Realistic Pentesting Network Topology Generation
H.P.T. Nguyen, K. Hasegawa, K. Fukushima, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2026), -, 2026
Cybersecurity Knowledge Graph Construction using Large Language Models
J. Lee, K. Mai, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2026), -, 2026
LLM-based Analysis of Cyber Threat Intelligence Report
K. Mai, R. Beuran, N. Inoue
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Framework for Validating and Improving Python Code using Large Language Models
J. Lee, K. Mai, N. Ghate, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Feasibility of integration of LLM as the role of security experts in access control models
N. Ghate, T.K. Mai, J. Lee, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Formal and Experimental Verification of Robot Control Protocols for Smart Buildings
J. Wu, R. Beuran
Symposium on Cryptography and Information Security (SCIS 2025), -, 2025
Attack Path Extraction via Semi-Automatic Analysis of Cyber Threat Reports
K. Mai, R. Beuran, R. Hotchi, S. E. Ooi, T. Kuroda, Y. Tan
Symposium on Cryptography and Information Security (SCIS 2024), -, 2024
Variation of Correct Answer in Quiz-based Security Training: Case Study in CyTrONE
CHINEN Ken-ichi, SUNAGAWA Masanori, BEURAN Razvan
IEICE technical report, 118, 466, 415-420, 2019
Usability Evaluation of Open Source and Online Capture the Flag Platforms
M.H. Noor Azam, R. Beuran
Research report, -, 2018
StarBED : A Large-scale Practical Network Testbed MIYACHI Toshiyuki, NAKATA Junya, CHINEN Ken-ichi, BEURAN Razvan, MIWA Shinsuke, OKADA Takashi, MISUMI Makoto, UDA Satoshi, YOSHIZUMI Masashi, TAN Yasuo, NAKAGAWA Shin-ichi, SHINODA Yoichi
IPSJ Magazine, 49, 1, 57-70, 2008
Wireless LAN emulation Beuran Razvan, Nguyen Lan Tien, Latt Khin Thida, Nakata Junya, Shinoda Yoichi
Research report, 2006, 1-49, 2006
VoIP over Wireless LAN Survey
R. Beuran
Research report, -, 2006