IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 44  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2024-03-01
13:50
Okinawa Okinawa Convention Center Evaluation experiment on a route server function for maintaining dynamic routes in metabolic routers
Yuya Suga, Hiroki Saruta, Rei Ishioka, Junichi Murayama (Tokai Univ.) IN2023-112
As a measure against malware infecting routers, we are studying metabolic routers. This router can delete even undetecta... [more] IN2023-112
pp.279-282
NS, IN
(Joint)
2024-03-01
14:15
Okinawa Okinawa Convention Center A centralized control scheme of router switching for suppressing malware spreading within a metabolic router
Rei Ishioka, Yuya Suga, Junichi Murayama (Tokai Univ.) IN2023-113
As a countermeasure against router targeting malware, we have been studying a metabolic-type router. In this metabolic-t... [more] IN2023-113
pp.283-286
RCS, IN, NV
(Joint)
2023-05-25
10:00
Kanagawa Keio University (Hiyoshi Campus), and online
(Primary: On-site, Secondary: Online)
Designing a suppressing scheme of spreading malware infection within a metabolic router
Rei Ishioka, Haruto Hirose, Junichi Murayama (Tokai Univ.) IN2023-1
As a countermeasure against malware infection on routers, we have been studying a metabolic-type router. Inside this rou... [more] IN2023-1
pp.1-4
CS, IN, NS, NV
(Joint)
2020-09-11
09:25
Online Online A virtual-network replacing scheme for achieving a metabolic network
Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2020-24
A future targeted attacks would infect a network with a malware program and then tampers packet-forwarding routes. As a ... [more] IN2020-24
pp.13-18
CS, IN, NS, NV
(Joint)
2020-09-11
09:50
Online Online An edge-router replacing scheme for achieving a metabolic network
Yuta Miyaoka, Yu Tamura, Junichi Murayama (Tokai Univ.) IN2020-25
A future cyber attack would tampers packet-forwarding routes of a target network using malware programs. As a solution a... [more] IN2020-25
pp.19-24
NS, IN
(Joint)
2020-03-05
10:40
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
A repetitive virtual router replacing scheme without service stopping
Yuta Miyaoka, Yu Tamura, Junichi Murayama (Tokai Univ) IN2019-92
 [more] IN2019-92
pp.97-102
NS, IN
(Joint)
2020-03-05
11:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
An inheritance scheme of dynamic routing information for achieving successive replacing of virtual routers
Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2019-93
In future targeted attacks, malware programs infected in routers may cause various problems. Thus, we have proposed a sc... [more] IN2019-93
pp.103-108
NS, IN
(Joint)
2018-03-01
09:20
Miyazaki Phoenix Seagaia Resort A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] IN2017-90
pp.5-10
NS, IN
(Joint)
2018-03-01
09:40
Miyazaki Phoenix Seagaia Resort A Cooperation Scheme between Distributive Virtual Firewall and NAT for Countermeasuring DNS Amplification Attacks
Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-91
Recently, DNS amplification attacks are occurring frequently.
This attack is one of DDoS attacks.
Thus, a large-scale ... [more]
IN2017-91
pp.11-14
RCS, IN, NV
(Joint)
2017-05-12
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] IN2017-5
pp.21-24
RCS, IN, NV
(Joint)
2017-05-12
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Lecture] Implementing a distributive virtual firewall using OpenFlow
Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-11 RCS2017-49
Recently, DNS amplification attacks to a targeted server is occurring frequently. Those attacks also cause congestion of... [more] IN2017-11 RCS2017-49
pp.55-58(IN), pp.109-112(RCS)
IN, RCS
(Joint)
2016-05-20
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Virtual Firewall Scheme that Filters DNS Fragment Packets caused by DNS Amplification Attacks
Eitetsu Gen (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.) IN2016-16
Recently, DNS amplification attacks occur frequently. Those attacks disturb service offering by means of sending many pa... [more] IN2016-16
pp.85-88
SC 2016-03-25
10:20
Tokyo NII Visualization Technique to Colorize and Categorize Occurrence Frequency of Key Words in Newspapers with Temporal Scalability
Ken T. Murata, Yoshiaki Nagaya, Kazunori Yamamoto (NICT), Kentaro Ukawa, Kazuya Muranaga, Junichi Murayama, Yutaka Suzuki (SEC) SC2015-22
We propose a technique to visualize occurrence frequency of specified categories or key words in archived database of ne... [more] SC2015-22
pp.1-6
NS, IN
(Joint)
2016-03-04
13:30
Miyazaki Phoenix Seagaia Resort Evaluation on Virtual Firewall Schemes against DNS Amplification Attacks
Eitetsu Gen, Shota Endo (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.) IN2015-140
Recently, DDoS attacks that disturb service offering in the Internet have occurred frequently. In order to mitigate such... [more] IN2015-140
pp.189-192
NS, IN
(Joint)
2015-03-03
10:50
Okinawa Okinawa Convention Center Fast Log Tracing Method for Information-Leakage Prevention
Koki Ikeda, Takuya Suzuki, Pichaya Kietkaroon (Tokai Univ.), Takahiro Hamada, Yuichi Murata (NTT), Junichi Murayama (Tokai Univ.) IN2014-150
Recently, targeted attacks for enterprise information networks occur frequently and thus secret files are leaking via ap... [more] IN2014-150
pp.175-178
MI 2015-03-03
10:34
Okinawa Hotel Miyahira Development of New 4K Hi-speed Camera and Applications for Medical Engineering
Ken T. Murata (NICT), Takamichi Mizuhara (Clealink), Eizen Kimura (Ehime Univ.), Yoshiaki Nagaya, Hidenobu Watanabe (NICT), Takashi Kurosawa (Hitachi Solutions), Kazuya Muranaga, Kentaro Ukawa, Junichi Murayama, Yutaka Suzuki (SEC), Osamu Tatebe, Masahiro Tanaka (Tsukuba Univ.), Kazunori Yamamoto (NICT)
(To be available after the conference date) [more]
NS, IN
(Joint)
2015-03-03
14:10
Okinawa Okinawa Convention Center A Flow Screening Control Scheme for Flow Networks
Yusuke Watanabe, Pichaya Kietkaroon (Tokai Univ), Takahiro Hamada, Yuminobu Igarashi (NTT), Junichi Murayama (Tokai Univ) IN2014-161
Recently, targeted attacks for enterprise information networks occur frequently. Since a data center accommodates many e... [more] IN2014-161
pp.239-242
IN 2012-10-12
11:25
Tokyo Tokyo Univ. Sanjo-Kaikan A Study of Paper AttributeAnalysis on Information Networks
Masashi Toyama, Hiroto Nomura, Junichi Murayama (NTT) IN2012-102
When a user post a technical report, IEICE registration system requires many useful attribute information related to his... [more] IN2012-102
pp.151-154
NS, IN
(Joint)
2012-03-09
11:00
Miyazaki Miyazaki Seagia On Evaluation of Integrated Control of Live Migration and Traffic Engineering in Cloud Computing
Hirofumi Ichihara, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2011-172
Virtual machine live migration, which migrate a virtual machine between data centers, is studied as a way to improve qua... [more] IN2011-172
pp.211-216
NS, IN
(Joint)
2012-03-09
11:20
Miyazaki Miyazaki Seagia Proposal and Evaluation of a Stable Traffic Engineering Method for Live Migration in Cloud Computing
Motohiro Seki, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2011-173
Virtual machine live migration, which migrate a virtual machine between data centers, is studied as a way to improve qua... [more] IN2011-173
pp.217-222
 Results 1 - 20 of 44  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan