


default search action
Atsushi Kanai
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c81]Hiroki Koyama, Shigeaki Tanimoto, Atsushi Shimoda, Seiko Taki, Atsushi Kanai:
Introduction of Information Security Fatigue Scale for Teleworking and its Effectiveness. BCD 2024: 239-246 - [c80]Shigeaki Tanimoto, Shinko Usami, Takashi Hatashima
, Atsushi Kanai:
Nudge Application Methods for Enhancing Information Security Countermeasures. GCCE 2024: 896-897 - [c79]Shigeaki Tanimoto, Saki Suzuki, Hiroki Koyama, Keita Nagai, Takashi Hatashima, Atsushi Kanai:
Improvement Methods for Work Motivation in Telework. NBiS 2024: 255-267 - 2023
- [j8]Yangchen Palmo, Shigeaki Tanimoto
, Hiroyuki Sato
, Atsushi Kanai:
Optimal Federation Method for Embedding Internet of Things in Software-Defined Perimeter. IEEE Consumer Electron. Mag. 12(5): 68-75 (2023) - [c78]Tohru Tomiyama, Qian Wu, Atsushi Kanai:
Dynamic Analysis for Malware Detection Using API Calls and Memory Usage With Machine Learning Approach. GCCE 2023: 475-477 - [c77]Shigeaki Tanimoto, Ryusei Nakajima, Hideki Goromaru, Takashi Hatashima, Atsushi Kanai:
Risk Countermeasures Based on Five Whys Analysis Considering Offensive Security. GCCE 2023: 640-642 - [c76]Toru Kobayashi, Haruka Hata, Kazuki Fukae, Hiroyuki Sato, Shigeaki Tanimoto, Atsushi Kanai:
Digital Twin Configuration Method for Public Services by Citizens. ICCE 2023: 1-3 - [c75]Shigeaki Tanimoto, Tatsuya Sugio, Hiroyuki Sato, Atsushi Kanai:
Security Policy Matching Model between Mobile IoT and Public Fog Computing. IIAI-AAI 2023: 639-644 - [c74]Shigeaki Tanimoto, Sogen Hori, Hiroyuki Sato, Atsushi Kanai:
Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model. SERA 2023: 440-445 - 2022
- [c73]Shigeaki Tanimoto, Yudai Watanabe, Hiroyuki Sato, Atsushi Kanai:
Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation. AINA (3) 2022: 324-333 - [c72]Qian Wu, Jiading Wang, Sibo Chen, Atsushi Kanai:
Resource allocation problem in multi-band space-division multiplexing elastic optical networks. CIS 2022: 225-228 - [c71]Tomo Yuki, Shigeaki Tanimoto, Hideki Goromaru, Hiroyuki Sato, Atsushi Kanai:
Multilayer Defense Security Management in Consideration of TPO Conditions. GCCE 2022: 123-124 - [c70]Ryota Yoshizaki, Atsushi Kanai:
Malicious investigation of Docker images on basis of vulnerability databases. GCCE 2022: 131-134 - [c69]Ryuya Mishina, Shigeaki Tanimoto, Hideki Goromaru, Hiroyuki Sato, Atsushi Kanai:
An Extended Visualization Model for Silent Cyber Risks Considering Non-cyber Aspects. GCCE 2022: 270-271 - [c68]Teruo Endo, Nao Ohmori, Shigeaki Tanimoto, Takashi Hatashima, Atsushi Kanai:
Risk Assessment Quantification for Remote Learning Based on Lecture Type. IIAI-AAI 2022: 561-567 - [c67]Hiroki Koyama, Yuuna Nakagawa, Shigeaki Tanimoto, Teruo Endo, Takashi Hatashima, Atsushi Kanai:
A Study of Risk Assessment Quantification for Secure Telework. IIAI-AAI 2022: 574-580 - [c66]Shigeaki Tanimoto, Takumi Suzuki, Takashi Hatashima, Atsushi Kanai:
Common Factor Analysis of Information Security Incidents Based on Psychological Factors. NBiS 2022: 248-257 - 2021
- [j7]Misato Ogawa, Shigeaki Tanimoto, Takashi Hatashima, Atsushi Kanai:
Information Security Fatigue Countermeasures Using Cognitive Strategy Scale Based on Web Questionnaires. Int. J. Netw. Comput. 11(2): 412-425 (2021) - [c65]Junji Wu, Atsushi Kanai:
Utilizing obfuscation information in deep learning-based Android malware detection. COMPSAC 2021: 1321-1326 - [c64]Reiji Kobayashi, Atsushi Kanai:
Blockchain-based Self-scoring Method. GCCE 2021: 1-5 - [c63]Yangchen Palmo, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
IoT Reliability Improvement Method for Secure Supply Chain Management. GCCE 2021: 364-365 - [c62]Hiroki Koyama, Yuuna Nakagawa, Shigeaki Tanimoto, Teruo Endo, Takashi Hatashima, Atsushi Kanai:
Risk Assessment of Telework for the New Normal Era. GCCE 2021: 496-497 - [c61]Ryuya Mishina, Shigeaki Tanimoto, Hideki Goromaru, Hiroyuki Sato, Atsushi Kanai:
A Visualization Model for Silent Cyber Risks Contained in Emerging Risks. GCCE 2021: 498-499 - [c60]Yangchen Palmo, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
Complementary Methods of IoT Reliability for Embedding IoT Devices into SDP. ICCE-Berlin 2021: 1-6 - 2020
- [c59]Misato Ogawa, Shigeaki Tanimoto, Takashi Hatashima
, Atsushi Kanai:
Information Security Fatigue Countermeasures Based on Cognitive Strategy Scale. CANDAR (Workshops) 2020: 362-367 - [c58]Yusuke Taguchi, Atsushi Kanai, Shigeaki Tanimoto:
A Distributed Log Management Method using a Blockchain Scheme. ICCE 2020: 1-3 - [c57]Sonam Wangyal, Tenzin Dechen, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
A Study of Multi-viewpoint Risk Assessment of Internet of Things (IoT). IIAI-AAI 2020: 639-644 - [c56]Tenzin Dechen, Sonam Wangyal, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
Risk Management of Mobile Workers based on Multiple Viewpoints. IIAI-AAI 2020: 645-650 - [c55]Souta Kawahara, Atsushi Kanai:
Considerations for Using DPDK in a Hypervisor Virtual Environment. NBiS 2020: 261-268 - [c54]Shigeaki Tanimoto, Yuzuka Sato, Prajak Chertchom, Hiroyuki Sato, Atsushi Kanai:
Proposal of a Perimeter Line Management Method for Fog and Edge Computing with SDP Concept. NBiS 2020: 290-302 - [c53]Hiroyuki Sato, Shigeaki Tanimoto, Atsushi Kanai:
Risk Breakdown Structure and Security Space for Security Management. SOSE 2020: 7-16 - [c52]Toru Kobayashi, Kenichi Arai, Tetsuo Imai, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai, Teiichiro Miyazaki, Akira Tsujino:
Service-Oriented Software Design Model for Communication Robot. SOSE 2020: 31-39
2010 – 2019
- 2019
- [c51]Toru Kobayashi, Kenichi Arai, Tetsuo Imai, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
Communication Robot for Elderly Based on Robotic Process Automation. COMPSAC (2) 2019: 251-256 - [c50]Souta Kawahara, Hiroki Shirokura, Atsushi Kanai:
The Fast Software Router "Kamuee" vs. Linux. GCCE 2019: 68-70 - [c49]Soichiro Kogo, Atsushi Kanai:
Detection of Malicious Communication Using DNS Traffic Small Features. GCCE 2019: 125-126 - [c48]Shigeaki Tanimoto, Kohei Chiba, Hiroyuki Sato, Atsushi Kanai:
A Study of Risk Assessment for Sharing Economy based on a User's Viewpoint. GCCE 2019: 240-242 - [c47]Shogo Maeda, Atsushi Kanai, Shigeaki Tanimoto, Takashi Hatashima, Kazuhiko Ohkubo:
A Botnet Detection Method on SDN using Deep Learning. ICCE 2019: 1-6 - [c46]Prajak Chertchom, Shigeaki Tanimoto, Tsutomu Konosu, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems. IIAI-AAI 2019: 884-889 - [c45]Prajak Chertchom, Shigeaki Tanimoto, Tsutomu Konosu, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Edge Computing Platform Management: Design for F2C and F2F for Small Businesses to Reduce Costs. IIAI-AAI 2019: 890-895 - [c44]Shigeaki Tanimoto, Yuuki Takahashi, Ayaka Takeishi, Sonam Wangyal, Tenzin Dechen, Hiroyuki Sato, Atsushi Kanai:
Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines. NBiS 2019: 413-422 - 2018
- [j6]Atsushi Kanai:
Foreword. IEICE Trans. Inf. Syst. 101-D(11): 2559-2560 (2018) - [c43]Takashi Hatashima
, Keita Nagai, Asami Kishi, Hikaru Uekusa, Shigeaki Tanimoto, Atsushi Kanai, Hitoshi Fuji, Kazuhiko Ohkubo:
Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime. COMPSAC (2) 2018: 707-712 - [c42]Keiya Matsuo, Atsushi Kanai, Takashi Hatashima, Shigeaki Tanimoto:
Dynamic Authentication Method Dependent on Surrounding Environment. GCCE 2018: 855-857 - [c41]Hiroyuki Sato, Shigeaki Tanimoto, Toru Kobayashi, Atsushi Kanai:
Adaptive Policy Evaluation Framework for Flexible Service Provision. SOSE 2018: 124-131 - 2017
- [j5]Toru Kobayashi, Kenichi Arai, Hiroyuki Sato, Shigeaki Tanimoto, Atsushi Kanai:
An Application Framework for Smart Education System Based on Mobile and Cloud Systems. IEICE Trans. Inf. Syst. 100-D(10): 2399-2410 (2017) - [c40]Shigeaki Tanimoto, Keita Nagai, Kenichiro Hata, Takashi Hatashima
, Yasuhisa Sakamoto, Atsushi Kanai:
A Concept Proposal on Modeling of Security Fatigue Level. ACIT/CSII/BCD 2017: 29-34 - [c39]Yuya Kato, Atsushi Kanai, Shigeaki Tanimoto, Takashi Hatashima:
Dynamic security level analysis method using attack tree. GCCE 2017: 1-3 - [c38]Naoki Wakabayashi, Masayuki Kuriyama, Atsushi Kanai:
Personal authentication method against shoulder-surfing attacks for smartphone. ICCE 2017: 153-155 - [c37]Shigeaki Tanimoto, Shun Totsuka, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era. NBiS 2017: 737-749 - [c36]Yamato Miura, Naoki Wakabayashi, Shohei Ueno, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud. NBiS 2017: 888-900 - 2016
- [c35]Shigeaki Tanimoto, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
Risk assessment quantification of social-media utilization in enterprise. ICIS 2016: 1-6 - [c34]Yuta Isono, Yu Ichifuji, Hiroyuki Sato, Shigeaki Tanimoto, Atsushi Kanai, Toru Kobayashi, Noboru Sonehara:
Automatic LOD conversion system of tweet data associated with tourist spots. GCCE 2016: 1-2 - [c33]Shunsuke Kan, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato, Toru Kobayashi:
Temporary grouping method using smartphones. GCCE 2016: 1-2 - [c32]Shigeaki Tanimoto, Susumu Yamada, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Risk assessment of BYOD: Bring your own device. GCCE 2016: 1-4 - [c31]Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
Performance evaluation on data management approach for multiple clouds using secret sharing scheme. ICCE 2016: 471-473 - [c30]Shigeaki Tanimoto, Rei Kinno, Motoi Iwashita, Tohru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service. IIAI-AAI 2016: 1126-1131 - [c29]Shigeaki Tanimoto, Shunsuke Shiraki, Motoi Iwashita, Tohru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network. NBiS 2016: 280-285 - [c28]Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto, Toru Kobayashi:
Establishing Trust in the Emerging Era of IoT. SOSE 2016: 398-406 - 2015
- [c27]Shigeaki Tanimoto, Takayuki Kakuta, Hiroyuki Sato, Atsushi Kanai:
A Study of Cost Structure Visualization for Digital Forensics Deployment. ACIT-CSI 2015: 428-431 - [c26]Shohei Ueno, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
Secure protocol with variable security level using secret sharing scheme. GCCE 2015: 626-627 - [c25]Masahiko Shimazu, Atsushi Kanai, Shigeki Tanimoto, Hiroyuki Sato:
Dynamic risk evaluation model as a security field. GCCE 2015: 628-629 - [c24]Shoichi Yoneda, Shigeaki Tanimoto, Michio Shimomura, Hiroyuki Sato, Atsushi Kanai:
Cost reduction effect on running costs in ISMS based on sensors. GCCE 2015: 630-631 - [c23]Akira Aratani, Atsushi Kanai:
Authentication method against shoulder-surfing attacks using secondary channel. ICCE 2015: 430-431 - [c22]Yuuki Kajiura, Shohei Ueno, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
An Approach to Selecting Cloud Services for Data Storage in Heterogneous-Multicloud Environment with High Availability and Confidentiality. ISADS 2015: 205-210 - [c21]Shoichi Yoneda, Shigeaki Tanimoto, Tsutomu Konosu, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment in Cyber-Physical System in Office Environment. NBiS 2015: 412-417 - [c20]Shigeaki Tanimoto, Toshihiko Moriya, Hiroyuki Sato, Atsushi Kanai:
Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment. SNPD 2015: 571-575 - [c19]Shigeaki Tanimoto, Kenichi Ohata, Shoichi Yoneda, Motoi Iwashita, Hiroyuki Sato, Yoshiaki Seki, Atsushi Kanai:
Risk assessment of social-media utilization in an enterprise. SNPD 2015: 577-580 - 2014
- [c18]Shigeaki Tanimoto, Ryota Sato, Kazuhiko Kato, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
A Study of Risk Assessment Quantification in Cloud Computing. NBiS 2014: 426-431 - [c17]Atsushi Kanai, Naoya Kikuchi, Shigeaki Tanimoto, Hiroyuki Sato:
Data Management Approach for Multiple Clouds Using Secret Sharing Scheme. NBiS 2014: 432-437 - [c16]Shigeaki Tanimoto, Ken Takahashi, Taro Yabuki, Kazuhiko Kato, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai:
Risk assessment quantification in life log service. SNPD 2014: 1-6 - 2013
- [c15]Yuuki Kajiura, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud. COMPSAC Workshops 2013: 212-217 - [c14]Shigeaki Tanimoto, Yorihiro Sakurada, Yosiaki Seki, Motoi Iwashita, Shinsuke Matsui, Hiroyuki Sato, Atsushi Kanai:
A Study of Data Management in Hybrid Cloud Configuration. SNPD 2013: 381-386 - 2012
- [j4]Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement. Inf. Media Technol. 7(3): 1274-1282 (2012) - [j3]Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement. J. Inf. Process. 20(3): 640-648 (2012) - [c13]Shigeaki Tanimoto, Shinichi Mizuhara, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:
Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance. COMPSAC Workshops 2012: 100-105 - [c12]Shigeaki Tanimoto, Daisuke Sakurai, Yosiaki Seki, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai:
Risk Management to User Perception of Insecurity in Ambient Service. SNPD 2012: 771-776 - 2011
- [c11]Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto:
Building a Security Aware Cloud by Extending Internal Control to Cloud. ISADS 2011: 323-326 - [c10]Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:
Quantifying Cost Structure of Campus PKI. SAINT 2011: 315-320 - 2010
- [c9]Ryosuke Yasui, Atsushi Kanai, Takashi Hatashima, Keiichi Hirota:
The Metric Model for Personal Information Disclosure. ICDS 2010: 112-117 - [c8]Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto:
A Cloud Trust Model in a Security Aware Cloud. SAINT 2010: 121-124
2000 – 2009
- 2007
- [j2]Koji Chida, Go Yamamoto, Koutarou Suzuki, Shigenori Uchiyama, Noburou Taniguchi, Osamu Shionoiri, Atsushi Kanai:
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 128-138 (2007) - [c7]Koji Chida, Osamu Shionoiri, Atsushi Kanai:
Secure Anonymous Communications with Practical Anonymity Revocation Scheme. IWSEC 2007: 352-364 - 2005
- [c6]Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai:
DECIDE: a scheme for decentralized identity escrow. Digital Identity Management 2005: 37-45 - 2004
- [j1]Hiroyuki Sato, Atsushi Kanai:
A Technical Survey of Data Integration and Information Sharing Using Knowledge Representation on the Web. IEICE Trans. Inf. Syst. 87-D(11): 2435-2445 (2004) - 2002
- [c5]Toru Kawamura, Atsushi Kanai, Kaku Take-Uchi, Tetsuyuki Mutou:
A Proposed Net-space Service Using "InfoLead" Cruising Navigation Technology. SAINT 2002: 31-32 - [c4]Katsuya Arai, Tetsuyuki Mutou, Atsushi Kanai:
InfoLead - A New Concept for Cruising Navigation Technology. SAINT 2002: 162-167 - 2001
- [c3]Kazuhiro Kiwata, Atsushi Nakano, Shunsuke Yura, Tomotaka Uchihashi, Atsushi Kanai:
Scenario-Based Service Composition Method in the Open Service Environment. ISADS 2001: 135-142 - [c2]Shunsuke Yura, Kazuhiro Kiwata, Atsushi Nakano, Tomotaka Uchihashi, Atsushi Kanai:
Service Matching and Collaboration for Electronic Commerce. ISADS 2001: 169-175 - [c1]Junichi Toyouchi, Motohisa Funabashi, Linda Strick, Marc Born, Atsushi Kanai, Tomotaka Uchihashi, Satoshi Hakomori, Eiji Yoshida, Norihisa Komoda:
Development of Service Integration Platform for One-Stop Service Applications. WECWIS 2001: 123-127
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 00:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint