    • Hiroshi Tsunoda
    • December 2018

査読付き国際会議

  1. Characterizing Internet-Wide Research Scanning in Darknet Traffic Through Comparative Analysis of Detection Methods
    • Takuma Shikanai and Hiroshi Tsundoa
    • 2025 10th International Conference on Business and Industrial Research (ICBIR) (accepted)
  2. An eBPF-based packet capture system with embedded application metadata for network forensics
    • Masaya Okabe and Hiroshi Tsunoda
    • 2024 Twelfth International Symposium on Computing and Networking Workshops (CANDARW), Nov. 2024
  3. Push-Based Information Distribution System for Efficient Cyber Patrolling
    • Miyu Yokoyama and Hiroshi Tsunoda
    • 2023 8th International Conference on Business and Industrial Research (ICBIR), pp. 651-656, May 2023
  4. Security and Privacy Awareness: for Software Creators and Users
    • Glenn Mansfield Keeni, Hiroshi Tsunoda
    • 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST), Oct 23-25, 2019
  5. Event detection in traffic observed by internet threat monitoring system by focusing occurrence probability matrices of correlation coefficient
    • Hiroshi Tsunoda, Kohei Mayama, Glenn Mansfield Keeni
    • 2018 5th International Conference on Business and Industrial Research (ICBIR), May 17-18, 2018
  6. Using normalized entropy to compare traffic differences in stable and unstable time slots
    • Napaphat Vichaidis, Hiroshi Tsunoda
    • 2018 5th International Conference on Business and Industrial Research (ICBIR), May 17-18, 2018
  7. Analyzing Darknet TCP Traffic Stability at Different Timescales
    • Napaphat Vichaidis, Hiroshi Tsunoda, and Glenn Mansfield Keeni
    • The 32nd International Conference on Information Networking (ICOIN 2018), January 12-13, 2018
  8. Feasibility of Societal Model for Securing Internet of Things
    • Hiroshi Tsunoda and Glenn Mansfield Keeni
    • 13th International Wireless Communications and Mobile Computing Conference (IWCMC2017), June 2017
  9. Societal Model for Securing Internet of Things
    • Hiroshi Tsunoda Glenn Mansfield Keeni
    • International Conference on Business and Industrial Research 2016 (ICBIR2016), May 12-13, 2015
  10. Darknet Traffic Analysis by Focusing on the Stability of Traffic
    • Napaphat Vichaidis, Hiroshi Tsunoda, and Glenn Mansfield Keeni
    • International Conference on Business and Industrial Research 2016 (ICBIR2016), May 12-13, 2016
  11. Managing Syslog
    • Hiroshi Tsunoda, Glenn Mansfield Keeni
    • The 16th Asia-Pacific Network Operations and Management Symposium (APNOMS2014), September 17-19, 2014
  12. Focus on Accuracy and Consistency of Advanced Applications for Monitoring the Future Internet
    • Hiroshi Tsunoda, Glenn Mansfield KeenI
    • The Sixth IEEE/IFIP International Workshop on Management of the Future Internet (ManFI2014), May 2014
  13. G-MIB: Green-oriented Management Information Base and Its Standardization in IETF
    • Satoru Izumi, Naoki Nakamura, Hiroshi Tsunoda, Masahiro Matsuda, Kohei Ohta, Takuo Suganuma, Glenn M. Keeni, Norio Shiratori
    • 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE2013), Oct. 2013
  14. Estimating Device Activities Using Network-based Information in the Intranet
    • H.Tsunoda, M. Matsuda, K. Ohta, and G. M. Keeni
    • The 1st International Workshop on Smart Technologies for Energy, Information and Communication (IW-STEIC2012) pp.11-18, Oct. 2012
  15. Security by Simple Network Traffic Monitoring
    • H. Tsunoda and G. M. Keeni
    • The 5th ACM International Conference on Security of Information and Networks (SIN2012), pp.29-32, Oct. 2012
  16. Network Application Identification Based on Communication Characteristics of Application Messages
    • Yuji Waizumi, Yuya Tsukabe, Hiroshi Tsunoda, and Yoshiaki Nemoto
    • World Academy of Science, Engineering and Technology, Issue 60 Dec. 2009
  17. A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages
    • Hiroshi Tsunoda, Takafumi Maruyama, Kohei Ohta, Yuji Waizumi, Glenn Mansfield Keeni, and Yoshiaki Nemoto
    • 7th Annual Communications Networks and Services Research Conference, May 2009
  18. Improving the Efficiency of DoS Traceback Based on the Enhanced ITrace-CP Method for Mobile Environment (Invited Paper)
    • Hiroshi Tsunoda, Taishi Tochiori, Yuji Waizumi, Nei Kato, and Yoshiaki Nemoto
    • International Conference on Communications and Networking in China (CHINACOM), 2008, pp.680-685, Aug. 2008
  19. A Reliable Network Application Identification Based on Transition Pattern of Payload Length
    • Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, and Yoshiaki Nemoto
    • IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, pp. 1-5, Dec. 2008
  20. Ultra-Mobile Echo Network in Health Care System
    • Yoshifumi Saijo, Takahiro Iwamoto, Kazuto Kobayashi, Satoshi Yamaguchi, Hiroshi Tsunoda, Hidehisa Nakayama, Nei Kato, and Yoshiaki Nemoto
    • 2008 21st IEEE International Symposium on Computer-Based Medical Systems (CBMS '08), pp. 164-166, Jun. 2008
  21. Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition
    • Hiroshi Tsunoda, Kenjiro Arai, Yuji Waizumi, Nirwan Aansari, and Yoshiaki Nemoto
    • IEEE International Conference on Communications (ICC), 2008, pp.1670-1674, May 2008
  22. Network Application Identiffication Using Transition Pattern of Payload Length
    • Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Abbas Jamalipour, Nei Kato, and Yoshiaki Nemoto
    • IEEE Wireless Communication and Network Conference (WCNC) Apr. 2008
  23. Performance Evaluation of SCTP with Adaptive Multistreaming over LEO Satellite Networks
    • Hiroshi Tsunoda, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto
    • 2007 International Workshop on Satellite and Space Communications (IWSSC2007), Sep. 2007
  24. Distributed Early Worm Detection Based on Payload Histogram Similarity
    • Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirwan Ansari, Yoshiaki Nemoto
    • 2007 IEEE International Conference on Communications (ICC2007), Jun. 2007
  25. An Adaptive Stream Allocation Method for Improving SCTP Performance over LEO Satellite Networks
    • Hiroshi Tsunoda, Abbas Jamalipour, and Yoshiaki Nemoto
    • 25th AIAA International Communications Satellite Systems Conference, Apr. 2007
  26. A Low Cost Worm Detection Technique based on Flow Payload Similarity
    • Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda and Yoshiaki Nemoto
    • International Conference on Web Information Systems and Technologies, Mar. 2007
  27. Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks
    • Hiroshi Tsunoda, Umith Dharmaratna, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto
    • 2006 IEEE Global Communication Conference (Globecom2006), Nov. 2006
  28. Geographical and Orbital Information Based Mobility Management to Overcome Last-Hop Ambiguity over IP/LEO Satellite Networks
    • Hiroshi Tsunoda, Kohei Ohta, Nei Kato, Yoshiaki Nemoto
    • 2006 IEEE International Conference on Communications (ICC2006), pp.1849-1854, Jun. 2006
  29. A New Mechanism for Improving Robustness of TCP against Pulsing Denial-of-Service Attacks
    • Hiroshi TSUNODA, Kenjiro ARAI, Nei KATO, and Yoshiaki NEMOTO
    • 5th WSEAS International Conference on Applied Computer Science (ACOS2006), Apr. 2006
  30. A Simple Response Packet Confirmation Method for DRDoS Detection
    • Hiroshi TSUNODA, Kohei OHTA, Atsunori YAMAMOTO, and Yoshiaki NEMOTO
    • 8th International Conference on Advanced Communication Technology (ICACT2006), Feb. 2006
  31. Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures
    • Kumar Simkhada, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto
    • 7th IEEE International Symposium on Multimedia (ISM2005), Dec. 2005
  32. A Flow Reduction Method for Anomaly Detection based on Multi-Stage Traffic Analysis
    • Masashi TSUJI, Yuji WAIZUMI, Hiroshi TSUNODA, and Yoshiaki NEMOTO
    • 21th Annual Computer Security Application Conference (ACSAC), Dec. 2005
  33. Traffic Pattern Filtering Based on Lower Bounds of Traffic Volume for DDoS Traceback
    • Hironori UTSUMI, Hiroshi TSUNODA, Yuji WAIZUMI, and Yoshiaki NEMOTO
    • 21th Annual Computer Security Application Conference (ACSAC), Dec. 2005
  34. Improving TCP Performance Using Observed Hop Count over LEO Satellite Networks
    • Hiroshi TSUNODA, Kohei OHTA, Nei KATO, Yoshiaki NEMOTO
    • 21st AIAA International Communications Satellite System Conference (ICSSC2003), Apr. 2003

🔗 その他口頭発表

🔗 特許

🔗 その他