{"created":"2023-06-20T12:57:15.652782+00:00","id":1296,"links":{},"metadata":{"_buckets":{"deposit":"a58ea9d8-3ac0-453f-bfc1-26eb0c0d50c8"},"_deposit":{"created_by":2,"id":"1296","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"1296"},"status":"published"},"_oai":{"id":"oai:fun.repo.nii.ac.jp:00001296","sets":["22:33","25:26:52"]},"author_link":["2395","33","2394"],"item_9_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2007-05","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"44","bibliographicPageEnd":"78","bibliographicPageStart":"73","bibliographicVolumeNumber":"2007","bibliographic_titles":[{}]}]},"item_9_description_3":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"アドホックネットワークに対する攻撃は多種多様なものが存在する.現在では,ある特定の攻撃法に対して,その攻撃パターンを検出し,防御するものがほとんどである.しかし攻撃法は日々進化し,複合攻撃や新たな攻撃法が開発されている.そこで現存する攻撃法を分類し,攻撃法をメタな振る舞いに分解することで総合的な攻撃対処方法を検討する.攻撃の対処には大きく分けて2種類が存在する.1つは攻撃パターンを定義し,攻撃ノードの検出・対処をする「防御機構」である.もう1つは攻撃を行わせない,または無力化する「回避機構」である.本論文では後者の「回避」に着目し,攻撃に対する耐性を持つプロトコルを設計するためのプロトコルアーキテクチャを提案する.","subitem_description_type":"Abstract"}]},"item_9_description_4":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"情処研報","subitem_description_type":"Other"}]},"item_9_publisher_17":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_9_select_10":{"attribute_name":"単著共著","attribute_value_mlt":[{"subitem_select_item":"共著/joint"}]},"item_9_select_8":{"attribute_name":"査読有無","attribute_value_mlt":[{"subitem_select_item":"なし/no"}]},"item_9_select_9":{"attribute_name":"研究業績種別","attribute_value_mlt":[{"subitem_select_item":"国内学会/Domestic Conference"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"森, 拓海"}],"nameIdentifiers":[{"nameIdentifier":"2394","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"森, 郁海"}],"nameIdentifiers":[{"nameIdentifier":"2395","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"高橋, 修","creatorNameLang":"ja"}],"familyNames":[{"familyName":"高橋","familyNameLang":"ja"}],"givenNames":[{"givenName":"修","givenNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"33","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60381282","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60381282"}]}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"アドホックネットワークにおける防御法の分類と耐攻撃性アドホック・ルーティング・プロトコルアーキテクチャの提案","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"アドホックネットワークにおける防御法の分類と耐攻撃性アドホック・ルーティング・プロトコルアーキテクチャの提案"}]},"item_type_id":"9","owner":"2","path":["33","52"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-04-18"},"publish_date":"2011-04-18","publish_status":"0","recid":"1296","relation_version_is_last":true,"title":["アドホックネットワークにおける防御法の分類と耐攻撃性アドホック・ルーティング・プロトコルアーキテクチャの提案"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2025-02-07T03:16:18.501564+00:00"}