Session Details

[B-7]情報ネットワーク

Wed. Mar 6, 2024 1:45 PM - 5:00 PM JST
Wed. Mar 6, 2024 4:45 AM - 8:00 AM UTC
School of Integrated Arts and Sciences K314(HIROSHIMA UNIVERSITY Higashi-Hiroshima campus)
Chair:Kenichi Matsui, Kikuma Kazuhiro

[B-7-25]ネットワークログ解析におけるイベント間因果情報可視化の検討

○Hironori Ishii1, Satoru Kobayashi1, Kensuke Fukuda2,3, Toshihiro Yamauchi1 (1. Okayama University, 2. National Institute of Informatics, 3. Sokendai)
PDF DownloadDownload PDF

[B-7-26]Implementation of Sensor data visualization by Augmented Reality

○Haruka Suzuki1, Mizuno Osamu1 (1. Kogakuin University)
PDF DownloadDownload PDF

[B-7-27]BLE beacon selection methods for 3D indoor location estimation

○Namito Shimokawa1, Ken-ichi Baba1 (1. Kogakuin University)
PDF DownloadDownload PDF

[B-7-28]Safety improvement effects of sharing movement information of vehicles and pedestrians at intersections

○Kazuya Miura1, Ken-ichi Baba1 (1. Kogakuin University)
PDF DownloadDownload PDF

[B-7-29]A Study on a Front-Line Operation System for Disaster First Responders

○Toshikazu Sakano1, Ojetunde Babatunde1, Masahiro Suzuki1, Akira Nakamura2, Toshiaki Fukada2 (1. ATR, 2. ATR-Trek)
PDF DownloadDownload PDF

[B-7-30]Improving Disaster Search and Rescue using an AI-based Front-Line Operation System (FLOS)

○BABATUNDE OJETUNDE1, TOSHIKAZU SAKANO1 (1. Advanced Telecommunications Research Institute International (ATR))
PDF DownloadDownload PDF

Break time

[B-7-31]Simulation of Sharding Protocols in SimBlock

○Manaya Takenawa1, Ken-ichi Baba1, Ryohei Banno1 (1. Kogakuin Univ.)
PDF DownloadDownload PDF

[B-7-32]A study to prevent DoS attacks on public blockchain

○Kiyora Kodama1, Takeshi Ogawa1 (1. Tokyo Denki University)
PDF DownloadDownload PDF

[B-7-33]Study of Non-Repudiation Methods of Broadcast Communication with Low Computational Complexity

○Ichika Ueda1, Takeshi Ogawa1 (1. Tokyo Denki University)
PDF DownloadDownload PDF

[B-7-34]Dealing with Interest Flooding Attack in ICN based Wireless Sensor Network

○Ryoichi Kubota1, Takafumi Taya1, Kohei Yamamoto1, Osamu Mizuno1 (1. Kogakuin University)
PDF DownloadDownload PDF

[B-7-35]Sampling-based system call monitoring for detecting malicious behaviors in containers

○Yuichi Nakatani1, Ayumi Ishimaru1, Ryohei Sato1, Akinori Shiraga1 (1. NTT Network Innovation Center)
PDF DownloadDownload PDF

[B-7-36]A study on attack detection methods considering system call sequences

○Ayumi Ishimaru1, Ryohei Sato1, Yuichi Nakatani1, Akinori Shiraga1 (1. NTT Network Innovation Center)
PDF DownloadDownload PDF