S.Usuzaki, W.Yihan, K.Aburada, H.Yamaba, K.Takatsuka, T.Katayama, M.Park, and N.Okazaki
"Usability improvement in color constancy CAPTCHA"
IEICE Communications Express, Volume 13, Issue 8, pp.331-334, 2024.08.
DOI : 10.23919/comex.2024XBL0052
N.Okazaki, S.Usuzaki, T.Waki, H.Kawagoe, M.Park, H.Yamaba and K.Aburada
"Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar"
Future Internet 2024, Volume 16, Issue 8, 259, 2024/07/23.
DOI : 10.3390/fi16080259
H. Kawagoe, S. Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Park, N. Okazaki
"Investigation of malware classification based on image representation"
Proc. 29th International Symposium on Artificial Life and Robotics 2024 (AROB 29th 2024)
pp.929-932, 2024/01
Ryo Masuzawa, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki,"Investigation of PIN authentication schemes resistant to video-based recording attacks," The Twenty-Eighth International Symposium on Artificial Life and Robotics 2023 (AROB 28th 2023), pp.959-962, January, 2023.
M. Park, K. Aburada, N. Okazaki, "Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches”, Proceedings of the 2021 9th International Symposium on Computing and Networking, CANDAR 2021,pp.359-364, 2021/11/23
DOI 10.1109/CANDARW53999.2021.00067
H. Yamaba, A. Sohaimi, S. Usuzaki, K. Aburada, M. Mukunoki, M. Park, N. Okazaki, "Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language”, IWSEC 2021, LNCS 12835, pp.119-133, 2021/09
S. Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Mukunoki, M. Park, N. Okazaki, "Proposal and Evaluation for Color Constancy CAPTCHA”, Journal of Artificial Life and Robotics, 2021/09
Hiroki Muranaka, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba,Tetsuro Katayama, Mirang Park, Naonobu Okazaki, "Blockchain-based vote-type unknown malware detection method using a characteristic of anti-virus vendors' voting," Proc. The 26th International Symposium on Artificial Life and Robotics, OS-3-2, pp.1-5, 2021/01/21.
Hisaaki Yamaba, Kenya Shiraishi, Shotaro Usuzaki, Kayoko Takatsuka,Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki, "Anattempt at an introduction of deep learning for a user authentication system using s-EMG," Proc. The 26th International Symposium on Artificial Life and Robotics, OS-3-3, pp.1-5, 2021/01/21.
H. Yamaba, S. Usuzaki, K. Takatsuka, K. Aburada, T. Katayama, M. Park and N. Okazaki, “On a user authentication method to realise an authentication system using s-EMG”Int. J. Grid and Utility Computing,Vol. 11, No. 5, pp. 725-734, 2020
H. Yamaba, Y. Nagatomo, S. Usuzaki, K. Aburada, T. Katayama, M. Park
and N. Okazaki, "Evaluation of Yubimoji Based Gestures for Realizing
User Authentication Method Using s-EMG" Proceedings of the Workshops of
the 34th International Conference on Advanced Information Networking and
Applications (WAINA-2020), pp. 834-844,April, 2020.
https://doi.org/10.1007/978-3-030-44038-1_76
長友 誠、小関朋奈,渡辺 一樹、油田 健太郎、岡崎 直宣、朴 美娘、 "スマー
トウォッチにおけるジェスチャを用いた個人認証方式の提案と評価," 2020
Symposium on Cryptography and Information Security(SCIS2020),1E2-1,
2020.01
2019年度
〔査読付き論文〕
K. Aburada, S. Usuzaki, H. Yamaba, T. Katayama, M. Mukunoki, M. Park
and N. Okazaki, "An evaluation of the interactive video CAPTCHA method
against automated attack " IEICE ComEX, Vol.8, No.12, pp.453-457,2019.
https://doi.org/10.1587/comex.2019GCL00622
M. Nagatomo, K. Watanabe, K. Aburada, N. Okazaki and M. Park, "
Personal Identification with Any Shift: Authentication method for
smartwatches having shoulder-surfing resistance " IEICE ComEX, Vol.8, No.
12, pp.495-500,2019.
https://doi.org/10.1587/comex.2019GCL0024
K. Aburada, S. Usuzaki, H. Yamaba, T. Katayama, M. Mukunoki, M. Park
and N. Okazaki, "An evaluation of the interactive video CAPTCHA method
against automated attack " IEICE ComEX, Vol.8, No.12, pp. 601-605,2019.
https://doi.org/10.1587/comex.2019GCL0060
K. Watanabe, M. Nagatomo, K. Aburada, N. Okazaki and M. Park, "Gait-
Based Authentication using Anomaly Detection with Acceleration of Two
Devices in Smart Lock," Proceedings of the 14th International Conference
on Broad-Band Wireless Computing, Communication and Applications (BWCCA-
2019), Lecture Notes in Networks and Systems 97, Springer, pp.352-362,
20191107. https://doi.org/10.1007/978-3-030-33506-9_31
K. Aburada, S. Usuzaki, H. Yamaba, T. Katayama, M. Park and N.Okazaki,
"Implementation of CAPTCHA suitable for mobile devices" IEICE ComEX, Vol.
8, No.3, pp.55-60,2019. https://doi.org/10.1587/comex.2019GCL0060
K. Watanabe, M. Nagatomo, K. Aburada, N. Okazaki and M. Park, "Gait-
Based Authentication for Smart Locks Using Accelerometers in Two Devices,
" The 22nd International Conference on Network-Based Information Systems
(NBiS2019), Advances in Networked-based Information Systems 1036,
Springer, pp.281-291, 20190905.
DOI:https://doi.org/10.1007/978-3-030-29029-0_26
R. Fuji, S. Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Park, N.
Shiratori and N. Okazaki, " Blockchain-Based Malware Detection Method
Using Shared Signatures of Suspected Malware Files," The 22nd
International Conference on Network-Based Information Systems
(NBiS2019), Advances in Networked-based Information Systems 1036,
Springer, pp.305-316, 20190905.
DOI:https://doi.org/10.1007/978-3-030-29029-0_28
M. Nagatomo, K. Watanabe, K. Aburada, N. Okazaki and M. Park, "
Proposal and Evaluation of Authentication Method having Shoulder-Surfing
Resistance for Smartwatches using Shift Rule," The 22nd International
Conference on Network-Based Information Systems (NBiS2019), Advances in
Networked-based Information Systems 1036, Springer, pp.560-569, 20190905.
DOI:https://doi.org/10.1007/978-3-030-29029-0_55
H. Yamaba, S. Usuzaki, K. Aburada, T. Katayama, M. Park and N.
Okazaki, "Evaluation of Manual Alphabets Based Gestures for a User
Authentication Method Using s-EMG" The 22nd International Conference on
Network-Based Information Systems (NBiS2019), Advances in Networked-
based Information Systems 1036, Springer, pp.570-580, 20190905.
DOI:https://doi.org/10.1007/978-3-030-29029-0_56
M. Nagatomo, K. Aburada, N. Okazaki and M. Park, "Proposal of Ad-Hoc
Secure Device Pairing Method with Accelerometer and Camera Using Marker,
" International Journal of Networking and Computing – www.ijnc.org, ISSN
2185-2847
Volume 9, Number 2, pages 318–338, July 2019.
M. Nagatomo, K. Aburada, N. Okazaki, H. Yamaba, and M. Park, "Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration," Proceedings of the Workshops of the 33rd International Conference on Advanced Information Networking and Applications (WAINA-2019),pp.683-692, 27-29 March, 2019, Matsue, Japan.
DOI:https://doi.org/10.1007/978-3-030-15035-8_66
H. Yamaba, S. Inotani, S. Usuzaki, K Takatsuka, K. Aburada, T. Katayama, M. Park, and N. Okazaki, "Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG," Proceedings of the Workshops of the 33rd International Conference on Advanced Information Networking and Applications (WAINA-2019), pp693-701, 27-29 March, 2019, Matsue, Japan.
DOI:https://doi.org/10.1007/978-3-030-15035-8_67
R. Fuji, S. Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Park, N. Shiratori, and N. Okazaki, "Investigation on Sharing Signatures of Suspected Malware Files Using Blockchain Technology," Lecture Notes in Engineering and Computer Science: Proceedings of The International MultiConference of Engineers and Computer Scientists 2019, pp94-99, 13-15 March, 2019, Hong Kong.
R. Fuji, S. Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Park, N. Shiratori, and N. Okazaki, " A bot detection method focused on HTTP request transmission behavior of clients," Artificial Life and Robotics, (2019), 1-5
M. Mukunoki, H. Yamaba, S. Usuzaki, K. Aburada, T. Katayama, M. Park and N. Okazaki, "CHAMSIN: CaptcHA by caMouflaged StrINg" IEICE ComEX, Vol.8, No.3, pp.55-60,2019.
DOI:https://doi.org/10.1587/comex.2018XBL0142
K. Sakamoto, M. Nagatomo, N. Okazaki, and M. Park, "Examination of personal authentication method achieving shoulder-surfing resistance by combining mouse operation and number matrix," IEICE ComEX, Vol.8, No.3, pp.61-66,2019.
DOI:https://doi.org/10.1587/comex.2018XBL0143
K. Aburada, Y.Arikawa, S. Usuzaki, H. Yamaba, T. Katayama, M. Park and N. Okazaki, "Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic," Artificial Life and Robotics, Vol.23, 31, January 2019.
DOI:https://doi.org/10.1007/s10015-019-00527-z
長友 誠、渡辺 一樹、油田 健太郎、朴 美娘、岡崎 直宣、 "覗き見耐性を持つ小型タッチスクリーン端末における個人認証方式の提案," 2019 Symposium on Cryptography and Information Security(SCIS2019),3E4-2, 2019.01
2018年度
〔査読付き論文〕
H. Yamaba, S. Usuzaki, K. Aburada, M.Mukunoki, M. Park, N. Okazaki, "A proposal of new reading text CAPTCHA using random dot patterns," Proceedings of 2018 Sixth International Symposium on Computing and Networking (CANDAR2018), pp.1-6, Nov. 2018.
M. Nagatomo, K. Aburada, N. Okazaki, and M. Park, "Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer," Proceedings of 2018 Sixth International Symposium on Computing and Networking Workshops(CANDARW), PDAA3-3,pp.1-6, Nov. 2018.
M. Nagatomo, K. Aburada, N. Okazaki, and M. Park, "An Examination of Pairing Method with Camera and Acceleration Sensor," ICMU2018, S3-4, pp.1-4, Oct. 2018.
S. Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Park, N. Okazaki, "Interactive Video CAPTCHA for Better Resistance to Automated Attack," ICMU2018, P-12, pp.1-2, Oct. 2018.
H. Yamaba, K. Aburada, T. Katayama, M. Park, and N. Okazaki, " Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG“NBiS 2018, LNDECT 22, pp. 733–742, 201809.
R. Tatsuda, K. Aburada, H. Yamaba, M. Park and N. Okazaki, "An examination of the interactive video CAPTCHA method to resist relay attack," IEICE ComEX, Vol.7, No.4, pp.136-141,April, 2018
H. Yamaba, T. Kurogi, K. Aburada, S. Kubota,T. Katayama, M. Park and N. Okazaki, "On applying support vector machines to a user authentication method using surface electromyogram signals," Artificial Life and Robotics, Vol.23, pp.87-93
S. Usuzaki, Y. Arikawa, H. Yamaba, K. Aburada, S. Kubota, M. Park, N. Okazaki, "A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method," Journal of Information Processing, Vol.26, pp.257-266
M. Nagatomo,Y. Kita, K. Aburada, N. Okazaki and M. Park, " Implementation and user testing of personal authentication having shoulder surfing resistance with mouse operations," IEICE ComEX, Vol.7, No.3, pp.77-82,January 11, 2018.
R. Tatsuda, H. Yamaba, K. Aburada, T. Katayama, M. Park, N. Shiratori and N. Okazaki, "An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks," Advances in Internet, Data & Web Technologies, Lecture Notes on Data Engineering and Communications Technologies, Springer, Vol.17, pp.870-879, 20180315.
T. Kurogi, H. Yamaba, K. Aburada, T. Katayama, M. Park, and N. Okazaki, "A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG," Advances in Internet, Data & Web Technologies, Lecture Notes on Data Engineering and Communications Technologies, Springer, Vol.17, pp.889-900, 20180315.
M. Nagatomo, Y. Kita, K. Aburada, N. Okazaki, and M. Park, "Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance," Advances in Internet, Data & Web Technologies, Lecture Notes on Data Engineering and Communications Technologies, Springer, Vol.17, pp.979-989, 20180315.
K. Aburada, Y. Kita, H. Yamaba, T. Katayama, M. Park, and N. Okazaki, "Evaluation of Index Poisoning Method in Large Scale Winny Network," Advances in Internet, Data & Web Technologies, Lecture Notes on Data Engineering and Communications Technologies, Springer, Vol.17, pp.999-1006, 20180315.
K. Aburada, K. Todaka, H. Yamaba, T. Katayama, M. Park, N. Shiratori and N. Okazaki, "Development of a Monitoring System Based on Power Consumption," Advances in Network-Based Information Systems, Lecture Notes on Data Engineering and Communications Technologies, Springer, Vol.7, pp.363-372, 20170824.
T. Hori, Y. Kita, K. Toyoda, N. Okazaki, and M. Park, "Empirical Evaluation of Rhythm-based Authentication Method for Mobile Devices," Advances in Network-Based Information Systems, Lecture Notes on Data Engineering and Communications Technologies, Springer, Vol.7, pp.529-538, 20170824.
S. Usuzaki, Y. Arikawa, H. Yamaba, K. Aburada, S. Kubota, M. Park and N. Okazaki, "Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method," Advances in Network-Based Information Systems, Lecture Notes on Data Engineering and Communications Technologies, Springer, Vol.7, pp.914-923, 20170824.
K. Toyoda, M. Park, N. Okazaki, T. Ohtsuki "Novel Unsupervised SPITters Detection Scheme by Automatically Solving Unbalanced Situation" IEEE Access ( Volume: 5 ), 6746-6756, 2017/05
堀 孝浩, 朴 美娘, 岡崎 直宣 "受信信号強度を用いたデバイス認証における異常値除去手法に関する検討",マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2017)論文集, pp.217-222, Jun 2017.
H. Yamaba, A. Kurogi, S. Kubota, T. Katayama, M. Park, N. Okazaki, "Evaluation of feature values of surface electromyograms for user authentication on mobile devices," Artificial Life and Robotics, 22(1), 108-112, 2017/01
J. Hong, M. Park, N. Okazaki, "SGM: A Subgroup Management Scheme Using K-Means Clustering in M2M Systems," Proceedings of the 2016 International Conference on Network-Based Information Systems, pp.146-151, 2016/09/06.
K. Toyoda, M. Park, N. Okazaki, "Unsupervised SPITters Detection Scheme for Unbalanced Callers," The 30th IEEE International Conference on Advanced Information Networking and Applications Workshops (AINA-2016), pp.64-68, 2016.
Y. Kita, K. Aburada, T. Katayama, M. Park, and N. Okazaki "Proposal of an Authentication Method using Two Types of Machine Learning and Mouse Operation Trajectory," The First International Symposium on BioComplexity 2016 (ISAROB, 2016), pp.346-349, 2016/1.
岡崎 美蘭 “安全なM2M通信システムを実現するためのグループ鍵管理手法に関する一考察”,神奈川工科大学 研究報告 B 理工学編, 第40号, (2016.03)
N. Okazaki, K. Toyoda, E. Yokoyama, H. So, T. Katayama, and M. Park "Countermeasure against fingerprinting attack in Tor by separated contents retrieval," IEICE ComEX, Vol.4, No.12, pp.370-375, 2015/12.
詳細はこちら
N. Okazaki, Y. Kita, K. Aburada, and M. Park, "Security Evaluation System for Android Applications Using User's Reviews and Permissions," Journal of Robotics, Networking and Artificial Life, Atlantis Press, Vol.2, No.3, pp.190-193, 2015/12.
Yoshihiro Kita, Mirang Park, Naonobu Okazaki, " Proposal of Rhythm Authentication Method using Users Classification by Self-Organizing Map," International Conference on Network-Based Information Systems(NBiS2015), 2015.
Hisaaki Yamaba, So Nagatomo, Kentaro Aburada, Shinichiro Kubota,Tetsuro Katayama, Mirang Park, Naonobu Okazaki,"An Authentication Method Independent of Tap Operation on theTouchscreen of a Mobile Device,"Journal of Robotics, Networking and Artificial Life, Atlantis Press, vol.2, issue 1, pp. 60-63, 2015/06.
Kentaro Aburada, Hisaaki Yamaba, Shinichiro Kubota, Tetsuro Katayama,Mirang Park, Naonobu Okazaki,"Proposal and Its Evaluation of Neighbors Based Routing for ad hocnetworks,"Journal of Robotics, Networking and Artificial Life, Atlantis Press, vol.2, issue 2, pp. 121-125, 2015/09.
田村拓己,久保田真一郎,片山徹郎,油田健太郎,朴美娘,岡崎直宣, "文字認識攻撃に耐性をもつランダム妨害図形を用いた画像ベースCAPTCHA方式の提案," 情報処理学会論文誌(特集論文 仮想化時代の情報セキュリティと運用技術),Vol.56, No.3, pp.808-818, Mar. 2015. 詳細はこちら
Yoshihiro Kita, Kentaro Aburada, Mirang Park, and Naonobu Okazaki, "Proposal of a Puzzle Authentication Method with Shoulder-surfing Attack Resistance and High-usability," IEICE ComEX, Vol.4, No.3, pp.95-98, 2015. 詳細はこちら
Masahiro Sakuma, Yoshihiro Kita, Kentaro Aburada, Mirang Park, Naonobu Okazaki, "Study of Filter Sharing Method using Virtual Peers in P2P Networks," The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015), pp.527-533, 2015. 詳細はこちら
Kentaro Aburada, Yoshihiro Kita, Mirang Park, Naonobu Okazaki, "Content access control scheme for P2P networks using a reputation value," The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015), pp.720-726, 2015. 詳細はこちら
Hisaaki Yamaba, Kentaro Aburada, Shinichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki, "An Authentication Method for Mobile Devices that is Independent of Tap-Operation on a Touchscreen," Proc. The International Conference on Artificial Life and Robotics 2015, No.OS7-1, pp.1-4, 2015/01.
Naonobu Okazaki, Yoshihiro Kita, Kentaro Aburada, and Mirang Park, "Proposal of Security Evaluation System using User's Reviews and Permissions for Android Applications," Proc. The International Conference on Artificial Life and Robotics 2015, No.OS7-2, pp.1-4, 2015/01.
Kentaro Aburada, Hisaaki Yamaba, Shinichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki, "Evaluation of Neighbors Based Routing for ad hoc networks," Proc. The International Conference on Artificial Life and Robotics 2015, No.OS7-3, pp.1-4, 2015/01.
K. Aburada, M. Park and N. Okazaki, "Investigation of the Routing Method Based on the Number of Neighbor Nodes," Proc. 7th International Conference on Mobile Computing and Ubiquitous Networking (ICMU2014), pp.103-104, 2014.
Mirang Park, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki, "
Proposal of a Puzzle Authentication Method with Shoulder-surfing Attack
Resistance," International Conference on Network-Based Information
Systems (NBiS2014), pp.495-500, 2014. 詳細はこちら
佐久間 政碩,喜多 義弘, 朴 美娘,岡崎 直宣,"仮想ピアを用いたP2Pネットワークの効率的な共有フィルタ管理手法の提案," 情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2014)論文集, pp.997-1004, July 2014.詳細はこちら
増田 裕仁,喜多 義弘, 朴 美娘,岡崎 直宣,"タッチスクリーンを利用した覗きみ耐性を持つパズル型認証方式の提案," 情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2014)論文集, pp.1005-1010, July 2014.詳細はこちら
喜多 義弘, 神里 麗葉,朴 美娘,岡崎 直宣,"自己組織化マップを利用したリズム認証方式とその認証精度に関する考察," 情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2014)論文集, pp.1011-1018, July 2014.詳細はこちら
Yoshihiro Kita, Fumio Sugai, Mirang Park, Naonobu Okazaki, "Proposal and its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method: Secret Tap with Double Shift," International Journal of Cyber-Security and Digital Forensics (IJCSDF), Vol.2, No.1, pp.48-55, 2013. 詳細はこちら
Yoshihiro Kita, Fumio Sugai, Mirang Park, Naonobu Okazaki, "Proposal and implementation of a shoulder-surfing attack resistant authentication method using two shift functions," The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013), pp.54-59, March 2013.
田村 拓己, 菅井 文郎,朴 美娘,岡崎 直宣,"ランダム妨害図形を用いた画像ベースCAPTCHA方式の提案," 情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2013)論文集, pp.222-229, July 2013.
喜多 義弘, 菅井 文郎,朴 美娘,岡崎 直宣,"ユーザ主体によるAndroidアプリケーションのレビュー評価システムの提案," 情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2013)論文集, pp.1341-1347, July 2013.
K. Aburada, M. Park, M. Ikeda, H. Yamaba, N. Okazaki, "Proposal of a content access control scheme on a reputation value over P2P networks," The Sixth International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2012), pp.124-125, 2012.
池田 匡視,油田 健太郎,山場 久昭,朴 美娘,岡崎 直宣:Proposal of a Video Streaming Protocol to Reduce Wait Time on Peer-to-Peer Systems,情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2012)論文集, pp.1206-1214, 2012.
油田 健太郎, 岡崎 直宣, 朴 美娘:Peer to Peer上の安全なコンテンツ流通システムの提案,情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2011)論文集, pp.113-120, 2011.
K. Aburada, M. Eto, N. Okazaki and M. Park, "Proposal of a zone disjoint multi-path routing for ad hoc networks,"Proc. 8th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT 2010), Vol.C-8-2, pp.1-4, 2010.