{"id":3386,"date":"2020-11-10T12:06:51","date_gmt":"2020-11-10T03:06:51","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=3386"},"modified":"2021-12-21T10:34:16","modified_gmt":"2021-12-21T01:34:16","slug":"results2017","status":"publish","type":"page","link":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/results-final\/results2017\/","title":{"rendered":"Research Results\uff5cin 2017"},"content":{"rendered":"<p><a href=\"#paper\">Paper Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/a>\u3000\u3000<a href=\"#presentation\">Conference Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/a>\u3000<a id=\"paper\"><\/a><\/p>\n<h2>Paper Presentation<\/h2>\n<h4><span lang=\"en\">Co-authored papers with India research team<\/span><\/h4>\n<table style=\"width: 100%; border-style: solid; border-color: #ababab;\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 87px;\">Author<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; height: 87px;\">Title<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 87px;\">Publisher<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; height: 87px;\">Volume<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; height: 87px;\">Number<\/td>\n<td style=\"width: 3%; border-style: solid; border-color: #ababab; height: 87px;\">Page<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; height: 87px;\">Published year<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; height: 87px;\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Chenguang Ma,<br \/>\nSrishti Kulshrestha,<br \/>\nWei Shi,<br \/>\nYoshihiro Okada,<br \/>\nRanjan Bose,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">E-Learning Material Development Framework Supporting VR\/AR Based on Linked Data for IoT Security Education<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Lecture Notes on Data Engineering and Communications Technologies (LNDECT)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 3%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Chenguang Ma,<br \/>\nSrishti Kulshrestha,<br \/>\nWei Shi,<br \/>\nYoshihiro Okada,<br \/>\nRanjan Bose,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">EDUCATIONAL MATERIAL DEVELOPMENT FRAMEWORK BASED ON LINKED DATA FOR IOT SECURITY<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Proceedings of International Conference of Education, Research and Innovation (ICERI2017)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 3%; border-style: solid; border-color: #ababab; vertical-align: top;\">8048-8057<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Chenguang Ma,<br \/>\nSrishti Kulshrestha,<br \/>\nWei Shi,<br \/>\nYoshihiro Okada,<br \/>\nRanjan Bose,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">LEARNING ANALYTICS FRAMEWORK FOR IOT SECURITY EDUCATION<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Proceedings of International Technology, Education and Development Conference (INTED2018)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 3%; border-style: solid; border-color: #ababab; vertical-align: top;\">9181-9191<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2018<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">Mar<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4><span lang=\"en\">Co-authored papers with Japan research team<\/span><\/h4>\n<table style=\"width: 100%; border-style: solid; border-color: #ababab; height: 387px;\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 87px;\">Author<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; height: 87px;\">Title<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 87px;\">Publisher<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; height: 87px;\">Volume<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; height: 87px;\">Number<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; height: 87px;\">Page<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; height: 87px;\">Published year<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; height: 87px;\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Xiang You,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Packet In message based DDoS attack detection in SDN network using OpenFlow<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">IPSJ SIG Technical Report<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Xiang You,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Packet In message based DDoS attack detection in SDN network using OpenFlow<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">International Symposium on Computing and Networking (CANDAR)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">522-528<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Ikuta Tanigawa,<br \/>\nKenji Hisazumi,<br \/>\nHarumi Watanabe,<br \/>\nNobuhiko Ogura,<br \/>\nAkira Fukuda,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">IoT Robot Simulator and Framework for Context-Oriented Programming<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">International Workshop on Context-Oriented Programming (COP 2017)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">Jun<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Mihiro Sonoyama,<br \/>\nTakatsugu Ono,<br \/>\nOsamu Muta,<br \/>\nHaruichi Kanaya,<br \/>\nKoji Inoue,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">International Conference on Dependable, Autonomic and Secure Computing (DASC)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">502-510<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Tianxiang Zou,<br \/>\nKenji Hisazumi,<br \/>\nAkira Fukuda,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Toward Security and Privacy Policy Enforcement System for IoT Applications<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Proceedings of Embedded System Workshop (ESW2017)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">11-13<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Fumiya Tanaka,<br \/>\nKenji Hisazumi,<br \/>\nShigemi Ishida,<br \/>\nAkira Fukuda,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">A Methodology to Develop Energy Adaptive Software Using Model-Driven Development<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">IEEE Region 10 International Conference (TENCON)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">769-774<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\">Dec<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Single-<span lang=\"en\">authored papers of<\/span> India research team<\/h4>\n<table style=\"width: 100%; border-style: solid; border-color: #e5e5e5;\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5;\">\n<td style=\"width: 20.0%; border-style: solid; border-color: #ababab;\">Author<\/td>\n<td style=\"width: 34.0%; border-style: solid; border-color: #ababab;\">Title<\/td>\n<td style=\"width: 20.0%; border-style: solid; border-color: #ababab;\">Publisher<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab;\">Volume<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab;\">Number<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab;\">Page<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab;\">Published year<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab;\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Sukrit Kalra,<br \/>\nSeep Goel,<br \/>\nMohan Dhawan,<br \/>\nSubodh Sharma,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">ZEUS: Analyzing Safety of Smart Contracts<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Network and Distributed System Security Symposium (NDSS)<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\">2018<\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Geeta Yadav,<br \/>\nKolin Paul,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Architecture and Security of SCADA Systems: A Review<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">ACM Computing Survey<\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 6%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 4%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>Conference Presentation<a id=\"presentation\"><\/a><\/h2>\n<h4>Collaborative Presentation with Japan &#8211; India research team<\/h4>\n<table style=\"width: 100%; border-style: solid; border-color: #e5e5e5;\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 47px;\">Presenter<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; height: 47px;\">Title<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 47px;\">Conference<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; height: 47px;\">Venue<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; height: 47px;\">Presented year<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; height: 47px;\">Presented month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Chenguang Ma,<br \/>\nSrishti Kulshrestha,<br \/>\nWei Shi,<br \/>\nYoshihiro Okada,<br \/>\nRanjan Bose,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">EDUCATIONAL MATERIAL DEVELOPMENT FRAMEWORK BASED ON LINKED DATA FOR IOT SECURITY<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">10th annual International Conference of Education, Research and Innovation (ICERI2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Seville, Spain,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">11\/16-18<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Chenguang Ma,<br \/>\nSrishti Kulshrestha,<br \/>\nWei Shi,<br \/>\nYoshihiro Okada,<br \/>\nRanjan Bose,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">LEARNING ANALYTICS FRAMEWORK FOR IOT SECURITY EDUCATION<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">12th annual Technology, Education and Development Conference (INTED2018)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Valencia, Spain,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">3\/5-7<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Chenguang Ma,<br \/>\nSrishti Kulshrestha,<br \/>\nWei Shi,<br \/>\nYoshihiro Okada,<br \/>\nRanjan Bose,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">E-Learning Material Development Framework Supporting VR\/AR Based on Linked Data for IoT Security Education<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The 6th International Conference on Emerging Internet, Data &amp; Web Technologies (EIDWT 2018)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Tirana, Albania,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">3\/15-17<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Presentation of Japan research team<\/h4>\n<table style=\"width: 100%; border-style: solid; border-color: #e5e5e5; height: 1790px;\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 47px;\">Presenter<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; height: 47px;\">Title<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; height: 47px;\">Conference<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; height: 47px;\">Venue<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; height: 47px;\">Presented year<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; height: 47px;\">Presented month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 105px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Ikuta Tanigawa,<br \/>\nHarumi Watanabe,<br \/>\nNobuhiko Ogura,<br \/>\nKenji Hisazumi,<br \/>\nAkira Fukuda,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">IoT Robot Simulator for Context-Sensitive and Live-Adaptive Software Developments<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Proceedings of Live Adaptation of Software Systems Workshop (LASSY 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Brussels, Belgium,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">4\/3<\/td>\n<\/tr>\n<tr style=\"height: 84px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Mihiro Sonoyama,<br \/>\nTatsuya Fujii,<br \/>\nTakatsugu Ono,<br \/>\nOsamu Muta,<br \/>\nKoji Inoue,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Evaluation of received signal strength device authentication method in noisy environment<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Workshop for LSI and System in 2017<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">The University of Tokyo, Tokyo, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">5\/15-16<\/td>\n<\/tr>\n<tr style=\"height: 63px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Takatsugu Ono,<br \/>\nKoyo Miyamura,<br \/>\nKoji Inoue,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Malware Attacks and Countermeasures in IoT Systems &#8211; From the perspective of processor architecture &#8211;<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">IEICE Technical Committee on Hardware Security (HWS)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Aomori, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">6\/12-13<\/td>\n<\/tr>\n<tr style=\"height: 105px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Ikuta Tanigawa,<br \/>\nKenji Hisazumi,<br \/>\nHarumi Watanabe,<br \/>\nNobuhiko Ogura,<br \/>\nAkira Fukuda,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">IoT Robot Simulator and Framework for Context-Oriented Programming<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">International Workshop on Context-Oriented Programming (COP 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Barcelona, Spain,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">6\/18-23<\/td>\n<\/tr>\n<tr style=\"height: 63px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Takatsugu Ono,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Protecting an IoT Device from Malware &#8211; A Processor Architecture Perspective<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Workshop on Architectural Implications of Security in IoT Processors<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Aomori, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">11\/1<\/td>\n<\/tr>\n<tr style=\"height: 84px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Fumiya Tanaka,<br \/>\nKenji Hisazumi,<br \/>\nShigemi Ishida,<br \/>\nAkira Fukuda,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">A Methodology to Develop Energy Adaptive Software Using Model-Driven Development<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">The 2017 IEEE Region 10 Conference(TENCON)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Penang, Malaysia,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">11\/5-8<\/td>\n<\/tr>\n<tr style=\"height: 105px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Mihiro Sonoyama,<br \/>\nTakatsugu Ono,<br \/>\nOsamu Muta,<br \/>\nHaruichi Kanaya,<br \/>\nKoji Inoue,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing(DASC 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Orlando, Florida, USA<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">11\/6-10<\/td>\n<\/tr>\n<tr style=\"height: 63px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Sanouphab Phomkeona,<br \/>\nYoshitatsu Ban,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">An Investigation and Analysis Method for Suspicious Zero-day Malicious Emails<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Proceedings of International Conference on Internet (ICONI 2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Greece,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">11\/22-24<\/td>\n<\/tr>\n<tr style=\"height: 63px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Rin-ichiro Taniguchi,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">IoT Applications for Social Services<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Workshop on Architectural Implications of Security in IoT Processors<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Indian Institute of Technology Delhi, India,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">11\/28<\/td>\n<\/tr>\n<tr style=\"height: 84px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Kazuya Nakayama,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Blockchain System Aiming for Effective Use of Computing Resources<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">The 79th Computer Security Research Presentation<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">12\/4<\/td>\n<\/tr>\n<tr style=\"height: 126px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">Jeanne Faurie,<br \/>\nAtsushi Shimada,<br \/>\nMaiya Hori,<br \/>\nAkira Onoue,<br \/>\nKeita Nakayama,<br \/>\nRin-ichiro Taniguchi,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">Behavior analysis of people around Wi-Fi spots<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">The 15th ITS Symposium in 2017<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">12\/7<\/td>\n<\/tr>\n<tr style=\"height: 63px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Tianxiang Zou,<br \/>\nKenji Hisazumi,<br \/>\nAkira Fukuda,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Toward Security and Privacy Policy Enforcement System for IoT Applications<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Proceedings of Embedded Systems Workshop 2017 (ESW2017)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">Tokyo, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 63px;\">12\/9<\/td>\n<\/tr>\n<tr style=\"height: 126px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">Koji Okamura,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">Study on effect about introduction of serious game into Cybersecurity Primary Education<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">2017 Academic eXchange for Information Environment and Strategy (AXIES)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">International Conference Center Hiroshima, Hiroshima, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">12\/13-15<\/td>\n<\/tr>\n<tr style=\"height: 84px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Takatsugu Ono,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Secure Computing Platform for IoT Devices<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">The 6th International Workshop on Cybersecurity (IWCS)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">1\/22<\/td>\n<\/tr>\n<tr style=\"height: 84px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Takatsugu Ono,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Hardware Security Techniques in IoT era<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Kyushu University Institute for Advanced Study Institute of Systems, Information Technologies anResearch Exchange Research Exchange Meeting<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">1\/29<\/td>\n<\/tr>\n<tr style=\"height: 126px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">Hiroki Nishida,<br \/>\nKosuke Kaneko,<br \/>\nShota Jojima,<br \/>\nKazuya Nakayama,<br \/>\nYusuke Tsutsumi,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">Proposal of Secure Information Sharing for Swarm Robot System using Blockchain Technology<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">2018 \u201cHinokuni &#8211; Land of Fire\u201d Information Processing Symposium<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">Nagasaki\u00a0 University, Nagasaki, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 126px;\">3\/1-2<\/td>\n<\/tr>\n<tr style=\"height: 105px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Shota Jojima,<br \/>\nKosuke Kaneko,<br \/>\nHiroki Nishida,<br \/>\nYusuke Tsutsumi,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Implementation for Neural Network Executed in Secure Distributed Processing using Blockchain<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">2018 \u201cHinokuni &#8211; Land of Fire\u201d Information Processing Symposium<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">Nagasaki\u00a0 University, Nagasaki, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 105px;\">3\/1-2<\/td>\n<\/tr>\n<tr style=\"height: 84px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Shunsuke Komiya,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">How to Prepare for Research on SDN Network<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">2018 \u201cHinokuni &#8211; Land of Fire\u201d Information Processing Symposium<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Nagasaki\u00a0 University, Nagasaki, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">3\/1-2<\/td>\n<\/tr>\n<tr style=\"height: 84px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Hitoshi Akimoto,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Comparison of detection performance of command &amp; control communication by different feature selection<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">2018 \u201cHinokuni &#8211; Land of Fire\u201d Information Processing Symposium<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">Nagasaki\u00a0 University, Nagasaki, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 84px;\">3\/1-2<\/td>\n<\/tr>\n<tr style=\"height: 42px;\">\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 42px;\">Koji Okamura,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top; height: 42px;\">Security in the IOT Space (Joint-Project between Japan and India)<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top; height: 42px;\">45th Asia Pacific Advanced Network (APAN45) Meeting<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top; height: 42px;\">Singapore,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 42px;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top; height: 42px;\">3\/25-29<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Presentation of India research team<\/h4>\n<table style=\"width: 100%; border-style: solid; border-color: #e5e5e5;\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5;\">\n<td style=\"width: 20.0%; border-style: solid; border-color: #ababab;\">Presenter<\/td>\n<td style=\"width: 34.0%; border-style: solid; border-color: #ababab;\">Title<\/td>\n<td style=\"width: 20.0%; border-style: solid; border-color: #ababab;\">Conference<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab;\">Venue<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab;\">Presented year<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab;\">Presented month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Ismi Abidi,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Potential security threats in the IoT world<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The 5th International Workshop on Cybersecurity<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">7\/14<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Smruti Ranjan Sarangi,<br \/>\nIsmi Abidi,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Framework for evaluating the cost of security in IoT processors<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Workshop on Architectural Implications of Security in IoT Processors<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Indian Institute of Technology Delhi, India,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2017<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">11\/28<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Ismi Abidi,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Framework for evaluating the cost of security in IoT Processors<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">The 6th International Workshop on Cybersecurity (IWCS)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Kyushu University, Fukuoka, Japan,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">1\/22<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Sanjiva Prasad,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">Formal foundations of routing in networks<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Estonian Winter School in Computer Science (EWSCS&#8217;18)<\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">Palmse, Estonia,<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">3\/4-9<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\">Sanjiva Prasad,<\/td>\n<td style=\"width: 34%; border-style: solid; border-color: #ababab; vertical-align: top;\">A LitTLe logic for Mobility<\/td>\n<td style=\"width: 20%; border-style: solid; border-color: #ababab; vertical-align: top;\"><\/td>\n<td style=\"width: 10%; border-style: solid; border-color: #ababab; vertical-align: top;\">The University of Sheffield, UK<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">2018<\/td>\n<td style=\"width: 8%; border-style: solid; border-color: #ababab; vertical-align: top;\">3\/5<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paper Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]\u3000\u3000Conference Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]\u3000 Paper Presentation Co-authored papers with India research team Author Title Publisher Volume Number Page Published year Published month Chenguang Ma, Srishti Kulshrestha, Wei Shi, Yoshihiro Okada, Ranjan Bose, E-Learning Material Development Framework Supporting VR\/AR Based on Linked Data for IoT Security Education Lecture Notes on Data [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":3270,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"_g2\/page-onecolumn.php","meta":{"_locale":"en_US","_original_post":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=2476"},"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3386"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/comments?post=3386"}],"version-history":[{"count":15,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3386\/revisions"}],"predecessor-version":[{"id":4019,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3386\/revisions\/4019"}],"up":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3270"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/media?parent=3386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}