|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2017-11-16 14:50 |
Overseas |
KMITL, Bangkok, Thailand |
Log analysis for hijacked user account's login detection method based on an autonomous system number of access source Akira Sato, Shuji Sannomiya, Yoshihiro Oyama, Hisashi Nakai, Kenichi Yoshida, Keisuke Kameyama (Univ. of Tsukuba) IA2017-50 |
User accounts may be hijacked carelessly, and system administrators
should detect such hijacked user accounts as soon a... [more] |
IA2017-50 pp.95-98 |
CPSY |
2008-10-31 10:30 |
Hiroshima |
Hiroshima City Univ. |
HyperShield: A Virtual Machine Monitor for Migrating Running OS to a Secure Virtual Machine Tsutomu Nomoto, Yoshihiro Oyama (UEC) CPSY2008-30 |
We propose a virtual machine monitor (VMM) HyperShield, which prevents buffer overflow attacks on kernel buffers.
While... [more] |
CPSY2008-30 pp.7-12 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|