Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Autonomous mobile patrol system for nuclear power plants: field test report of vehicle navigation and sensor positioning., , , , , and . IROS, page 743-750. IEEE, (1996)Hierarchical Autonomous Mobile Control System of a Patrol Robot for Nuclear Power Plants., , , , , , and . ICRA, page 837-842. IEEE Computer Society, (1995)Feature Location for Multi-Layer System Based on Formal Concept Analysis., , , , , and . CSMR, page 429-434. IEEE Computer Society, (2012)Incremental Feature Location and Identification in Source Code., , , , , , , and . CSMR, page 371-374. IEEE Computer Society, (2013)Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABER., and . ProvSec, volume 13059 of Lecture Notes in Computer Science, page 155-173. Springer, (2021)An Application of Uplink Common Channel to Packet Relay in CDMA Radio Access Networks., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (7): 1800-1808 (2005)The Attacker Might Also Do Next: ATT&CK Behavior Forecasting by Attacker-based Collaborative Filtering and Graph Databases., , , and . J. Inf. Process., (2023)Development and Application of Robotics for Decommissioning of Fukushima Daiichi NPS by IRID., , and . J. Robotics Mechatronics, 36 (1): 9-20 (February 2024)LDoS Attacker Detection Algorithms in Zigbee Network., , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 43-50. IEEE, (2021)Efficient Matching Algorithms between Logs and Indicators for Automatic Incident Response System., , and . J. Inf. Process., (2023)