{"created":"2023-06-19T10:29:55.320090+00:00","id":10004,"links":{},"metadata":{"_buckets":{"deposit":"c48983dc-eb6a-432e-982f-78de43e765e4"},"_deposit":{"created_by":18,"id":"10004","owners":[18],"pid":{"revision_id":0,"type":"depid","value":"10004"},"status":"published"},"_oai":{"id":"oai:muroran-it.repo.nii.ac.jp:00010004","sets":["216:316","216:352","46"]},"author_link":["56403","39157","21131","39433","42173"],"item_79_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018-12","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"26","bibliographicPageStart":"1","bibliographicVolumeNumber":"98","bibliographic_titles":[{"bibliographic_title":"Journal of Computer and System Sciences","bibliographic_titleLang":"en"}]}]},"item_79_description_23":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_79_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"The proposed traceback scheme does not take into account the trust of node which leads to the low effectiveness. A trust-aware probability marking (TAPM) traceback scheme is proposed to locate malicious source quickly. In TAPM scheme, the node is marked with difference marking probability according to its trust which is deduced by trust evaluation. The high marking probability for low trust node can locate malicious source quickly, and the low marking probability for high trust node can reduce the number of marking to improve the network lifetime, so the security and the network lifetime can be improved in TAPM scheme.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_79_link_17":{"attribute_name":"出版者版へのリンク","attribute_value_mlt":[{"subitem_link_text":"10.1016/j.jcss.2016.09.008","subitem_link_url":"https://doi.org/10.1016/j.jcss.2016.09.008"}]},"item_79_link_5":{"attribute_name":"室蘭工業大学研究者データベースへのリンク","attribute_value_mlt":[{"subitem_link_text":"董 冕雄(DONG Mianxiong)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"},{"subitem_link_text":"太田 香(OTA Kaoru)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"}]},"item_79_publisher_11":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Elsevier","subitem_publisher_language":"en"}]},"item_79_relation_18":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1016/j.jcss.2016.09.008","subitem_relation_type_select":"DOI"}}]},"item_79_rights_19":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2019. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/","subitem_rights_language":"en"}]},"item_79_source_id_12":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0022-0000","subitem_source_identifier_type":"PISSN"}]},"item_79_source_id_14":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00251469","subitem_source_identifier_type":"NCID"}]},"item_79_subject_9":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_79_version_type_21":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"LIU, Xiao","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"DONG, Mianxiong","creatorNameLang":"en"},{"creatorName":"トウ, メンユウ","creatorNameLang":"ja-Kana"},{"creatorName":"董, 冕雄","creatorNameLang":"ja"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"OTA, Kaoru","creatorNameLang":"en"},{"creatorName":"太田, 香","creatorNameLang":"ja"},{"creatorName":"オオタ, カオル","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"YANG, Laurence T.","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"LIU, Anfeng","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-12-01"}],"displaytype":"detail","filename":"JCSS_98_1_26.pdf","filesize":[{"value":"947.7 kB"}],"format":"application/pdf","licensetype":"license_5","mimetype":"application/pdf","url":{"label":"JCSS_98_1_26","objectType":"fulltext","url":"https://muroran-it.repo.nii.ac.jp/record/10004/files/JCSS_98_1_26.pdf"},"version_id":"3a2e4bf7-43db-4083-8401-18a123af002e"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Cyber security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Cyber forensics","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Traceback","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Trust","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Marking probability","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Network lifetime","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Trace malicious source to guarantee cyber security for mass monitor critical infrastructure","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Trace malicious source to guarantee cyber security for mass monitor critical infrastructure","subitem_title_language":"en"}]},"item_type_id":"79","owner":"18","path":["46","316","352"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2019-07-09"},"publish_date":"2019-07-09","publish_status":"0","recid":"10004","relation_version_is_last":true,"title":["Trace malicious source to guarantee cyber security for mass monitor critical infrastructure"],"weko_creator_id":"18","weko_shared_id":-1},"updated":"2024-01-05T05:23:35.329980+00:00"}