{"id":"https://openalex.org/W2028969666","doi":"https://doi.org/10.1145/2660267.2662392","title":"POSTER","display_name":"POSTER","publication_year":2014,"publication_date":"2014-11-03","ids":{"openalex":"https://openalex.org/W2028969666","doi":"https://doi.org/10.1145/2660267.2662392","mag":"2028969666"},"language":"en","primary_location":{"id":"doi:10.1145/2660267.2662392","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2662392","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009420902","display_name":"Yutaka Juba","orcid":null},"institutions":[{"id":"https://openalex.org/I135768898","display_name":"Ritsumeikan University","ror":"https://ror.org/0197nmd03","country_code":"JP","type":"education","lineage":["https://openalex.org/I135768898","https://openalex.org/I4390039241"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yutaka Juba","raw_affiliation_strings":["Ritsumeikan University, Kusatsu-shi, Shiga, Japan","Ritsumeikan University, Kusatsu-shi, Shiga, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Ritsumeikan University, Kusatsu-shi, Shiga, Japan","institution_ids":["https://openalex.org/I135768898"]},{"raw_affiliation_string":"Ritsumeikan University, Kusatsu-shi, Shiga, Japan#TAB#","institution_ids":["https://openalex.org/I135768898"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084384514","display_name":"Hung\u2010Hsuan Huang","orcid":"https://orcid.org/0000-0002-0376-3535"},"institutions":[{"id":"https://openalex.org/I135768898","display_name":"Ritsumeikan University","ror":"https://ror.org/0197nmd03","country_code":"JP","type":"education","lineage":["https://openalex.org/I135768898","https://openalex.org/I4390039241"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hung-Hsuan Huang","raw_affiliation_strings":["Ritsumeikan University, Kusatsu-shi, Shiga, Japan","Ritsumeikan University, Kusatsu-shi, Shiga, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Ritsumeikan University, Kusatsu-shi, Shiga, Japan","institution_ids":["https://openalex.org/I135768898"]},{"raw_affiliation_string":"Ritsumeikan University, Kusatsu-shi, Shiga, Japan#TAB#","institution_ids":["https://openalex.org/I135768898"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046572165","display_name":"Kyoji Kawagoe","orcid":"https://orcid.org/0000-0001-8113-0031"},"institutions":[{"id":"https://openalex.org/I135768898","display_name":"Ritsumeikan University","ror":"https://ror.org/0197nmd03","country_code":"JP","type":"education","lineage":["https://openalex.org/I135768898","https://openalex.org/I4390039241"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kyoji Kawagoe","raw_affiliation_strings":["Ritsumeikan University, Kusatsu-shi, Shiga, Japan","Ritsumeikan University, Kusatsu-shi, Shiga, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Ritsumeikan University, Kusatsu-shi, Shiga, Japan","institution_ids":["https://openalex.org/I135768898"]},{"raw_affiliation_string":"Ritsumeikan University, Kusatsu-shi, Shiga, Japan#TAB#","institution_ids":["https://openalex.org/I135768898"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009420902"],"corresponding_institution_ids":["https://openalex.org/I135768898"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.11905977,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1442","last_page":"1444"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.702277660369873},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6340411305427551},{"id":"https://openalex.org/keywords/local-area-network","display_name":"Local area network","score":0.5780928134918213},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.5749271512031555},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.4866093397140503},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.47859475016593933},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4467766284942627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39938974380493164},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33643069863319397},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3237268328666687}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.702277660369873},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6340411305427551},{"id":"https://openalex.org/C137471899","wikidata":"https://www.wikidata.org/wiki/Q11381","display_name":"Local area network","level":2,"score":0.5780928134918213},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.5749271512031555},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.4866093397140503},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.47859475016593933},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4467766284942627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39938974380493164},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33643069863319397},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3237268328666687},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2660267.2662392","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2662392","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1471023127","display_name":null,"funder_award_id":"24300039","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320320912","display_name":"Ministry of Education, Culture, Sports, Science and Technology","ror":"https://ror.org/048rj2z13"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1972138468","https://openalex.org/W2185839618"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2394779770","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W1979872045","https://openalex.org/W613315116","https://openalex.org/W4245917211","https://openalex.org/W996906365"],"abstract_inverted_index":{"With":[0],"the":[1,32,75,80,84,114,121],"emergence":[2],"of":[3,13,67,97,131],"inexpensive":[4],"network":[5,9,30,70],"components":[6],"and":[7],"high-speed":[8],"services,":[10],"a":[11,28,47,55,62,69,98],"variety":[12],"network-capable":[14],"electronic":[15],"devices":[16,39,78,99],"have":[17,118],"become":[18],"available.":[19],"However,":[20],"as":[21],"no":[22],"self-defence":[23],"mechanism":[24],"is":[25,100],"equipped":[26],"in":[27,46,61,79],"usual":[29],"device,":[31],"device":[33],"can":[34,110,123],"be":[35,111],"attacked":[36],"by":[37,41,82,113],"other":[38],"or":[40],"attackers,":[42],"which":[43],"causes":[44],"it":[45],"vulnerable":[48],"state.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53],"propose":[54],"system":[56,74],"for":[57],"keeping":[58],"an":[59,103],"Intra-LAN":[60],"secure":[63,108,125],"state":[64],"with":[65,126],"isolation":[66,96],"such":[68],"information":[71],"device.":[72],"The":[73,89,95],"communications":[76],"between":[77],"LAN":[81,109,122,128],"introducing":[83],"safety-and-performance":[85],"ratio":[86],"control":[87,90],"policies.":[88],"policies":[91],"are":[92],"controlled":[93,116],"dynamically.":[94],"performed":[101],"using":[102],"intrusion":[104],"detection":[105],"system.":[106,133],"A":[107],"maintained":[112],"dynamic":[115],"policies.We":[117],"confirmed":[119],"that":[120],"keep":[124],"actual":[127],"environment":[129],"experiments":[130],"our":[132]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
