Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mitsunaga, Takuho
add a person with the name Mitsunaga, Takuho
 

Other publications of authors with the same name

A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits., , and . IWSEC, volume 7038 of Lecture Notes in Computer Science, page 51-64. Springer, (2011)Protecting Struts 2 from OGNL Related Attacks by Using Servlet Filter., , and . AsiaJCIS, page 8-14. IEEE Computer Society, (2018)Detection of Malicious Tools by Monitoring DLL Using Deep Learning., , and . J. Inf. Process., (2020)Efficient Industrial Control Systems risk assessment using the attack path to the critical device., , , and . MSIE, page 104-110. ACM, (2021)Cyber Security Risks of Technical Components in Industry 4.0., , , and . COINS, page 1-7. IEEE, (2021)Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption., , and . IWSEC, volume 6434 of Lecture Notes in Computer Science, page 149-163. Springer, (2010)Cryptographic Protocols for Secure Electronic Commerce.. Kyoto University, Japan, (2016)Automated Mapping Method for Sysmon Logs to ATT&CK Techniques by Leveraging Atomic Red Team., , , and . ICSPIS, page 104-109. IEEE, (2023)LLM-based Attack Scenarios Generator with IT Asset Management and Vulnerability Information., , and . ICSPIS, page 99-103. IEEE, (2023)XAI-driven Adversarial Attacks on Network Intrusion Detectors., , , , , , , and . EICC, page 65-73. ACM, (2024)