IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 68 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2011-03-25
16:25
Tokyo Suspended Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring
Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT) ICSS2010-66
A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor network attacks such ... [more] ICSS2010-66
pp.59-64
ICSS 2010-11-05
16:25
Hiroshima Hiroshima City University A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation
Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-54
The epidemic of Conficker shows that remote exploit attack is still one of the most serious threats on the computer syst... [more] ICSS2010-54
pp.59-64
IA, ICSS 2010-06-17
15:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II)
Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] IA2010-6 ICSS2010-6
pp.31-36
ICSS 2010-03-26
16:20
Fukuoka The University of Kitakyushu Relative Analysis of Malware Behavior based on Function Calls in Parallel Threads
Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-68
The Internet has been surrounded by various security threats. Malwares, such as computer virus, worm and bot, always pla... [more] ICSS2009-68
pp.35-39
ICSS 2009-11-13
11:05
Miyazaki University of Miyazaki Similarity Scoring Method of Runtime Packed Malware and its Evaluation
Tatsunori Orii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat Univ.), Hyung Chan Kim, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-55
A great number of malware have been generated and released over the Internet because of the underground distribution of ... [more] ICSS2009-55
pp.7-12
ICSS 2009-11-13
16:45
Miyazaki University of Miyazaki A classification method for packet generation logic of darknet traffic based on characteristics of packet header
Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-61
A large-scae darknet monitoring is an effective approach to grasp a global trend of malicious activities such as the pre... [more] ICSS2009-61
pp.43-48
LOIS, IE, ITE-ME, IEE-CMN 2009-09-25
16:50
Hiroshima Hiroshima Univ. Evaluation of Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes
Tatsuya Takehisa (Japan Datacom Co., Ltd), Masanori Hirotomo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) LOIS2009-39 IE2009-80
Recently, the variety of attacks against servers in the Internet is increased. The survivability of servers serving the ... [more] LOIS2009-39 IE2009-80
pp.119-124
IA, ICSS 2009-06-18
10:20
Tokyo Kikai-Shinko-Kaikan Bldg A study on detection of botnet based on probabilistic dependencies
Shintaro Murakami, Hiroki Hamasaki, Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ/ISIT), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IA2009-1 ICSS2009-9
Damage by malware is becoming more serious. Especally, bots, which are a kind of malware, are a great problem these days... [more] IA2009-1 ICSS2009-9
pp.1-6
IA, ICSS 2009-06-18
13:30
Tokyo Kikai-Shinko-Kaikan Bldg *
Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L... [more] IA2009-5 ICSS2009-13
pp.25-30
IA, ICSS 2009-06-18
13:55
Tokyo Kikai-Shinko-Kaikan Bldg *
Kota Kondo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-6 ICSS2009-14
The problem caused by the computer security incidents become serious in these days. For the countermeasure,the widely di... [more] IA2009-6 ICSS2009-14
pp.31-36
IA, ICSS 2009-06-18
14:20
Tokyo Kikai-Shinko-Kaikan Bldg *
Satoshi Hashimoto (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Tatsuya Takehisa (Japan Datacom Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-7 ICSS2009-15
In 2008, Nakano et al. proposed a password authentication method, which is secure against the stolen-verifier attack. Ho... [more] IA2009-7 ICSS2009-15
pp.37-42
IA, ICSS 2009-06-18
14:45
Tokyo Kikai-Shinko-Kaikan Bldg Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes
Tatsuya Takehisa (Japan Datacom Co., Ltd), Ryoichi Isawa (CRYPTO Co., Ltd.), Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-8 ICSS2009-16
VPN servers that offer remote access in the Internet are exposed under many kinds of cyber-attacks. In recent years, cyb... [more] IA2009-8 ICSS2009-16
pp.43-48
IA, ICSS 2009-06-19
13:25
Tokyo Kikai-Shinko-Kaikan Bldg Design and Evaluation of NGN/IPv6 Security Test System
Kenji Rikitake, Masashi Eto, Mio Suzuki, Daisuke Inoue (NICT), Koji Nakao (NICT/KDDI), Satoshi Kobayashi, Suminobu Akiba (DIT) IA2009-18 ICSS2009-26
In this paper, we propose a system design methodology for performing
vulnerability tests of NGN and IPv6 protocol suite... [more]
IA2009-18 ICSS2009-26
pp.97-102
IA, ICSS 2009-06-19
13:50
Tokyo Kikai-Shinko-Kaikan Bldg Study on Classification of Malware and it Applications
Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] IA2009-19 ICSS2009-27
pp.103-108
IA, ICSS 2009-06-19
14:15
Tokyo Kikai-Shinko-Kaikan Bldg *
Akira Morikawa, Motomu Murakami, Yuko Ozasa, Soma Katsute (Kobe Univ.), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-20 ICSS2009-28
Recently, the malwares are widely spreaded and cause the serious problems.
For the countermeasure, the malware analysi... [more]
IA2009-20 ICSS2009-28
pp.109-114
ICSS 2009-05-15
13:15
Hyogo Kobe University [Special Talk] Trends of International Standardization in ISO/IEC JTC1/SC27/WG4 -- Trends of Network/Application Security --
Koji Nakao (KDDI) ICSS2009-1
 [more] ICSS2009-1
p.1
ICSS 2009-05-15
14:45
Hyogo Kobe University Network Observation and Analysis Report on nicter
Junji Nakazato, Kazuhiro Ohtaka (NICT), Jumpei Shimamura (For Schooner), Koji Nakao (NICT) ICSS2009-4
(To be available after the conference date) [more] ICSS2009-4
pp.15-20
WBS, IT, ISEC 2009-03-10
16:40
Hokkaido Hakodate Mirai Univ. On incident forecasting using independent component alalysis
Eisuke Nishino, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-92 ISEC2008-150 WBS2008-105
For network security, measures against security incidents of worm infection and DDoS attack are important.In general, pr... [more] IT2008-92 ISEC2008-150 WBS2008-105
pp.315-320
WBS, IT, ISEC 2009-03-10
17:05
Hokkaido Hakodate Mirai Univ. A study of incident detection based on correlation analysis between network traffic time series
Junya Kitagawa, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies,), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-93 ISEC2008-151 WBS2008-106
Damage caused by malwares such as botnets is getting more
serious, as the Internet is spreading. To detect such
incide... [more]
IT2008-93 ISEC2008-151 WBS2008-106
pp.321-328
IN 2009-02-05
17:10
Kagawa Kagawa University [Invited Talk] Trend of Security Standardization in ITU-T and future directions for standardization
Koji Nakao (KDDI) IN2008-127
Although requirement on International standardization activities have not been clear enough, such activities connected w... [more] IN2008-127
pp.27-36
 Results 41 - 60 of 68 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan