This work is licensed under the Creative Commons Attribution 4.0 International License.
Yamada, R. (2024). Impact of Cybersecurity Regulations on Corporate Compliance Practices in Japan. International Journal of Law and Policy, 9(2), 28-38.Search in Google Scholar
Akimoto, D. (2021). Japan’s Multi-Domain Defense Force: The Space, Cyber, and Electromagnetic Domains. Institute for Security & Development Policy, Stockholm, Sweden.Search in Google Scholar
Kim, N., & Lee, S. (2021). Cybersecurity breach and crisis response: An analysis of organizations’ official statements in the United States and South Korea. International Journal of Business Communication, 58(4), 560-581.Search in Google Scholar
Beuran, R., Tang, D., Pham, C., Chinen, K. I., Tan, Y., & Shinoda, Y. (2018). Integrated framework for hands-on cybersecurity training: CyTrONE. Computers & Security, 78, 43-59.Search in Google Scholar
Harold, S. W., Nakagawa, Y., Fukuda, J., Davis, J. A., Kono, K., Cheng, D., & Suzuki, K. (2017). The US-Japan alliance and deterring gray zone coercion in the maritime, cyber, and space domains. Santa Monica: Rand Corporation.Search in Google Scholar
Mohamed Mizan, N. S., Ma’arif, M. Y., Mohd Satar, N. S., & Shahar, S. M. (2019). CNDS-cybersecurity: issues and challenges in ASEAN countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(1.4).Search in Google Scholar
Teoh, C. S., & Mahmood, A. K. (2017, July). National cyber security strategies for digital economy. In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE.Search in Google Scholar
Beuran, R., Pham, C., Tang, D., Chinen, K. I., Tan, Y., & Shinoda, Y. (2018). Cybersecurity education and training support system: CyRIS. IEICE TRANSACTIONS on Information and Systems, 101(3), 740-749.Search in Google Scholar
Matsuda, W., Fujimoto, M., Aoyama, T., & Mitsunaga, T. (2019, November). Cyber security risk assessment on industry 4.0 using ics testbed with ai and cloud. In 2019 IEEE conference on application, information and network security (AINS) (pp. 54-59). IEEE.Search in Google Scholar
Kim, E., & Beuran, R. (2018, October). On designing a cybersecurity educational program for higher education. In Proceedings of the 10th International Conference on Education Technology and Computers (pp. 195-200).Search in Google Scholar
Vosse, W. (2023). A conceptional broadening of the security order in the Indo-Pacific: The role of EU-Japan cooperation in ICT and cybersecurity. In Alliances in Asia and Europe (pp. 163-184). Routledge.Search in Google Scholar
Osawa, J. (2017). The escalation of state sponsored cyberattack and national cyber security affairs: Is strategic cyber deterrence the key to solving the problem?. Asia-Pacific Review, 24(2), 113-131.Search in Google Scholar
Panneerselvam, P., & Mohan, V. (2023). India-Japan Emerging Cooperation in Cybersecurity. In Seventy Years of India-Japan Diplomatic Relations (pp. 140-153). Routledge.Search in Google Scholar
Douha, N. G. Y. R., Renaud, K., Taenaka, Y., & Kadobayashi, Y. (2023). Smart home cybersecurity awareness and behavioral incentives. Information & Computer Security, 31(5), 545-575.Search in Google Scholar
Kallender, P., & Hughes, C. W. (2017). Japan’s emerging trajectory as a ‘cyber power’: from securitization to militarization of cyberspace. Journal of Strategic Studies, 40(1-2), 118-145.Search in Google Scholar
Jun Osawa.(2023).Direction of Japan’s New Cybersecurity Policy.Asia-Pacific Review(3),63-78.Search in Google Scholar
Dahanayaka Thilini,Ginige Yasod,Huang Yi,Jourjon Guillaume & Seneviratne Suranga.(2023).Robust open-set classification for encrypted traffic fingerprinting.Computer NetworksSearch in Google Scholar
Miyamoto Henrique K.,Meneghetti Fábio C. C. & Costa Sueli I. R..(2022).The Fisher–Rao loss for learning under label noise.Information Geometry(1),107-126.Search in Google Scholar
Niu Lu,Li Zhenping & Li Shaobo.(2024).MMD Fence GAN Unsupervised Anomaly Detection Model Based on Maximum Mean Discrepancy.International Journal of Cognitive Informatics and Natural Intelligence (IJCINI)(1),1-13.Search in Google Scholar
Nihat Daldal,Kemal Polat & Yanhui Guo.(2019).Classification of multi-carrier digital modulation signals using NCM clustering based feature-weighting method.Computers in Industry45-58.Search in Google Scholar