Papers - KATAYAMA Tetsuro
-
Tamias: a Syntax File Checker for Parsing Expression Grammar Reviewed
Miyaji Toshihiro, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 169 - 172 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Implementation of an Arduino Simulator to Support Circuit Design Reviewed
Nishida Tatsumi, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 173 - 176 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Development of Library Fescue Extracting Elements of Attributes and Operations of Class Diagram in UML Reviewed
Mori Keisuke, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 165 - 168 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Application of Pairwise Testing to Test Cases by Boundary Value Analysis in BWDM Reviewed
Hirakoba Futa, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 161 - 164 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic Reviewed
Kentaro Aburada, Yuki Arikawa, Shotaro Usuzaki, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Artificial Life and Robotics 2019.1
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2019, International Society of Artificial Life and Robotics (ISAROB). Distributed denial of service attacks are a serious threat in the current information society, where the Internet plays an important role as infrastructure. We have been studying ways to mitigate these attacks using a method that distinguishes between legitimate users and attacks. Our previous method was not sufficient because it only analyzed access logs after the attack. In this study, we propose a new method that can distinguish between legitimate users and attacks while the services are running. When the IDS detects an attack, a quarantine server distinguishes legitimate users using access characteristics. The access characteristics are: (1) user follows links, (2) sender accessed a popular page, and (3) the sender’s current average transmission interval. Our experiments confirmed that the proposed method can distinguish between legitimate users and attacks.
-
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time Reviewed
Katayama Tetsuro, Mori Keisuke, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 5 ( 2 ) 114 - 117 2018.9
Language:English Publishing type:Research paper (scientific journal)
-
Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG Reviewed
Yamaba Hisaaki, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018 22 733 - 742 2018.9
Language:English Publishing type:Research paper (international conference proceedings)
-
UMLとソースコードの間でトレーサビリティをリアルタイムに維持するツールRETUSSの現状と課題
森敬介, 片山徹郎
宮崎大学工学部紀要 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of TFVIS (Transitions and Flow VISalization) for Java Programs Reviewed
佐藤 拓弥, 片山 徹郎, 喜多 義弘, 山場 久昭, 油田 健太郎, 岡崎 直宣
情報処理学会論文誌 59 ( 4 ) 1137 - 1149 2018.4
Language:Japanese Publishing type:Research paper (scientific journal)
ソフトウェア開発におけるデバッグは,手間のかかる工程である.プログラムの欠陥を効率良く特定するためには,プログラム実行時の挙動を把握することが重要である.しかし,プログラム実行時の挙動は一般的に不可視であり,その挙動がどこまで正しかったのかを把握することは困難である.そこで,本研究では,Javaプログラムのデバッグの効率化を目的として,プログラムの欠陥特定を支援するデータ遷移可視化ツールTFVIS(Transitions and Flow VISualization)を開発した.TFVISは,プログラム実行時のデータ遷移と実行フローの可視化を行う.評価実験では,TFVISを活用することで欠陥特定に要する時間を約35%削減できることを確認した.このことから,TFVISによる可視化がデバッグ効率の向上に効果的であるといえる.It takes much time in debugging process. To find bugs effectively, it's important to understand the dynamic behavior of programs. But it's difficult since the dynamic behavior of the program is generally invisible. To support understanding the dynamic behavior, we have developed TFVIS (Transitions and Flow VISualization). It provides visualization of data transitions and data flow of Java programs. In the evaluation experiment, we confirmed that by using TFVIS we can reduce the time required to identify defects by about 35%. Hence, it can be said that visualization by TFVIS is effective to improve debugging efficiency.
-
An examination of the interactive video CAPTCHA method to resist relay attack Reviewed
Tatsuda Ryohei, Aburada Kentaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 7 ( 4 ) 136 - 141 2018.4
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHA is a kind of challenge response test, which is used to distinguish human users from malicious computer program such as bots. However, the attack technique called relay attack as a method to avoid the CAPTCHA has been devised. This attack relays the CAPTCHA challenges to remote human-solvers, let them to decode CAPTCHA challenges. We used delay time that is caused by communications needed in relay attack. Our new CAPTCHA uses this delay time between communications to prevent relay attacks. We constructed an experimental environment in which relay attack can be simulated, made a series of experiments in order to evaluate the performance of the proposed method.
-
Yamaba H., Kurogi T., Aburada K., Kubota S., Katayama T., Park M., Okazaki N.
Artificial Life and Robotics 23 ( 1 ) 87 - 93 2018.3
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2017, ISAROB. At present, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In this paper, we introduced support vector machines (SVM) for improvement of the method of identifying gestures. A series of experiments was carried out to evaluate the performance of the SVM based method as a gesture classifier and we also discussed its security.
-
A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG Reviewed
Kurogi Tokiyoshi, Yamaba Hisaaki, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES 17 889 - 900 2018.3
Language:English Publishing type:Research paper (international conference proceedings)
-
An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks Reviewed
Tatsuda Ryohei, Yamaba Hisaaki, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Shiratori Norio, Okazaki Naonobu
ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES 17 870 - 879 2018.3
Language:English Publishing type:Research paper (international conference proceedings)
-
Implementation of RETUSS to Ensure Traceability between Class Diagram in UML and Java Source Code in Real Time Reviewed
K. Mori, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB2018) 522 - 525 2018.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of a Tool to Defect Specific Comments Reviewed
S. Tanoue, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB2018) 526 - 529 2018.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Negative Test Case Generation from an Extended Place/Transition Net-Based Mutants Reviewed
T. Takagi and T. Katayama
Proc. 2018 Int’l Conf. on Artifical Life and Robotics (ICAROB2018) 513 - 516 2018.2
Language:English Publishing type:Research paper (international conference proceedings)
-
A study on user identification method using cross-correlation and SVM to realize an authentication system by s-EMG Reviewed
T. Kurogi, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
International Symposium on Artificial Life and Robotics 462 - 467 2018.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Introduction of traffic characteristics to distinguish legitimate user traffic from DDoS attack traffic Reviewed
Y. Arikawa, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
International Symposium on Artificial Life and Robotics 484 - 489 2018.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Heuristic test case generation technique using extended place/transition nets Reviewed
Takagi T., Akagi A., Katayama T.
Studies in Computational Intelligence 727 103 - 115 2018
Language:English Publishing type:Research paper (scientific journal) Publisher:Studies in Computational Intelligence
© Springer International Publishing AG 2018. This paper shows a novel heuristic test case generation technique using an extended PN (place/transition net). A guard and action are introduced to improve the representation power of a PN. Also, a weight that represents the degree of testing priority is given to each transition of a PN. Our algorithm that heuristically searches the extended PN generates a specified number of feasible test cases that focus on parts of higher testing priority.
-
Evaluation of Index Poisoning Method in Large Scale Winny Network
Aburada Kentaro, Kita Yoshihiro, Yamaba Hisaaki, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES 17 999 - 1006 2018
Language:Japanese Publishing type:Research paper (scientific journal)