selected papers主要論文
- N. Sombatruang, T. Caulfield, I. Backer, A. Fujita,T. Kasama, K. Nakao, D. Inoue, “Internet Service Provides’ and Individuals’ Attitudes, Barriers, and Incentivesto Secure IoT,” 32nd USENIX Security Symposium (USENIX Security 23), Aug 2023.
- O. Cetin, C. Gañán, L. Altena, T. Kasama, D. Inoue, K. Tamiya, Y. Tie, K. Yoshioka, M. van Eeten, "Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai," 26th Annual Network and Distributed System Security Symposium (NDSS2019), Feb 2019.
- D. Inoue, M. Eto, K. Suzuki, M. Suzuki, K. Nakao, “DAEDALUS-VIZ: Novel Real-time 3D Visualization for Darknet Monitoring-based Alert System,” 9th International Symposium on Visualization for Cyber Security (VizSec 2012), Oct 2012.
- D. Inoue, K. Yoshioka, M. Eto, Y. Hoshizawa, K. Nakao, “Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity,” 2008 IEEE International Conference on Communications (ICC 2008), Jun 2008.
- D. Inoue, M. Eto, K. Yoshioka, S. Baba, K. Suzuki, J. Nakazato, K. Ohtaka, K. Nakao, “nicter: An Incident Analysis System Toward Binding Network Monitoring with Malware Analysis,” 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing (WISTDCS '08), May 2008.
- D. Inoue, M. Kuroda, “FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy,” 2nd International Conference on Applied Cryptography and Network Security (ACNS 2004), Jun 2004.
- D. Inoue, M. Suzuki, T. Matsumoto, “Detection-resistant Steganography for Standard MIDI Files,” IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, Vol.E86-A, No.8, pp.2099-2106, Aug 2003.