Realistic Pentesting Network Topology Generation
H.P.T. Nguyen, K. Hasegawa, K. Fukushima, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2026), -, 2026
Cybersecurity Knowledge Graph Construction using Large Language Models
J. Lee, K. Mai, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2026), -, 2026
LLM-based Analysis of Cyber Threat Intelligence Report
K. Mai, R. Beuran, N. Inoue
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Framework for Validating and Improving Python Code using Large Language Models
J. Lee, K. Mai, N. Ghate, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Feasibility of integration of LLM as the role of security experts in access control models
N. Ghate, T.K. Mai, J. Lee, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Cybersecurity Education and Training
単著, Springer Nature Singapore, 2025
Artificial Intelligence and Cybersecurity: Theory and Applications
分担執筆, Springer, 2022
Mesure de la qualite dans les reseaux informatiques
単著, Presses Academiques Francophones, 2012
Experimental Evaluation of Non-Natural Language Prompt Injection Attacks on LLMs
3rd International Symposium on AI Safety and Security, 2026
Cybersecurity Education and Training in Japan
Education Training and Awareness in Cybersecurity workshop (ETACS 2025), in conjuction with 20th International Conference on Availability, Reliability and Security (ARES 2025), 2025
Applications of Artificial Intelligence to Cybersecurity
JAIST-Vietnam Research Exchange Meeting (JVREM 2025), 2025
Applications of AI/ML to Cybersecurity
Conference on Applications of Technology, Automation and Civil Engineering (ATAC 2024), 2024
Towards an open exchange format for cybersecurity training content
USENIX Security '19, 2019