IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 41 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2010-06-18
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Life-cycle Monitoring Method of Malware Download Sites for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] IA2010-14 ICSS2010-14
pp.75-80
ICSS 2010-03-26
15:30
Fukuoka The University of Kitakyushu Investigation of Attacks to Websites using Multi-domain Web-based Honeypots
Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] ICSS2009-66
pp.25-28
NS, IN
(Joint)
2010-03-05
11:40
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) A Scheme of Detecting Malware for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] IN2009-200
pp.337-342
IN 2009-07-10
11:25
Hokkaido HOKKAIDO UNIVERSITY A Provider Provisioned Websites Protection Scheme against Malware Distribution
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) IN2009-34
This paper proposes a website protection scheme for service providers by analyzing accesses to web honeynets, which carr... [more] IN2009-34
pp.55-60
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:25
Akita Akita University Investigation about Malware Distribution to Websites
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] ISEC2009-32 SITE2009-24 ICSS2009-46
pp.175-180
IN 2008-06-20
14:55
Hokkaido Hokkaido Univ. Dynamic Topology Reconfiguration Method for Overlay Networks using Users' Community Information
Tomoyasu Ogasa, Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2008-24
In an overlay network, it is important to reconfigure its network topology appropriately according to change of traffic ... [more] IN2008-24
pp.85-90
NS, IN
(Joint)
2008-03-06
11:50
Okinawa Bankoku Shinryokan Identification Method of Attacking Source Using Traffic Flow in Backbone Networks
Takeshi Kuwahara, Tsuyoshi Kondoh, Takeshi Yagi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-169
In this paper, we propose a novel identification method of attacking source using traffic flow information in backbone n... [more] IN2007-169
pp.61-66
MoNA, IN
(Joint)
2007-11-15
14:55
Fukuoka Fukuoka Institute of Technology NMF: Network Mining Framework using Topological Structure of Complex Networks
Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2007-90
In this paper, we propose a network mining framework called NMF that supports integration of several link mining methods... [more] IN2007-90
pp.7-12
MoNA, IN
(Joint)
2007-11-15
15:20
Fukuoka Fukuoka Institute of Technology On Application Concentrator for Supporting Application-Level Multiple Association
Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2007-91
In this paper, we propose a concept of application concentrator that realizes the multiple association at an application... [more] IN2007-91
pp.13-18
NS, CS, IN
(Joint)
2007-09-21
09:50
Miyagi Tohoku University A Practical Feasibility Study of a Network Control Method for Sharing DDoS-Attack Mitigation Devices
Takeshi Yagi, Takeshi Kuwahara, Junichi Murayama (NTT) IN2007-60
This paper reports results of feasibility study about dynamic traffic control methods to re-route traffic into DDoS-atta... [more] IN2007-60
pp.99-104
NS, CS, IN
(Joint)
2007-09-21
10:10
Miyagi Tohoku University A Proposal of Detection Method for Application Anomaly Traffic over Large-scale Backbone Networks
Takeshi Kuwahara, Takeshi Yagi, Atsushi Kobayashi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-61
This paper proposes a novel anomaly detection method for application traffic over large-scale backbone networks. The pro... [more] IN2007-61
pp.105-110
IN 2007-07-20
11:00
Hyogo Kobe University On Network Architecture for Realizing Group-Oriented Communication
Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2007-35
In this paper, we propose a novel communication paradigm called group-oriented communication. Different
from convention... [more]
IN2007-35
pp.49-54
IN 2007-07-20
11:25
Hyogo Kobe University A Practical Feasibility Test of SPX:Secure networking Platform for group-oriented eXchange
Takeshi Yagi, Junichi Murayama, Katsuyasu Toyama (NTT), Yousuke Takahashi, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.) IN2007-36
This paper reports results of development and feasibility study about SPX (Secure networking Platform for group-oriented... [more] IN2007-36
pp.55-60
RCS, IN
(Joint)
2007-05-17
13:55
Tokyo Kikai-Shinko-Kaikan Bldg. Toward Group-Oriented Communication: Comparative Study of Modern Network Architectures
Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Kunio Hato, Junichi Murayama (NTT) IN2007-2
In this paper, we disscuss a network architecture realizing group-oriented communication for solving the problem
in the... [more]
IN2007-2
pp.7-12
NS, IN
(Joint)
2007-03-08
10:50
Okinawa Okinawa Convention Center A Load Balancing Method between Distributed DDoS-Attack Mitigation Systems by dividing anomaly traffic
Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-200
This paper proposes a large-volume DDoS-attack defense method which scrubs anomaly traffic with a DDoS-attack mitigatio... [more] IN2006-200
pp.119-124
IN 2007-02-02
11:15
Aichi Aichi Prefectural University Architecture Design of SPX : Secure networking Platform for group-oriented eXchange
Takeshi Yagi, Kunio Hato, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT), Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.) IN2006-173
This paper discusses some security problems in the Internet, such as spam and phishing, and proposes the community commu... [more] IN2006-173
pp.65-70
ICM, IN, LOIS
(Joint)
2007-01-19
10:40
Oita Beppu Convention Center(B-Con Plaza) A Communication Control Method using Personal Information for Secure SNS
Takeshi Yagi, Kunio Hato, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT), Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.) IN2006-155
This paper proposes communication control method to enhance security of social networking services. This method is compo... [more] IN2006-155
pp.103-108
IN 2006-12-15
14:00
Osaka   Evaluations of a Network Control Scheme for Sharing DDoS Attack Mitigation System called as Scrubingbox
Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-131
This paper evaluates dynamic traffic control methods to re-route traffic into DDoS-attack mitigation devices, namely Scr... [more] IN2006-131
pp.103-108
IN 2006-02-16
13:25
Kochi Kochi Univ. of Technology A Distributed Traffic-Monitoring Scheme for Overlay Networks
Takeshi Yagi, Yuuichi Naruse, Junichi Murayama, Kazuhiro Matsuda (NTT)
 [more] IN2005-144
pp.7-12
NS, IN 2005-03-04
11:10
Okinawa Okinawa Zanpa-misaki Royal Demand-base Cut-through Optical Path Control Scheme for Terabit-class Super-network
Takeshi Yagi, Kenichi Matsui, Yuuichi Naruse, Junichi Murayama, Kazuhiro Matsuda (NTT)
This paper proposes a demand-based cut-through optical path control scheme. This scheme is effective for terabit-class s... [more] NS2004-286 IN2004-286
pp.211-216
 Results 21 - 40 of 41 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan