
| フルテキストURL | fulltext.pdf |
|---|---|
| 著者 | Tsunata, Ren| Kimura, Masaki| Takemoto, Masatsugu| Imai, Jun| |
| キーワード | IPMSM winding traction motor 50 krpm eddy current loss |
| 備考 | EVTeC 2025, the 7th International Electric Vehicle Technology Conference| Publication code: 20259018| |
| 発行日 | 2025-05 |
| 出版者 | JSAE |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2025 Society of Automotive Engineers of Japan, Inc. |
| 論文のバージョン | publisher |
| 著者 | Damoiseau-Malraux, Gaspard| Kobayashi, Satoru| Fukuda, Kensuke| |
|---|---|
| キーワード | log analysis regular expression source code analysis parsing static code analysis |
| 備考 | © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Aug. 2027.| |
| 発行日 | 2025-07-08 |
| 出版物タイトル | 2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC) |
| 出版者 | IEEE |
| ISSN | 2836-3795 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2025 IEEE. |
| 論文のバージョン | author |
| DOI | 10.1109/compsac65507.2025.00104 |
| 関連URL | isVersionOf https://doi.org/10.1109/compsac65507.2025.00104 |
| フルテキストURL | fulltext.pdf |
|---|---|
| 著者 | Tada, Naoya| Ohashi, Hiroaki| Uemori, Takeshi| Sakamoto, Junji| |
| 備考 | The 7th International Conference on Mechanical Engineering and Applied Composite Materials (MEACM 2024) 23/09/2024 - 25/09/2024 Singapore, Singapore| |
| 発行日 | 2024-11-01 |
| 出版物タイトル | Journal of Physics: Conference Series |
| 巻 | 2892巻 |
| 出版者 | IOP Publishing |
| 開始ページ | 012002 |
| ISSN | 1742-6588 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 論文のバージョン | publisher |
| DOI | 10.1088/1742-6596/2892/1/012002 |
| 関連URL | isVersionOf https://doi.org/10.1088/1742-6596/2892/1/012002 |
| フルテキストURL | fulltext.pdf |
|---|---|
| 著者 | Okazaki, Risa| Kamikawa, Kunihisa| Uno, Hideki| Okuda, Hiroto| Namba, Shihoko| Kano, Mitsunobu| Morita, Mizuki| |
| 備考 | Proceedings of the 20th World Congress on Medical and Health Informatics| Studies in Health Technology and Informatics, Volume 329| |
| 発行日 | 2025-08-07 |
| 出版物タイトル | MEDINFO 2025 — Healthcare Smart × Medicine Deep |
| 出版者 | IOS Press |
| 開始ページ | 1892 |
| 終了ページ | 1893 |
| ISSN | 0926-9630 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2025 The Authors. |
| 論文のバージョン | publisher |
| PubMed ID | 40776284 |
| DOI | 10.3233/shti251267 |
| 関連URL | isVersionOf https://doi.org/10.3233/shti251267 |
| フルテキストURL | fulltext.pdf |
|---|---|
| 著者 | Sakamoto, Junji| Tada, Naoya| Uemori, Takeshi| |
| キーワード | Vibration Fatigue crack propagation Non-destructive inspection Titanium alloy |
| 備考 | European Conference on Fracture 2024| |
| 発行日 | 2025 |
| 出版物タイトル | Procedia Structural Integrity |
| 巻 | 68巻 |
| 出版者 | Elsevier BV |
| 開始ページ | 1319 |
| 終了ページ | 1323 |
| ISSN | 2452-3216 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2025 The Author(s). |
| 論文のバージョン | publisher |
| DOI | 10.1016/j.prostr.2025.06.205 |
| 関連URL | isVersionOf https://doi.org/10.1016/j.prostr.2025.06.205 |
| フルテキストURL | fulltext.pdf |
|---|---|
| 著者 | Morita, Mizuki| Honjoh, Mina| Yamane, Takahiro| |
| キーワード | Clinical endpoint, clinical outcomes wearable devices |
| 備考 | Proceedings of the 20th World Congress on Medical and Health Informatics| Studies in Health Technology and Informatics, Volume 329| |
| 発行日 | 2025-08-07 |
| 出版物タイトル | MEDINFO 2025 — Healthcare Smart × Medicine Deep |
| 出版者 | IOS Press |
| 開始ページ | 391 |
| 終了ページ | 395 |
| ISSN | 0926-9630 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2025 The Authors. |
| 論文のバージョン | publisher |
| DOI | 10.3233/shti250868 |
| 関連URL | isVersionOf https://doi.org/10.3233/shti250868 |
| 著者 | Kuzuno, Hiroki| Yamauchi, Toshihiro| |
|---|---|
| 備考 | This is an Accepted Manuscript of a conference paper published by Springer Nature Singapore.| NSS 2024| Lecture Notes in Computer Science, volume 15564| This fulltext file will be available in Mar. 2026.| |
| 発行日 | 2025-03-14 |
| 出版物タイトル | Network and System Security |
| 出版者 | Springer Nature Singapore |
| 開始ページ | 213 |
| 終了ページ | 231 |
| ISSN | 0302-9743 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. |
| 論文のバージョン | author |
| DOI | 10.1007/978-981-96-3531-3_11 |
| 関連URL | isVersionOf https://doi.org/10.1007/978-981-96-3531-3_11 |
| 著者 | Kuzuno, Hiroki| Yamauchi, Toshihiro| |
|---|---|
| 抄録 | Privilege escalation attacks through memory corruption via kernel vulnerabilities pose significant threats to operating systems. Although the extended Berkley Packet Filter has been employed to trace kernel code execution by inserting interrupts before and after kernel code invocations, it does not track operations before and after kernel data writes, thus hindering effective kernel data monitoring. In this study, we introduce a kernel data monitor (kdMonitor), which is a novel security mechanism designed to detect unauthorized alterations in the monitored kernel data of a dedicated kernel page. The kdMonitor incorporates two distinct methods. The first is periodic monitoring which regularly outputs the monitored kernel data of the dedicated kernel pages. The second is dynamic monitoring, which restricts write access to a dedicated kernel page, supplements any write operations with page faults, and outputs the monitored kernel data of dedicated kernel pages. kdMonitor enables real-time tracking of specified kernel data of the dedicated kernel page residing in the kernel's virtual memory space from the separated machine. Using kdMonitor, we demonstrated its capability to pinpoint tampering with user process privileged information stemming from privilege escalation attacks on the kernel. Through an empirical evaluation, we validated the effectiveness of kdMonitor in detecting privilege escalation attacks by user processes on Linux. Performance assessments revealed that kdMonitor achieved an attack detection time of 0.83 seconds with an overhead of 0.726 %. |
| キーワード | Vulnerability countermeasure Operating system security System security |
| 発行日 | 2024-11-06 |
| 出版物タイトル | 2024 IEEE Conference on Dependable and Secure Computing (DSC) |
| 開始ページ | 66 |
| 終了ページ | 73 |
| ISBN | 979-8-3315-4028-9 |
| 言語 | 英語 |
| 著作権者 | © 2024 IEEE. |
| 論文のバージョン | author |
| DOI | 10.1109/dsc63325.2024.00022 |
| フルテキストURL | fulltext20250725-01.pdf |
|---|---|
| 著者 | Kuzuno, Hiroki| Yamauchi, Toshihiro| |
| キーワード | Kernel vulnerability Dynamic analysis System security |
| 備考 | This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.| WISA 2022| Lecture Notes in Computer Science, volume 13720| |
| 発行日 | 2023 |
| 出版物タイトル | Information Security Applications |
| 出版者 | Springer Nature Switzerland |
| 開始ページ | 222 |
| 終了ページ | 234 |
| ISSN | 0302-9743 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2023 Springer Nature Switzerland AG |
| 論文のバージョン | author |
| DOI | 10.1007/978-3-031-25659-2_16 |
| Web of Science KeyUT | 001431522400016 |
| 関連URL | isVersionOf https://doi.org/10.1007/978-3-031-25659-2_16 |
| フルテキストURL | fulltext20250526-01.pdf |
|---|---|
| 著者 | Fujii, Shota| Kawaguchi, Nobutaka| Shigemoto, Tomohiro| Yamauchi, Toshihiro| |
| 備考 | This is an Accepted Manuscript of a conference paper published by Springer International Publishing.| IWSEC 2022| Lecture Notes in Computer Science, volume 13504| |
| 発行日 | 2022-08-12 |
| 出版物タイトル | Advances in Information and Computer Security |
| 出版者 | Springer International Publishing |
| 開始ページ | 85 |
| 終了ページ | 104 |
| ISSN | 0302-9743 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG |
| 論文のバージョン | author |
| DOI | 10.1007/978-3-031-15255-9_5 |
| Web of Science KeyUT | 000894177600005 |
| 関連URL | isVersionOf https://doi.org/10.1007/978-3-031-15255-9_5 |
| 著者 | Victor, Hervet| Kobayashi, Satoru| Yamauchi, Toshihiro| |
|---|---|
| キーワード | Malware analysis IoT Honeypot Log analysis Attack patterns |
| 備考 | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.| |
| 発行日 | 2023-11-27 |
| 出版物タイトル | 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW) |
| 出版者 | IEEE |
| 開始ページ | 292 |
| 終了ページ | 297 |
| ISSN | 2832-1324 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2023 IEEE. |
| 論文のバージョン | author |
| DOI | 10.1109/candarw60564.2023.00055 |
| 関連URL | isVersionOf https://doi.org/10.1109/candarw60564.2023.00055 |
| 著者 | Shiba, Kaito| Kuzuno, Hiroki| Yamauchi, Toshihiro| |
|---|---|
| キーワード | Trusted execution environment Stack overflow prevention method System security |
| 備考 | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.| |
| 発行日 | 2023-11-27 |
| 出版物タイトル | 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW) |
| 出版者 | IEEE |
| 開始ページ | 274 |
| 終了ページ | 278 |
| ISSN | 2832-1324 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2023 IEEE. |
| 論文のバージョン | author |
| DOI | 10.1109/candarw60564.2023.00052 |
| 関連URL | isVersionOf https://doi.org/10.1109/candarw60564.2023.00052 |
| 著者 | Miki, Masato| Yamauchi, Toshihiro| Kobayashi, Satoru| |
|---|---|
| キーワード | Mandatory Access Control System IoT Security Linux Security Modules |
| 備考 | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Jan. 2026.| |
| 発行日 | 2023-11-28 |
| 出版物タイトル | 2023 Eleventh International Symposium on Computing and Networking (CANDAR) |
| 出版者 | IEEE |
| 開始ページ | 161 |
| 終了ページ | 167 |
| ISSN | 2379-1896 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2023 IEEE. |
| 論文のバージョン | author |
| DOI | 10.1109/candar60563.2023.00029 |
| 関連URL | isVersionOf https://doi.org/10.1109/candar60563.2023.00029 |
| フルテキストURL | fulltext20250512-02.pdf |
|---|---|
| 著者 | Norimatsu, Takashi| Yamauchi, Toshihiro| |
| キーワード | Industrial Ethernet PROFINET Non Real Time Real-Time Isochronous Real Time |
| 備考 | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Arg. 2025.| |
| 発行日 | 2023-06-23 |
| 出版物タイトル | 2023 5th International Conference on Computer Communication and the Internet (ICCCI) |
| 出版者 | IEEE |
| 開始ページ | 236 |
| 終了ページ | 244 |
| ISSN | 2833-2350 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2023 IEEE. |
| 論文のバージョン | author |
| DOI | 10.1109/iccci59363.2023.10210171 |
| 関連URL | isVersionOf https://doi.org/10.1109/iccci59363.2023.10210171 |
| 著者 | Sato, Masaya| Omori, Taku| Yamauchi, Toshihiro| Taniguchi, Hideo| |
|---|---|
| キーワード | system call virtual machine monitor operating system |
| 備考 | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.| |
| 発行日 | 2023-11-27 |
| 出版物タイトル | 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW) |
| 出版者 | IEEE |
| 開始ページ | 267 |
| 終了ページ | 273 |
| ISSN | 2832-1324 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2023 IEEE. |
| 論文のバージョン | author |
| DOI | 10.1109/candarw60564.2023.00051 |
| 関連URL | isVersionOf https://doi.org/10.1109/candarw60564.2023.00051 |
| 著者 | Michishita, Daigo| Kobayashi, Satoru| Yamauchi, Toshihiro| |
|---|---|
| 備考 | This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.| EIDWT 2025| Lecture Notes on Data Engineering and Communications Technologies,volume 243| This fulltext file will be available in Apr. 2026.| |
| 発行日 | 2025-04-01 |
| 出版物タイトル | Advances in Internet, Data and Web Technologies |
| 出版者 | Springer Nature Switzerland |
| 開始ページ | 107 |
| 終了ページ | 119 |
| ISSN | 2367-4512 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG |
| 論文のバージョン | author |
| DOI | 10.1007/978-3-031-86149-9_11 |
| 関連URL | isVersionOf https://doi.org/10.1007/978-3-031-86149-9_11 |
| フルテキストURL | fulltext20240530-01.pdf |
|---|---|
| 著者 | Fukushima, Yukinobu| Koujitani, Yuki| Nakane, Kazutoshi| Tarutani, Yuta| Wu, Celimuge| Ji, Yusheng| Yokohira, Tokumi| Murase, Tutomu| |
| キーワード | Multi-stage information processing system VM migration control Deep reinforcement learning Deep Deterministic Policy Gradient (DDPG) |
| 備考 | https://www.thinkmind.org/library/ICN/ICN_2024/icn_2024_1_30_30019.html| |
| 発行日 | 2024-05-26 |
| 出版物タイトル | ICN 2024 : The Twenty-Third International Conference on Networks |
| 出版者 | IARIA |
| 開始ページ | 13 |
| 終了ページ | 18 |
| ISSN | 2308-4413 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | Copyright (c) IARIA, 2024 |
| 論文のバージョン | publisher |
| フルテキストURL | fulltext20210811-16.pdf |
|---|---|
| 著者 | Ishihara, Takashi| Sato, Masaya| Yamauchi, Toshihiro| |
| キーワード | Malicious Websites Blacklist Web-based Attack Android |
| 備考 | © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This fulltext is available in Nov. 2022.| 7th International Workshop on Information and Communication Security (WICS 2020), Naha, Japan, 24-27 Nov. 2020| |
| 発行日 | 2020-11 |
| 出版物タイトル | 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW) |
| 出版者 | IEEE |
| 開始ページ | 20489448 |
| 資料タイプ | 会議発表論文 |
| 言語 | 英語 |
| OAI-PMH Set | 岡山大学 |
| 著作権者 | © 2020 IEEE |
| 論文のバージョン | author |
| DOI | 10.1109/candarw51189.2020.00070 |
| 関連URL | isVersionOf https://doi.org/10.1109/candarw51189.2020.00070 |
| 著者 | Ban, Yuya| Yamauchi, Toshihiro| |
|---|---|
| 発行日 | 2018-11 |
| 出版物タイトル | 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) |
| 資料タイプ | 会議発表論文 |
| 著者 | Imamura, Yuta| Uekawa, Hiroyuki| Ishihara, Yasuhiro| Sato, Masaya| Yamauchi, Toshihiro| |
|---|---|
| 発行日 | 2018-1-29 |
| 出版物タイトル | Proceedings of the Australasian Computer Science Week Multiconference |
| 資料タイプ | 会議発表論文 |