Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Empirical Study of Software Adoption Process in the Bitcoin Network

    Managing the flood of devices is a modern challenge in distributed networks as it is becoming increasingly difficult to manage the software updates needed to protect the devices from malicious attacks. Bitcoin...

    Mitsuyoshi Imamura, Kazumasa Omote in Advanced Information Networking and Applications (2021)

  2. No Access

    Chapter and Conference Paper

    Investigation and Analysis of Features in Decentralized Network Management of Minor Cryptocurrencies

    Blockchain is a trustless interoperability platform for users and is managed in a decentralized structure. There are no controllers in this platform, and service continuity depends on the users present in the ...

    Mitsuyoshi Imamura, Kazumasa Omote in Advanced Information Networking and Applications (2021)

  3. No Access

    Chapter and Conference Paper

    Toward Achieving Unanimity for Implicit Closings in a Trustless System

    Blockchain, which has a decentralized management structure, is a technology that challenges conventional wisdom about the availability and durability of an unstable structure, because the network system is man...

    Mitsuyoshi Imamura, Kazumasa Omote in Quality, Reliability, Security and Robustn… (2021)

  4. Chapter and Conference Paper

    Threat Analysis of Poisoning Attack Against Ethereum Blockchain

    In recent years, blockchain technology has witnessed remarkable developments in its application to crypto assets (cryptocurrency) considering not only function storing values but also extension of the smart c...

    Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote in Information Security Theory and Practice (2020)

  5. No Access

    Chapter and Conference Paper

    Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain

    Blockchain is an autonomous decentralized system, the operation of which depends on the motivation of the users who provide the nodes for managing the accurate distributed ledger. For the management of an acc...

    Mitsuyoshi Imamura, Kazumasa Omote in Network and System Security (2019)

  6. No Access

    Chapter and Conference Paper

    Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet Sensor

    Bitcoin depends on Peer-to-Peer (P2P) network in a major way and shares the connecting IP address list with the nearest peer. In addition, the blockchain which is the basic technology can be accessed by anyone...

    Mitsuyoshi Imamura, Kazumasa Omote in Information Security Applications (2019)

  7. No Access

    Chapter and Conference Paper

    Stock Price Prediction with Fluctuation Patterns Using Indexing Dynamic Time War** and \(k^*\) -Nearest Neighbors

    Various methods to predict stock prices have been studied. A typical method is based on time-series analysis; other methods are based on machine-learning techniques using cross-sectional data as feature values...

    Kei Nakagawa, Mitsuyoshi Imamura in New Frontiers in Artificial Intelligence (2018)