|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS |
2007-11-21 15:10 |
Hyogo |
Kobe University |
Function Estimation of Malware Code by Measuring Similarity Kouki Yasumoto, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) ISEC2007-93 OIS2007-65 |
Generally almost all of malwares are classified by the variants of known malwares and packed ones that are identified wi... [more] |
ISEC2007-93 OIS2007-65 pp.31-36 |
ISEC, LOIS |
2007-11-21 15:35 |
Hyogo |
Kobe University |
Extract Network Access Information from BOT Code Using Static Analysis Hayato Okada, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) ISEC2007-94 OIS2007-66 |
Recently malwares called BOT spread like wildfire across the Internet. BOTs access a outside server like IRC server and ... [more] |
ISEC2007-94 OIS2007-66 pp.37-41 |
DE, DC |
2006-10-17 14:15 |
Tokyo |
|
[Invited Talk]
nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis Koji Nakao, Katsunari Yoshioka, Masashi Eto, Daisuke Inoue, Kenji Rikitake (NICT) |
As network security incidents are being more complex and serious, activities of network monitoring, incident analysis an... [more] |
DE2006-123 DC2006-30 pp.25-30 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 11:35 |
Okayama |
Okayama Univ. |
Visualization Technologies of nicter Incident Analysis System Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE) |
The authors have been working on the R&D activities of nicter, an Internet security incident analysis center investigati... [more] |
ISEC2006-51 pp.83-89 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 14:40 |
Okayama |
Okayama Univ. |
Development of IH-ZIP: A Data Compression Tool for Information Hiding Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Koji Nakao (NICT), Tsutomu Matsumoto (Yokohama National Univ.) |
We have previously proposed several methods of information hiding for lossless data compression for LZ77 and Huffman cod... [more] |
ISEC2006-66 pp.197-204 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:25 |
Iwate |
Iwate Prefectural University |
Study on Host Profiling for Incident Analysis Kazuya Ohkouchi (NICT/HITACHI), Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI) |
[more] |
ISEC2005-21 SITE2005-19 pp.89-96 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:50 |
Iwate |
Iwate Prefectural University |
A Simulation-based UDP Traffic Analysis of DNSSEC Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI), Shinji Shimojo (Osaka Univ.), Hiroki Nogawa (Tokyo Medical and Dental Univ.) |
DNSSEC, an authentication method of DNS (Domain Name System), increases
the payload length of DNS answer datagrams by a... [more] |
ISEC2005-22 SITE2005-20 pp.97-104 |
ISEC, LOIS |
2004-11-09 13:25 |
Osaka |
Osaka Univ. |
Virtual Transmission Monitoring System for Behavior Analysis of Virus Toshihiko Hirooka (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima), Yuji Hoshizawa (Secure Brain), Koji Nakao (KDDI) |
The resarch of virus such as detection of virus, or behavior analysis of virus is active. It is difficult to know the be... [more] |
ISEC2004-92 OIS2004-59 pp.51-56 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|