International

  1. Characterizing Internet-Wide Research Scanning in Darknet Traffic Through Comparative Analysis of Detection Methods
    • Takuma Shikanai and Hiroshi Tsundoa
    • 2025 10th International Conference on Business and Industrial Research (ICBIR), May 2025
  2. An eBPF-based packet capture system with embedded application metadata for network forensics
    • Masaya Okabe and Hiroshi Tsunoda
    • 2024 Twelfth International Symposium on Computing and Networking Workshops (CANDARW), Nov. 2024
  3. Push-Based Information Distribution System for Efficient Cyber Patrolling
    • Miyu Yokoyama and Hiroshi Tsunoda
    • 2023 8th International Conference on Business and Industrial Research (ICBIR), pp. 651-656, May 2023
  4. Security and Privacy Awareness: for Software Creators and Users
    • Glenn Mansfield Keeni, Hiroshi Tsunoda
    • 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST), Oct 23-25, 2019
  5. Event detection in traffic observed by internet threat monitoring system by focusing occurrence probability matrices of correlation coefficient
    • Hiroshi Tsunoda, Kohei Mayama, Glenn Mansfield Keeni
    • 2018 5th International Conference on Business and Industrial Research (ICBIR), May 17-18, 2018
  6. Using normalized entropy to compare traffic differences in stable and unstable time slots
    • Napaphat Vichaidis, Hiroshi Tsunoda
    • 2018 5th International Conference on Business and Industrial Research (ICBIR), May 17-18, 2018
  7. Analyzing Darknet TCP Traffic Stability at Different Timescales
    • Napaphat Vichaidis, Hiroshi Tsunoda, and Glenn Mansfield Keeni
    • The 32nd International Conference on Information Networking (ICOIN 2018), January 12-13, 2018
  8. Feasibility of Societal Model for Securing Internet of Things
    • Hiroshi Tsunoda and Glenn Mansfield Keeni
    • 13th International Wireless Communications and Mobile Computing Conference (IWCMC2017), June 2017
  9. Societal Model for Securing Internet of Things
    • Hiroshi Tsunoda Glenn Mansfield Keeni
    • International Conference on Business and Industrial Research 2016 (ICBIR2016), May 12-13, 2015
  10. Darknet Traffic Analysis by Focusing on the Stability of Traffic
    • Napaphat Vichaidis, Hiroshi Tsunoda, and Glenn Mansfield Keeni
    • International Conference on Business and Industrial Research 2016 (ICBIR2016), May 12-13, 2016
  11. Managing Syslog
    • Hiroshi Tsunoda, Glenn Mansfield Keeni
    • The 16th Asia-Pacific Network Operations and Management Symposium (APNOMS2014), September 17-19, 2014
  12. Focus on Accuracy and Consistency of Advanced Applications for Monitoring the Future Internet
    • Hiroshi Tsunoda, Glenn Mansfield KeenI
    • The Sixth IEEE/IFIP International Workshop on Management of the Future Internet (ManFI2014), May 2014
  13. G-MIB: Green-oriented Management Information Base and Its Standardization in IETF
    • Satoru Izumi, Naoki Nakamura, Hiroshi Tsunoda, Masahiro Matsuda, Kohei Ohta, Takuo Suganuma, Glenn M. Keeni, Norio Shiratori
    • 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE2013), Oct. 2013
  14. Estimating Device Activities Using Network-based Information in the Intranet
    • H.Tsunoda, M. Matsuda, K. Ohta, and G. M. Keeni
    • The 1st International Workshop on Smart Technologies for Energy, Information and Communication (IW-STEIC2012) pp.11-18, Oct. 2012
  15. Security by Simple Network Traffic Monitoring
    • H. Tsunoda and G. M. Keeni
    • The 5th ACM International Conference on Security of Information and Networks (SIN2012), pp.29-32, Oct. 2012
  16. Network Application Identification Based on Communication Characteristics of Application Messages
    • Yuji Waizumi, Yuya Tsukabe, Hiroshi Tsunoda, and Yoshiaki Nemoto
    • World Academy of Science, Engineering and Technology, Issue 60 Dec. 2009
  17. A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages
    • Hiroshi Tsunoda, Takafumi Maruyama, Kohei Ohta, Yuji Waizumi, Glenn Mansfield Keeni, and Yoshiaki Nemoto
    • 7th Annual Communications Networks and Services Research Conference, May 2009
  18. Improving the Efficiency of DoS Traceback Based on the Enhanced ITrace-CP Method for Mobile Environment (Invited Paper)
    • Hiroshi Tsunoda, Taishi Tochiori, Yuji Waizumi, Nei Kato, and Yoshiaki Nemoto
    • International Conference on Communications and Networking in China (CHINACOM), 2008, pp.680-685, Aug. 2008
  19. A Reliable Network Application Identification Based on Transition Pattern of Payload Length
    • Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, and Yoshiaki Nemoto
    • IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, pp. 1-5, Dec. 2008
  20. Ultra-Mobile Echo Network in Health Care System
    • Yoshifumi Saijo, Takahiro Iwamoto, Kazuto Kobayashi, Satoshi Yamaguchi, Hiroshi Tsunoda, Hidehisa Nakayama, Nei Kato, and Yoshiaki Nemoto
    • 2008 21st IEEE International Symposium on Computer-Based Medical Systems (CBMS '08), pp. 164-166, Jun. 2008
  21. Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition
    • Hiroshi Tsunoda, Kenjiro Arai, Yuji Waizumi, Nirwan Aansari, and Yoshiaki Nemoto
    • IEEE International Conference on Communications (ICC), 2008, pp.1670-1674, May 2008
  22. Network Application Identiffication Using Transition Pattern of Payload Length
    • Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Abbas Jamalipour, Nei Kato, and Yoshiaki Nemoto
    • IEEE Wireless Communication and Network Conference (WCNC) Apr. 2008
  23. Performance Evaluation of SCTP with Adaptive Multistreaming over LEO Satellite Networks
    • Hiroshi Tsunoda, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto
    • 2007 International Workshop on Satellite and Space Communications (IWSSC2007), Sep. 2007
  24. Distributed Early Worm Detection Based on Payload Histogram Similarity
    • Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirwan Ansari, Yoshiaki Nemoto
    • 2007 IEEE International Conference on Communications (ICC2007), Jun. 2007
  25. An Adaptive Stream Allocation Method for Improving SCTP Performance over LEO Satellite Networks
    • Hiroshi Tsunoda, Abbas Jamalipour, and Yoshiaki Nemoto
    • 25th AIAA International Communications Satellite Systems Conference, Apr. 2007
  26. A Low Cost Worm Detection Technique based on Flow Payload Similarity
    • Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda and Yoshiaki Nemoto
    • International Conference on Web Information Systems and Technologies, Mar. 2007
  27. Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks
    • Hiroshi Tsunoda, Umith Dharmaratna, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto
    • 2006 IEEE Global Communication Conference (Globecom2006), Nov. 2006
  28. Geographical and Orbital Information Based Mobility Management to Overcome Last-Hop Ambiguity over IP/LEO Satellite Networks
    • Hiroshi Tsunoda, Kohei Ohta, Nei Kato, Yoshiaki Nemoto
    • 2006 IEEE International Conference on Communications (ICC2006), pp.1849-1854, Jun. 2006
  29. A New Mechanism for Improving Robustness of TCP against Pulsing Denial-of-Service Attacks
    • Hiroshi TSUNODA, Kenjiro ARAI, Nei KATO, and Yoshiaki NEMOTO
    • 5th WSEAS International Conference on Applied Computer Science (ACOS2006), Apr. 2006
  30. A Simple Response Packet Confirmation Method for DRDoS Detection
    • Hiroshi TSUNODA, Kohei OHTA, Atsunori YAMAMOTO, and Yoshiaki NEMOTO
    • 8th International Conference on Advanced Communication Technology (ICACT2006), Feb. 2006
  31. Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures
    • Kumar Simkhada, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto
    • 7th IEEE International Symposium on Multimedia (ISM2005), Dec. 2005
  32. A Flow Reduction Method for Anomaly Detection based on Multi-Stage Traffic Analysis
    • Masashi TSUJI, Yuji WAIZUMI, Hiroshi TSUNODA, and Yoshiaki NEMOTO
    • 21th Annual Computer Security Application Conference (ACSAC), Dec. 2005
  33. Traffic Pattern Filtering Based on Lower Bounds of Traffic Volume for DDoS Traceback
    • Hironori UTSUMI, Hiroshi TSUNODA, Yuji WAIZUMI, and Yoshiaki NEMOTO
    • 21th Annual Computer Security Application Conference (ACSAC), Dec. 2005
  34. Improving TCP Performance Using Observed Hop Count over LEO Satellite Networks
    • Hiroshi TSUNODA, Kohei OHTA, Nei KATO, Yoshiaki NEMOTO
    • 21st AIAA International Communications Satellite System Conference (ICSSC2003), Apr. 2003