IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 97 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
11:45
Online Online A Large-scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials
Kosuke Murakami, Takahiro Kasama, Daisuke Inoue (NICT) ISEC2021-34 SITE2021-28 BioX2021-35 HWS2021-34 ICSS2021-39 EMM2021-39
 [more] ISEC2021-34 SITE2021-28 BioX2021-35 HWS2021-34 ICSS2021-39 EMM2021-39
pp.147-152
RCS, SR, SRW
(Joint)
2021-03-03
12:05
Online Online Physical-Layer Cell Identity Detection Probability for Broadband Single-Carrier Transmission
Kyogo Ota, Daisuke Inoue, Mamoru Sawahashi (Tokyo City Univ.), Satoshi Nagata (NTT DOCOMO) RCS2020-208
 [more] RCS2020-208
pp.31-36
ICSS, IPSJ-SPT 2021-03-02
10:25
Online Online Proof of concept of sandbox evasion attack using email address stored in target machine
Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] ICSS2020-57
pp.184-189
NS, RCS
(Joint)
2020-12-17
12:15
Online Online PCID Detection Probability Using NR Synchronization Signals for 3GPP TDL Channel Models
Kyogo Ota, Daisuke Inoue, Mamoru Sawahashi (Tokyo City Univ.), Satoshi Nagata (NTT DOCOMO) RCS2020-137
This paper presents physical-layer cell identity (PCID) detection probability using synchronization signals in the 3rd g... [more] RCS2020-137
pp.19-24
RCS, AP, UWT
(Joint)
2020-11-25
11:45
Online Online Physical Cell ID Detection Using Joint Estimation of Frequency Offset and SSS Sequence for NR Initial Access
Daisuke Inoue, Kyogo Ota, Mamoru Sawahashi (Tokyo City Univ.), Satoshi Nagata (NTT DOCOMO) RCS2020-114
 [more] RCS2020-114
pp.24-29
RCS, AP, UWT
(Joint)
2020-11-25
12:10
Online Online Radio Frame Timing Detection Method in Multipath Fading Channels for NR Initial Access
Kyogo Ota, Daisuke Inoue, Mamoru Sawahashi (Tokyo City Univ.), Satoshi Nagata (NTT DOCOMO) RCS2020-115
This paper presents radio frame timing detection performance using demodulation reference signal (DM-RS) after detecting... [more] RCS2020-115
pp.30-35
ICSS, IPSJ-SPT 2020-03-03
09:50
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] ICSS2019-85
pp.103-108
ICSS, IPSJ-SPT 2020-03-02
11:10
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring
Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT) ICSS2019-93
 [more] ICSS2019-93
pp.189-194
RCS 2019-10-25
09:30
Kanagawa Yokosuka Research Park Physical-layer Cell ID Detection Probability Using Synchronization Signals for NB-IoT Radio Interface in 28-GHz Band
Daisuke Inoue, Kyogo Ota, Mamoru Sawahashi (Tokyo City Univ.), Satoshi Nagata (NTT DOCOMO) RCS2019-192
This paper presents physical cell identity (PCID) detection probability using the narrowband primary synchronization sig... [more] RCS2019-192
pp.77-82
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
11:20
Kochi Kochi University of Technology Automatic Node Manipulation System for Active Monitoring Environment
Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT) ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49
 [more] ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49
pp.299-304
ICSS, IPSJ-SPT 2019-03-08
11:15
Okinawa NICT Okinawa Electromagnetic Technology Center Threat Information Analysis Using Conditional Generative Adversarial Network
Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT) ICSS2018-81
 [more] ICSS2018-81
pp.105-110
ICSS, IPSJ-SPT 2019-03-08
14:50
Okinawa NICT Okinawa Electromagnetic Technology Center A Trouble Ticket System Specialized for Incident Response
Yu Tsuda, Takashi Tomine (NICT), Masato Jingu (NICT/HISYS), Keisuke Iwasaki (NTT-AT), Kenjiro Terada, Daisuke Inoue (NICT) ICSS2018-92
In case that an organization has damaged by a cyberattack, it is crucial to minimize the damage by rapid security incide... [more] ICSS2018-92
pp.197-202
ICSS 2018-11-21
15:15
Kagoshima   Malware Analysis Method Using Conditional Generative Adversarial Network
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) ICSS2018-57
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] ICSS2018-57
pp.25-30
ICSS 2018-11-22
14:20
Kagoshima   Part II: Calculating Similarity between IoT Malware over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more]
ICSS2018-66
pp.73-78
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
11:45
Hokkaido Sapporo Convention Center Real-time Botnet Detection Using Nonnegative Tucker Decomposition
Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
pp.297-304
ICSS, IA 2018-06-25
13:25
Ehime Ehime University Calculating Similarity between IoT Malware Samples over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more]
IA2018-2 ICSS2018-2
pp.7-12
ICSS, IA 2018-06-26
11:40
Ehime Ehime University A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] IA2018-13 ICSS2018-13
pp.77-82
ICSS, IPSJ-SPT 2018-03-07
13:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2017-51
In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and ... [more] ICSS2017-51
pp.1-6
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] ICSS2017-69
pp.109-114
ICSS, IPSJ-SPT 2018-03-08
09:45
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Evaluation of malware sandbox using evasive test samples
Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
 [more]
 Results 21 - 40 of 97 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan