IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 8 of 8  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, SITE, IPSJ-IOT [detail] 2016-03-04
11:35
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) A Proposal of Timeline-Based Event Log Management Method
Takashi Tomine, Yu Tsuda (NICT), Akira Kato, Hideki Sunahara (Keio Univ.), Daisuke Inoue (NICT)
When a network trouble is happen, network operators are surveying information such as logs and statistics, from close ne... [more] SITE2015-74 IA2015-106
pp.227-232
EMM 2016-03-02
14:30
Kagoshima Yakushima Environ. and Cultural Vill. Center [Poster Presentation] A Study of Anonymity Index with Probability of Re-Identification
Hiroko Akiyama (nnct), Akira Kato, Hideki Sunahara (Keio Univ.)
For making valuable information or better services for individuals and society, Bigdata is very effective.
Bigdata has ... [more]
EMM2015-76
pp.1-5
ICSS 2015-03-03
14:15
Okinawa Meio Univiersity Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA
Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.)
In recent days, many botnet-based attacks are observed. In this thesis, our object is to detect the domain generation al... [more] ICSS2014-66
pp.19-24
ICSS, IPSJ-SPT 2014-03-28
09:00
Okinawa Meio Univiersity A Study on the Formulation of Re-identification of Anonymized Personal Information
Hiroko Akiyama, Akira Kato, Hideki Sunahara (Keio Univ.)
Anonymizing personal information is one way to preserve human's privacy.
But combination of anonymized information mig... [more]
ICSS2013-86
pp.167-172
IA 2013-02-15
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Formal approach for verification of routing protocols
Tomoki Murota (Univ. of Tokyo), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.)
 [more] IA2012-86
pp.95-100
IA, SITE, IPSJ-IOT [detail] 2012-03-16
09:20
Hokkaido Hokkaido Univ. Design and Implementation of Network Covert Channel Validation Framework
Takashi Tomine (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.)
Network covert channels are communication channels or information transfer methods in networks which are not intended fo... [more] SITE2011-47 IA2011-97
pp.185-190
ICSS 2011-03-25
13:25
Tokyo Suspended Consideration on hidden-communication channel in the Internet communication device.
Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.)
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more]
ICSS2010-60
pp.23-28
PN 2005-04-20
10:05
Tokyo Univ. of Electric-Commications [Invited Talk] High-bandwidth TCP single-stream experiments on Long distance 10 Gbps Internet -- Challenge to Internet2 Land Speed Record --
Kei Hiraki, Mary Inaba, Makoto Nakamura, , Ryo Nishimura, (Univ. of Tokyo), , (Chelsio Communications), , , , (Fujitsu Computer Technologies), Akira Kato, Seiichi Yamamoto, Katsuyuki Hasebe (WIDE Project)
 [more] PN2005-1
pp.1-6
 Results 1 - 8 of 8  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan