|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 14:25 |
Online |
Online |
Cryptocurrency Analysis System for Investigating Cyber Crime Economy Hiroshi Mori, Hiroshi Kumagai, Yin Minn Pa Pa, Yuta Takata, Ryoya Furukawa, Yuji Sakurai, Masaki Kamizono (DTCY) ISEC2022-24 SITE2022-28 BioX2022-49 HWS2022-24 ICSS2022-32 EMM2022-32 |
[more] |
ISEC2022-24 SITE2022-28 BioX2022-49 HWS2022-24 ICSS2022-32 EMM2022-32 pp.98-103 |
IA, ICSS |
2021-06-22 09:25 |
Online |
Online |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
ICSS, IPSJ-SPT |
2018-03-08 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Analyzing Victims of DRDoS Attacks Observed by Honeypots Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-83 |
In recent years, Distributed Reflection Denial-of-Service (DRDoS) Attack are increasing. We have been observing DRDoS at... [more] |
ICSS2017-83 pp.205-210 |
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] |
2018-02-16 09:45 |
Hokkaido |
Hokkaido Univ. |
A novel dissimilarity measure between pieces for assembling jigsaw puzzles Shogo Mano, Fubito Toyama, Hiroshi Mori, Kenji Shoji (Utsunomiya Univ.) |
In jigsaw puzzle solvers, a definition of dissimilarity measure between pieces is important facter. In this paper, we pr... [more] |
|
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 16:40 |
Yamaguchi |
|
Investigation of Android Markets using Static Detector for Packed Applications Hiroki Nakano, Zhiyong Yang, Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2016-26 SITE2016-20 ICSS2016-26 EMM2016-34 |
In this paper, we propose a static method to identify which Android packer is used to protect an Android app. Using this... [more] |
ISEC2016-26 SITE2016-20 ICSS2016-26 EMM2016-34 pp.71-76 |
ICSS |
2015-03-04 14:30 |
Okinawa |
Meio Univiersity |
Visualization of Various DoS Attacks Observed by Malware Sandbox Analysis Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-90 |
Nowadays, large-scaled DoS attacks from malware, such as bots, have become a big problem. There are several types of DoS... [more] |
ICSS2014-90 pp.163-168 |
IE, ITE-AIT, ITE-ME [detail] |
2014-11-06 15:10 |
Kagoshima |
|
Study on contents evaluation for high-definition large-sized images Seiichi Tanaka, Yuki Shimizu, Hiroshi Mori, Masao Kasuga, Kenji Shoji (Utsunomiya Univ.) IE2014-52 |
Currently, high-definition and large-sized image has quickly spread by development of the imaging technique. Next genera... [more] |
IE2014-52 pp.19-23 |
ICSS |
2013-03-25 14:30 |
Kanagawa |
Yokohama National University |
Possibility of Remote Exploits by Android Phones Hiroshi Mori, Fumihiro Kanei, Yuki Shoda, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-64 |
Recently, malware that run on Android OS are increasing. For now, a class of Android malware that leak information from ... [more] |
ICSS2012-64 pp.43-48 |
IE, MVE |
2008-07-14 16:45 |
Nagano |
Shinshu University |
Sports Support Entertainment System Using Trampoline Tomoyuki Fujieda, Kazuto Shiratori, Hiroshi Mori, Junichi Hoshino (Tsukuba Univ.) IE2008-38 MVE2008-32 |
The aerobics on the mini trampoline is called the trampobics. It substantially decreases the damage to the joint compare... [more] |
IE2008-38 MVE2008-32 pp.31-36 |
IE, MVE, PRMU |
2004-07-16 09:30 |
Ehime |
|
Dynamic Generation of Virtual Space based on User's Actions Yuya Nomata, Hiroshi Mori, Junichi Hoshino (Univ. of Tsukuba) |
[more] |
IE2004-25 PRMU2004-49 MVE2004-26 pp.1-6 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|