|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2013-10-10 14:00 |
Overseas |
Konkuk Univ., Seoul |
Proposal of a Network Control System to Detect, Analyze and Mitigate Targeted Cyber Attacks Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2013-26 |
Recently, targeted cyber attacks have been so sophisticated that we cannot detect them at early stage of intrusion.
The... [more] |
IA2013-26 pp.1-6 |
IA, ICSS |
2013-06-21 13:00 |
Niigata |
Ao-re Nagaoka |
Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet Soshi Hirono (Nagoya Univ.), Kenji Ohira (NAIST), Yukiko Yamaguchi (Nagoya Univ.), Hirofumi Yamaki (Tokyo Denki Univ.), Hiroki Takakura (Nagoya Univ.) IA2013-12 ICSS2013-12 |
In dynamic malware analysis, we cannot obtain sufficient results of malware analysis without Internet connectivity. How... [more] |
IA2013-12 ICSS2013-12 pp.67-72 |
ICSS |
2012-11-22 14:30 |
Hiroshima |
Miyajima Mori-no-Yado |
Proposal of a network design support system for risk mitigation against inside attacks Hirokazu Hasegawa (Nagoya Univ.), Ray Atarashi (IIJ-II), Masahiko Kato (IIJ), Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura (Nagoya Univ.) ICSS2012-51 |
In sophisticated cyber attacks, even information protected by an isolated network is compromised. Although there are var... [more] |
ICSS2012-51 pp.37-42 |
IA |
2012-10-19 16:30 |
Overseas |
Phuket |
Transparent Server Migration between Datacenters by Utilizing OpenFlow Tatsuya Fukushima, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-50 |
For disaster mitigation, mechanisms that restore network service swiftly have drawn attention.
For the swiftness, host... [more] |
IA2012-50 pp.95-100 |
ICSS, IA |
2012-06-22 09:50 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
A High-Speed Classification Method based on Opcode of Malware Yang Zong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-8 ICSS2012-8 |
Malicious software in form of Internet worms, computer viruses, and trojan horses poses a major threat to the security o... [more] |
IA2012-8 ICSS2012-8 pp.43-48 |
IA |
2011-11-29 09:25 |
Hokkaido |
Greenpia Onuma (Hakodate) |
Development of Authentication Infrastructure for Tokai Academic Cloud Using Shibboleth and CAS Shoji Kajita (Kyoto Univ.), Shoichi Saito (Nagoya Inst. of Tech.), Masatoshi Tsuchiya (Toyohashi Univ. of Tech.), Daisuke Yamamoto (Nagoya Inst. of Tech.), Tsunehiko Suzuki (Chukyo Univ.), Yukiko Yamaguchi (Nagoya Univ.), Takahiro Hasegawa (Shizuoka Univ.), Akiumi Hasegawa (Chukyo Univ.), Akiji Tanaka, Yuichi Uchida (Gifu Univ.), Ichiro Mitsuhashi, Yoshimasa Ohta (Mie Univ.), Hiroki Takakura (Nagoya Univ.), Hiroshi Matsuo (Nagoya Inst. of Tech.) IA2011-44 |
This paper describes the current status of Authentication Infrastructure for Tokai Academic Cloud. Currently we have bee... [more] |
IA2011-44 pp.49-53 |
ICM |
2008-05-08 16:00 |
Kagoshima |
Kagoshima Public Access Center |
Construction and Management of Unified-Server in Nagoya University Hisashi Naito, Yukiko Yamaguchi, Shoji Kajita, Yasushi Hirano, Kenji Mase (Nagoya Univ.) ICM2008-9 |
In Nagoya University, we have constructed Unified-Server to integrate a lot of deceterized e-mail and
web servers in Un... [more] |
ICM2008-9 pp.47-52 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|