|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2018-03-02 14:40 |
Miyazaki |
Phoenix Seagaia Resort |
Development of an Emulation System for Autonomous and Distributed Internet Security Infrastructure Masaya Shimode, Tomohiro Akasaki, Hiroyuki Kimiyama, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-236 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" for protecting our resources on the Inte... [more] |
NS2017-236 pp.385-390 |
NS, IN (Joint) |
2018-03-02 15:00 |
Miyazaki |
Phoenix Seagaia Resort |
Distributed High-Speed Packet Filtering System for Autonomous and Distributed Internet Security Infrastructure Hiroyuki Kimiyama, Yuya Kishi, Haruka Momo, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-237 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to
protect our resources ... [more] |
NS2017-237 pp.391-396 |
NS, IN (Joint) |
2018-03-02 15:20 |
Miyazaki |
Phoenix Seagaia Resort |
Method for Generating a Data Set to Detect Cyber Attacks for Autonomous and Distributed Internet Security Infrastructure Yusei Katsura, Hiroyuki Kimiyama (Tokyo Denki Univ.), Akihiro Nakao (Tokyo Univ.), Naoki Yonezaki, Tomoaki Tsutsumi, Kaoru Sano (Tokyo Denki Univ.), Takeshi Okamoto, Mitsuru Maruyama (Kanagawa Institutes of Technology), Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-238 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to protect our resources on... [more] |
NS2017-238 pp.397-401 |
IA, IN (Joint) |
2016-12-15 16:20 |
Hiroshima |
Hiroshima city university |
Generation of Dropping Request Message by Identifying Source Addresses and Attributes of Attacking Packets Mamoru Yogosawa, Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Tsuyoshi Ishikawa, Teruaki Tsutsumi, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno, Hiroyuki Kimiyama, Naoki Yonezaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) IA2016-69 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. It naturally lead us to switching ... [more] |
IA2016-69 pp.35-40 |
IA |
2016-08-29 13:00 |
Tokyo |
IIJ Seminar Room |
Experiments to Block Bandwidth Attacks on Testbed Simulating Autonomous Internet Security Infrastructure Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Mamoru Yogosawa, Kudou Wataru, Ryusei Suzuki, Kazuo Ohsawa, Tsuyoshi Ishikawa, Daichi Ashikawa, Tomoaki Tutumi, Kaoru Sano, Hirofumi Yamaki, Yoichirou Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (TDU) IA2016-14 |
[more] |
IA2016-14 pp.7-12 |
LOIS, ISEC, SITE |
2015-11-06 16:20 |
Kanagawa |
Kanagawa Univ. |
A Feasibility Study of Autonomous Security Infrastructure in the Internet Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] |
ISEC2015-46 SITE2015-33 LOIS2015-40 pp.67-74 |
ICSS |
2015-03-03 13:50 |
Okinawa |
Meio Univiersity |
Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router
-- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow -- Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) ICSS2014-65 |
There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems, and ... [more] |
ICSS2014-65 pp.13-18 |
IA |
2014-09-12 10:00 |
Tokyo |
Tokyo Tech Front |
A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attack Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-14 |
An architecture of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets... [more] |
IA2014-14 pp.1-6 |
IA |
2014-09-12 10:30 |
Tokyo |
Tokyo Tech Front |
An Implementation and Evaluation of Multi-Layer-Binding Router using OpenFlow Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-15 |
A prototype of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets to ... [more] |
IA2014-15 pp.7-12 |
NS |
2012-01-27 16:40 |
Okinawa |
Ryukyu University |
Applicability of Full-Flying S-CSMA/v-MCA System to Wireless-LAN
-- Evaluation of v-MCA Procedure on OBS-based Medium Access Control -- Yusuke Ueda, Kaoru Sano, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2011-177 |
The "Full-Flying S-CSMA/v-MCA System (FF-System)" was developed to operate wide area wireless access network effectively... [more] |
NS2011-177 pp.185-190 |
NS |
2012-01-27 17:00 |
Okinawa |
Ryukyu University |
QoS control using p-persistent on Full-Flying S-CSMA/v-MCA method Ippei Ohnaka, Kaoru Sano, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2011-178 |
In order to deploy broadband access services to the Internet economically in a short period of time in digital divide ar... [more] |
NS2011-178 pp.191-196 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|