Realistic Pentesting Network Topology Generation
H.P.T. Nguyen, K. Hasegawa, K. Fukushima, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2026), -, 2026
Cybersecurity Knowledge Graph Construction using Large Language Models
J. Lee, K. Mai, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2026), -, 2026
LLM-based Analysis of Cyber Threat Intelligence Report
K. Mai, R. Beuran, N. Inoue
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Framework for Validating and Improving Python Code using Large Language Models
J. Lee, K. Mai, N. Ghate, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Feasibility of integration of LLM as the role of security experts in access control models
N. Ghate, T.K. Mai, J. Lee, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Formal and Experimental Verification of Robot Control Protocols for Smart Buildings
J. Wu, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Attack Path Extraction via Semi-Automatic Analysis of Cyber Threat Reports
K. Mai, R. Beuran, R. Hotchi, S. E. Ooi, T. Kuroda, Y. Tan
Symposium on Cryptography and Information Security (SCIS 2024), -, 2024
Variation of Correct Answer in Quiz-based Security Training: Case Study in CyTrONE
CHINEN Ken-ichi, SUNAGAWA Masanori, BEURAN Razvan
IEICE technical report, 118, 466, 415-420, 2019
Usability Evaluation of Open Source and Online Capture the Flag Platforms
M.H. Noor Azam, R. Beuran
Research report, -, 2018
階層化アクティブタグと歩行者位置推定 川上 哲也, 鈴木 良宏, 中田 潤也, BEURAN Razvan, 丹 康雄, 篠田 陽一
電子情報通信学会技術研究報告. NS, ネットワークシステム, 107, 524, 123-128, 2008
StarBED : 大規模ネットワーク実証環境 宮地 利幸, 中田 潤也, 知念 賢一, BEURAN Razvan, 三輪 信介, 岡田 崇, 三角 真, 宇多 仁, 芳炭 将, 丹 康雄, 中川 晋一, 篠田 陽一
情報処理, 49, 1, 57-70, 2008
Wireless LAN emulation Beuran Razvan, Nguyen Lan Tien, Latt Khin Thida, Nakata Junya, Shinoda Yoichi
Research report, 2006, 1-49, 2006
VoIP over Wireless LAN Survey
R. Beuran
Research report, -, 2006