IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 81 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2019-03-08
11:15
Okinawa NICT Okinawa Electromagnetic Technology Center Threat Information Analysis Using Conditional Generative Adversarial Network
Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT) ICSS2018-81
 [more] ICSS2018-81
pp.105-110
ICSS, IPSJ-SPT 2019-03-08
14:50
Okinawa NICT Okinawa Electromagnetic Technology Center A Trouble Ticket System Specialized for Incident Response
Yu Tsuda, Takashi Tomine (NICT), Masato Jingu (NICT/HISYS), Keisuke Iwasaki (NTT-AT), Kenjiro Terada, Daisuke Inoue (NICT) ICSS2018-92
In case that an organization has damaged by a cyberattack, it is crucial to minimize the damage by rapid security incide... [more] ICSS2018-92
pp.197-202
ICSS 2018-11-21
15:15
Kagoshima   Malware Analysis Method Using Conditional Generative Adversarial Network
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) ICSS2018-57
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] ICSS2018-57
pp.25-30
ICSS 2018-11-22
14:20
Kagoshima   Part II: Calculating Similarity between IoT Malware over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more]
ICSS2018-66
pp.73-78
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
11:45
Hokkaido Sapporo Convention Center Real-time Botnet Detection Using Nonnegative Tucker Decomposition
Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
pp.297-304
ICSS, IA 2018-06-25
13:25
Ehime Ehime University Calculating Similarity between IoT Malware Samples over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more]
IA2018-2 ICSS2018-2
pp.7-12
ICSS, IA 2018-06-26
11:40
Ehime Ehime University A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] IA2018-13 ICSS2018-13
pp.77-82
ICSS, IPSJ-SPT 2018-03-07
13:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2017-51
In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and ... [more] ICSS2017-51
pp.1-6
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] ICSS2017-69
pp.109-114
ICSS, IPSJ-SPT 2018-03-08
09:45
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Evaluation of malware sandbox using evasive test samples
Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
 [more]
IA, ICSS 2017-06-08
14:25
Kochi Kochi University of Technolo, Eikokuji Campus A First Trend Review of Runtime Packers for IoT Malware
Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] IA2017-4 ICSS2017-4
pp.19-24
OPE 2016-12-09
13:50
Okinawa   Laser scanner based on beam switching methode on a silicon photonics integrated circuit
Daisuke Inoue, Tadashi Ichikawa, Akari Kawasaki, Tatsuya Yamashita (TCRDL) OPE2016-114
We demonstrated an optical solid state scanner based on photonics integrated circuit. This solid state scanner has no me... [more] OPE2016-114
pp.57-58
ICSS 2016-11-25
16:35
Kanagawa Institute of Information Security Clustering of Attacking Devices using Active Monitoring
Takahiro Kasama, Daisuke Inoue (NICT) ICSS2016-45
(To be available after the conference date) [more] ICSS2016-45
pp.37-42
ICSS, IA 2016-06-06
14:10
Saga Saga University Method to Locate Cryptographic Functions from Malware
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT)
 [more]
ICSS, IPSJ-SPT 2016-03-04
11:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Suspicious Processes Detection Scheme using Process Frequency and Network State
Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-60
pp.77-82
IA, SITE, IPSJ-IOT [detail] 2016-03-04
11:35
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) A Proposal of Timeline-Based Event Log Management Method
Takashi Tomine, Yu Tsuda (NICT), Akira Kato, Hideki Sunahara (Keio Univ.), Daisuke Inoue (NICT) SITE2015-74 IA2015-106
When a network trouble is happen, network operators are surveying information such as logs and statistics, from close ne... [more] SITE2015-74 IA2015-106
pp.227-232
LQE, EST, OPE, EMT, PN, MWP, IEE-EMT, PEM [detail] 2016-01-29
09:00
Hyogo   Optical modulator using phase-shifter based on multimode-interference-based waveguide
Daisuke Inoue, Tadashi Ichikawa, Akari Kawasaki, Tatsuya Ichikawa (Toyota Central R&D Lab. Inc.) PN2015-96 EMT2015-147 OPE2015-209 LQE2015-196 EST2015-153 MWP2015-122
We fabricated optical modulators using electrode of phase shifter based on multimode interference based waveguide. Propa... [more] PN2015-96 EMT2015-147 OPE2015-209 LQE2015-196 EST2015-153 MWP2015-122
pp.379-382
ICSS 2015-11-26
15:00
Fukushima AIST, Fukushima Renewable Energy Institute tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header
Takashi Koide (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Takahiro Kasama, Mio Suzuki, Daisuke Inoue, Koji Nakao (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-38
The packets from malware and network tools that have their own implementation of network stack may have character-istic ... [more] ICSS2015-38
pp.19-24
ICSS 2015-11-27
14:40
Fukushima AIST, Fukushima Renewable Energy Institute A Suspicious Processes Detection Scheme using Process Frequency
Junji Nakazato, Yu Tsuda, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-45
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-45
pp.61-66
IA, ICSS 2015-06-11
14:55
Fukuoka Kyushu Institute of Technology Univ. An Empirical Evaluation of Locating Cryptographic Functions on the Memory
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more]
IA2015-4 ICSS2015-4
pp.15-20
 Results 21 - 40 of 81 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan