IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 14 of 14  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2018-03-07
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A study of security requirements and function implementation for home networks in a period of IoT expansion
Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT) ICSS2017-59
We discuss the security requirements in the home networks in a period of IoT expansion. Based on the security requiremen... [more] ICSS2017-59
pp.49-54
NS, IN
(Joint)
2017-03-03
10:40
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL A Proposal of Applying TPM Based Authentication on IoT Devices Access Control Techniques.
Tsuyoshi Kondoh, Masami Ueno (NTT) IN2016-134
Along with rapid increase of IoT (Internet of Things), the threat increases. For example some IoT device are function po... [more] IN2016-134
pp.223-226
IN, ICTSSL, NWS
(Joint)
2016-10-20
13:30
Osaka Osaka Uinv. A Study of Requirements on Authentication and Traffic Control for IoT Devices
Tsuyoshi Kondoh, Shingo Kashima, Masami Ueno (NTT) IN2016-51
Along with rapid increase of IoT (Internet of Things) devices, low-security devices will increase. In this paper we cons... [more] IN2016-51
pp.15-18
IN 2013-06-21
10:25
Fukui University of Fukui, Bunkyo Campus, Memorial Academy Hall Reduction of VM Lead Time in Massive Scale Out
Tsuyoshi Kondoh, Yuichi Sudo, Kunio Hato (NTT) IN2013-30
Cloud computing offers on demand and pay-per-use type of services, in which users can utilize virtual machines only when... [more] IN2013-30
pp.29-32
IA 2012-10-18
16:00
Overseas Phuket Identifying Anomalous Traffic using Dynamic Programing based Differential Analysis Method
Keisuke Ishibashi, Tsuyoshi Kondoh (NTT) IA2012-38
 [more] IA2012-38
pp.25-29
IA 2010-10-29
10:40
Overseas Bangkok, Thailand (T.B.D) Effect of temporal monitoring granularity on detection accuracy of anomalous traffic
Keisuke Ishibashi, Ryoichi Kawahara, Tatsuya Mori, Tsuyoshi Kondoh (NTT), Shoichiro Asano (NII) IA2010-49
 [more] IA2010-49
pp.43-48
NS 2008-05-15
15:00
Hokkaido Future University-Hakodate Evaluation for Detectability of Identifying the Anomalous Traffic Using Delta Traffic
Shigeaki Harada, Ryoichi Kawahara, Noriaki Kamiyama, Tsuyoshi Kondoh, Keisuke Ishibashi (NTT), Shoichiro Asano (NII) NS2008-1
To mitigate the anomalous traffic such as DDoS attacks,
it is necessary to accurately identify the anomalous traffic so... [more]
NS2008-1
pp.1-6
NS, IN
(Joint)
2008-03-06
11:50
Okinawa Bankoku Shinryokan Identification Method of Attacking Source Using Traffic Flow in Backbone Networks
Takeshi Kuwahara, Tsuyoshi Kondoh, Takeshi Yagi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-169
In this paper, we propose a novel identification method of attacking source using traffic flow information in backbone n... [more] IN2007-169
pp.61-66
NS, CS, IN
(Joint)
2007-09-21
10:30
Miyagi Tohoku University Identifying the Anomalous Traffic Using Delta Traffic
Tsuyoshi Kondoh, Keisuke Ishibashi (NTT) IN2007-62
This paper reports a technique of identifying the anomalous traffic and its evaluation result. Our identification techni... [more] IN2007-62
pp.111-116
ICM 2007-05-11
09:15
Kochi Kochi Uni. of Technology [Encouragement Talk] The Designing for Large Scale Traffic Collector using Flow Mediator
Atsushi Kobayashi (NTT), Daisuke Matsubara (Hitachi), Tsuyoshi Kondoh, Keisuke Ishibashi (NTT)
Recently traffic volume of Internet backbone network becomes more and more, and the diversity of networks increases, suc... [more]
NS, IN
(Joint)
2007-03-08
11:10
Okinawa Okinawa Convention Center Effect of sampling rate and monitoring granularity on anomaly detectability
Keisuke Ishibashi, Ryoichi Kawahara, Tatsuya Mori, Tsuyoshi Kondoh (NTT), Shoichiro Asano (NII) IN2006-201
In this paper, we quantitatively evaluate how sampling decrease detectability of anomalous traffic. We build equations ... [more] IN2006-201
pp.125-130
IA 2007-01-19
09:05
Hiroshima International Conference Center Hiroshima Development of Aggregation Device for Next Generation Backbone Networks
Daisuke Matsubara, Satoshi Kiyotou, Tomohiro Baba, Yasushi Fukuda (Hitachi), Atsushi Kobayashi, Tsuyoshi Kondoh (NTT) IA2006-31
This paper explains architecture of aggregation device that stores and aggregates traffic information of next generation... [more] IA2006-31
pp.5-8
CQ, NS, ICM
(Joint)
2006-11-16
13:10
Tottori Tottori Univ. of Environmental Studies [Encouragement Talk] A Proposal of Traffic Matrix Monitoring Collector for Next Generation Backbone
Atsushi Kobayashi, Tsuyoshi Kondoh, Yutaka Hirokawa, Keisuke Ishibashi, Kimihiro Yamamoto (NTT) NS2006-123 CQ2006-64 TM2006-37
In large-scale networks, traffic monitoring system needs to handle huge traffic flow records. So, this system's capabili... [more] NS2006-123 CQ2006-64 TM2006-37
pp.1-6(NS), pp.31-36(CQ), pp.1-6(TM)
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
14:20
Miyagi Ichinobo, Sakunami-Spa A study for hardware optimization using a high level synthesis fron C
Satoru Inoue, Tsuyoshi Kondo, Tomonori Izumi, Masahiro Fukui (Rits)
Higher abstraction design has been highly required so that a human can focus on inspired part of design by making comput... [more] SIP2005-124 ICD2005-143 IE2005-88
pp.55-60
 Results 1 - 14 of 14  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan