IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2023-03-13
17:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Lessons Learned from Construction of the Security Technical Term Dictionary
Misato Matsuda, Akira Fujita, Yu Tsuda, piyokango, Daisuke Inoue (NICT) ICSS2022-65
In order to do OSINT, natural language processing technology for processing documents is an important elemental technolo... [more] ICSS2022-65
pp.103-108
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
11:20
Kochi Kochi University of Technology Automatic Node Manipulation System for Active Monitoring Environment
Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT) ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49
 [more] ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49
pp.299-304
ICSS, IPSJ-SPT 2019-03-08
14:50
Okinawa NICT Okinawa Electromagnetic Technology Center A Trouble Ticket System Specialized for Incident Response
Yu Tsuda, Takashi Tomine (NICT), Masato Jingu (NICT/HISYS), Keisuke Iwasaki (NTT-AT), Kenjiro Terada, Daisuke Inoue (NICT) ICSS2018-92
In case that an organization has damaged by a cyberattack, it is crucial to minimize the damage by rapid security incide... [more] ICSS2018-92
pp.197-202
ICSS, IPSJ-SPT 2016-03-04
11:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Suspicious Processes Detection Scheme using Process Frequency and Network State
Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-60
pp.77-82
IA, SITE, IPSJ-IOT [detail] 2016-03-04
11:35
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) A Proposal of Timeline-Based Event Log Management Method
Takashi Tomine, Yu Tsuda (NICT), Akira Kato, Hideki Sunahara (Keio Univ.), Daisuke Inoue (NICT) SITE2015-74 IA2015-106
When a network trouble is happen, network operators are surveying information such as logs and statistics, from close ne... [more] SITE2015-74 IA2015-106
pp.227-232
ICSS 2015-11-27
14:40
Fukushima AIST, Fukushima Renewable Energy Institute A Suspicious Processes Detection Scheme using Process Frequency
Junji Nakazato, Yu Tsuda, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-45
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-45
pp.61-66
ICSS 2015-03-03
15:15
Okinawa Meio Univiersity A Pluggable and Programmable Flamework for Analyzing Security Logs
Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] ICSS2014-68
pp.31-36
ICSS 2015-03-04
10:50
Okinawa Meio Univiersity Prediction of Malware Activities based on Loopback Address from DNS
Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] ICSS2014-80
pp.103-108
ICSS, IPSJ-SPT 2014-03-28
11:15
Okinawa Meio Univiersity Timeline-Based Event Log Viewer over Multi-Host Environment
Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more]
ICSS2013-79
pp.125-130
IA, SITE, IPSJ-IOT [detail] 2013-03-15
16:05
Nara Todaiji Total Cultural Center A Fieldwork Study on Location Privacy Issues Caused by Wi-Fi/Bluetooth Communication
Shogo Orio, Hiroshi Ueda (Kyoto Univ.), Tetsutaro Uehara (RIIS), Yu Tsuda (Kyoto Univ.), Katsuyasu Yoshimura, Tomohide Yamamura, Ryouichi Nomura (FXSS) SITE2012-71 IA2012-109
In Wi-Fi and Bluetooth connection, by specifications, devices exchange their unique assigned device addresses in the cle... [more] SITE2012-71 IA2012-109
pp.249-254
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan