{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1520009408036676480.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"NDL_BIB_ID","@value":"8704171"}},{"identifier":{"@type":"URI","@value":"http://id.ndl.go.jp/bib/8704171"}},{"identifier":{"@type":"URI","@value":"https://ndlsearch.ndl.go.jp/books/R000000004-I8704171"}},{"identifier":{"@type":"NDL_BIB_ID","@value":"8703947"}},{"identifier":{"@type":"URI","@value":"http://id.ndl.go.jp/bib/8703947"}},{"identifier":{"@type":"URI","@value":"https://ndlsearch.ndl.go.jp/books/R000000004-I8703947"}},{"identifier":{"@type":"NAID","@value":"110006249920"}},{"identifier":{"@type":"NAID","@value":"110006248253"}}],"dc:title":[{"@value":"招待講演 高速ネットワークにおけるセキュリティ監視の現状と課題"},{"@language":"ja-Kana","@value":"ショウタイ コウエン コウソク ネットワーク ニ オケル セキュリティ カンシ ノ ゲンジョウ ト カダイ"}],"dcterms:alternative":[{"@value":"招待講演 高速ネットワークにおけるセキュリティ監視の現状と課題"},{"@value":"Security monitoring for high speed networks"},{"@value":"ディペンダブルコンピューティング"},{"@language":"ja-Kana","@value":"ディペンダブル コンピューティング"}],"dc:language":"ja","description":[{"notation":[{"@value":"記事種別: 会議・学会報告・シンポジウム"}]}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1580009752339214720","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000004119433"}],"foaf:name":[{"@value":"三宅 優"}]}],"publication":{"publicationIdentifier":[{"@type":"NDL_BIB_ID","@value":"000000050569"},{"@type":"ISSN","@value":"09135685"},{"@type":"LISSN","@value":"09135685"},{"@type":"NCID","@value":"AA1123312X"}],"prism:publicationName":[{"@value":"電子情報通信学会技術研究報告 = IEICE technical report : 信学技報"}],"dc:publisher":[{"@value":"東京 : 電子情報通信学会"}],"prism:publicationDate":"2007-03-15","prism:volume":"106","prism:number":"603","prism:startingPage":"1","prism:endingPage":"6"},"url":[{"@id":"http://id.ndl.go.jp/bib/8704171"},{"@id":"https://ndlsearch.ndl.go.jp/books/R000000004-I8704171"},{"@id":"http://id.ndl.go.jp/bib/8703947"},{"@id":"https://ndlsearch.ndl.go.jp/books/R000000004-I8703947"}],"foaf:topic":[{"@id":"https://cir.nii.ac.jp/all?q=%E9%AB%98%E9%80%9F%E3%83%8D%E3%83%83%E3%83%88%E3%83%AF%E3%83%BC%E3%82%AF","dc:title":"高速ネットワーク"},{"@id":"https://cir.nii.ac.jp/all?q=%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3","dc:title":"セキュリティ"},{"@id":"https://cir.nii.ac.jp/all?q=%E3%83%8D%E3%83%83%E3%83%88%E3%83%AF%E3%83%BC%E3%82%AF%E7%9B%A3%E8%A6%96","dc:title":"ネットワーク監視"},{"@id":"https://cir.nii.ac.jp/all?q=DoS/DDoS%E6%94%BB%E6%92%83","dc:title":"DoS/DDoS攻撃"},{"@id":"https://cir.nii.ac.jp/all?q=%E6%94%BB%E6%92%83%E6%A4%9C%E7%9F%A5","dc:title":"攻撃検知"},{"@id":"https://cir.nii.ac.jp/all?q=High%20speed%20Network","dc:title":"High speed Network"},{"@id":"https://cir.nii.ac.jp/all?q=Security","dc:title":"Security"},{"@id":"https://cir.nii.ac.jp/all?q=Network%20monitoring","dc:title":"Network monitoring"},{"@id":"https://cir.nii.ac.jp/all?q=DoS/DDoS%20Attack","dc:title":"DoS/DDoS Attack"},{"@id":"https://cir.nii.ac.jp/all?q=Intrusion%20detection","dc:title":"Intrusion detection"}],"relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1050001337899195776","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"属性指向帰納によるネットワークログの特徴抽出と異常検知"},{"@language":"en","@value":"Characterization and Anomaly Detection for Network Log Using Attribute Oriented Induction"},{"@language":"ja-Kana","@value":"ゾクセイ シコウ キノウ ニ ヨル ネットワーク ログ ノ トクチョウ チュウシュツ ト イジョウ ケンチ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520009407121942784","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"学生/教養のページ 広域セキュリティ監視技術について"},{"@language":"ja-Kana","@value":"ガクセイ キョウヨウ ノ ページ コウイキ セキュリティ カンシ ギジュツ ニ ツイテ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520009408068487040","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"Security Operation CenterのためのIDSログ分析支援システム"},{"@language":"ja-Kana","@value":"Security Operation Center ノ タメ ノ IDS ログ ブンセキ シエン システム"}]},{"@id":"https://cir.nii.ac.jp/crid/1520572357576376448","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"FPGAを用いたウイルスチェックシステムの構築と評価"},{"@language":"ja-Kana","@value":"FPGA オ モチイタ ウイルス チェック システム ノ コウチク ト ヒョウカ"}]},{"@id":"https://cir.nii.ac.jp/crid/1570572700503894784","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1571417125434028288","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"New Streaming Algorithms for Superspreader Detection"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417125434207872","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"The Shunt : An FPGA-Based Accelerator for Network Intrusion Prevention"}]},{"@id":"https://cir.nii.ac.jp/crid/1572824500317757696","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1573105975294470784","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"New Streaming Algorithms for Superspreader Detection"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668927255984896","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Density-Based Spam Detector"}]},{"@id":"https://cir.nii.ac.jp/crid/1573950400224419968","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"The Shunt : An FPGA-Based Accelerator for Network Intrusion Prevention"}]}],"dataSourceIdentifier":[{"@type":"NDL_SEARCH","@value":"oai:ndlsearch.ndl.go.jp:R000000004-I8704171"},{"@type":"NDL_SEARCH","@value":"oai:ndlsearch.ndl.go.jp:R000000004-I8703947"},{"@type":"CIA","@value":"110006248253"},{"@type":"CIA","@value":"110006249920"}]}