IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 18 of 18  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
AI 2019-07-22
16:30
Hokkaido   Modeling of Cyber Attack Based on POMDP
Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] AI2019-15
pp.77-82
NS, IN
(Joint)
2018-03-02
14:40
Miyazaki Phoenix Seagaia Resort Development of an Emulation System for Autonomous and Distributed Internet Security Infrastructure
Masaya Shimode, Tomohiro Akasaki, Hiroyuki Kimiyama, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-236
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" for protecting our resources on the Inte... [more] NS2017-236
pp.385-390
NS, IN
(Joint)
2018-03-02
15:00
Miyazaki Phoenix Seagaia Resort Distributed High-Speed Packet Filtering System for Autonomous and Distributed Internet Security Infrastructure
Hiroyuki Kimiyama, Yuya Kishi, Haruka Momo, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-237
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to
protect our resources ... [more]
NS2017-237
pp.391-396
IA, IN
(Joint)
2016-12-15
16:20
Hiroshima Hiroshima city university Generation of Dropping Request Message by Identifying Source Addresses and Attributes of Attacking Packets
Mamoru Yogosawa, Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Tsuyoshi Ishikawa, Teruaki Tsutsumi, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno, Hiroyuki Kimiyama, Naoki Yonezaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) IA2016-69
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. It naturally lead us to switching ... [more] IA2016-69
pp.35-40
IA 2016-08-29
13:00
Tokyo IIJ Seminar Room Experiments to Block Bandwidth Attacks on Testbed Simulating Autonomous Internet Security Infrastructure
Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Mamoru Yogosawa, Kudou Wataru, Ryusei Suzuki, Kazuo Ohsawa, Tsuyoshi Ishikawa, Daichi Ashikawa, Tomoaki Tutumi, Kaoru Sano, Hirofumi Yamaki, Yoichirou Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (TDU) IA2016-14
 [more] IA2016-14
pp.7-12
LOIS, ISEC, SITE 2015-11-06
16:20
Kanagawa Kanagawa Univ. A Feasibility Study of Autonomous Security Infrastructure in the Internet
Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] ISEC2015-46 SITE2015-33 LOIS2015-40
pp.67-74
ICSS 2015-03-03
13:50
Okinawa Meio Univiersity Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router -- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow --
Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) ICSS2014-65
There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems, and ... [more] ICSS2014-65
pp.13-18
IA 2014-09-12
10:00
Tokyo Tokyo Tech Front A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attack
Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-14
An architecture of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets... [more] IA2014-14
pp.1-6
IA 2014-09-12
10:30
Tokyo Tokyo Tech Front An Implementation and Evaluation of Multi-Layer-Binding Router using OpenFlow
Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-15
A prototype of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets to ... [more] IA2014-15
pp.7-12
AI 2013-11-29
13:00
Fukuoka   Remodeling support for multiagent simulation using program dependence graphs
Toshiki Nakashima (Nagoya Univ.), Hirofumi Yamaki (Tokyo Denki Univ.) AI2013-30
Researches based on multiagent simulation often suffer from the cost of implementing simulation models. It is proposed t... [more] AI2013-30
pp.65-70
IA, ICSS 2013-06-21
13:00
Niigata Ao-re Nagaoka Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet
Soshi Hirono (Nagoya Univ.), Kenji Ohira (NAIST), Yukiko Yamaguchi (Nagoya Univ.), Hirofumi Yamaki (Tokyo Denki Univ.), Hiroki Takakura (Nagoya Univ.) IA2013-12 ICSS2013-12
In dynamic malware analysis, we cannot obtain sufficient results of malware analysis without Internet connectivity. How... [more] IA2013-12 ICSS2013-12
pp.67-72
ICSS 2012-11-22
14:30
Hiroshima Miyajima Mori-no-Yado Proposal of a network design support system for risk mitigation against inside attacks
Hirokazu Hasegawa (Nagoya Univ.), Ray Atarashi (IIJ-II), Masahiko Kato (IIJ), Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura (Nagoya Univ.) ICSS2012-51
In sophisticated cyber attacks, even information protected by an isolated network is compromised. Although there are var... [more] ICSS2012-51
pp.37-42
IA 2012-10-19
16:30
Overseas Phuket Transparent Server Migration between Datacenters by Utilizing OpenFlow
Tatsuya Fukushima, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-50
For disaster mitigation, mechanisms that restore network service swiftly have drawn attention.
For the swiftness, host... [more]
IA2012-50
pp.95-100
ICSS, IA 2012-06-22
09:50
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University A High-Speed Classification Method based on Opcode of Malware
Yang Zong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-8 ICSS2012-8
Malicious software in form of Internet worms, computer viruses, and trojan horses poses a major threat to the security o... [more] IA2012-8 ICSS2012-8
pp.43-48
IA 2010-11-24
14:45
Yamanashi Seisen-Ryo Bidirectional Policy Matching using Homomorphic Encryption Systems
Fumihiro Mori, Hirofumi Yamaki (Nagoya Univ.) IA2010-52
Automated Trust Negotiation(ATN) is a mechanism to establish mutual trust between service providers and users in the Int... [more] IA2010-52
pp.7-12
AI 2010-06-25
16:30
Tokyo   An ontology for flexible search of parallel texts in the Language Grid
Ikuhiro Takeuchi, Masamitsu Ukai, Hirofumi Yamaki (Nagoya Univ.) AI2010-9
The service infrastructure provided by Language Grid enables us to use various language resources. We focus on parallel ... [more] AI2010-9
pp.49-54
AI 2009-02-27
18:05
Tokyo   Development of a metadata authoring environment for Language Grid
Ikuhiro Takeuchi, Hirofumi Yamaki, Masamitsu Ukai (Nagoya Univ) AI2008-61
The multiple-language infrastructure provided by Language Grid is designed for better use of language resources on the W... [more] AI2008-61
pp.97-102
AI 2009-02-27
18:30
Tokyo   A Directory Mechanism for System Integration in Language Grid
Takuya Furuta, Daisuke Yanagisawa, Masamitsu Ukai, Hirofumi Yamaki (Nagoya Univ.) AI2008-62
Precise matching of multiple-language resources and applications is one of the issues in the development for Language Gr... [more] AI2008-62
pp.103-108
 Results 1 - 18 of 18  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan