IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 180 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2017-11-21
10:55
Oita Beppu International Convention Center Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result
Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.) ICSS2017-45
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] ICSS2017-45
pp.41-45
ICSS 2017-11-21
11:20
Oita Beppu International Convention Center A Study on the structure and Its Classification
Naoya Nitta, Masakatu Morii (Kobe Univ.) ICSS2017-46
 [more] ICSS2017-46
pp.47-51
ICSS 2017-11-21
14:00
Oita Beppu International Convention Center ICSS2017-50  [more] ICSS2017-50
pp.71-76
IT 2017-09-08
15:50
Yamaguchi Centcore Yamaguchi Hotel Coded Caching for Hierarchical Networks with Different Number of Layers (II)
Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2017-49
Coded caching is a technique to reduce network loads.
Recent works have discussed single-layer caching systems, but ma... [more]
IT2017-49
pp.61-66
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
14:15
Tokyo   ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23  [more] ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23
pp.93-98
ICSS, IPSJ-SPT 2017-03-13
13:25
Nagasaki University of Nagasaki Modeling of Attack Activity for Integrated Analysis of Threat Information
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] ICSS2016-47
pp.7-12
ICSS, IPSJ-SPT 2017-03-14
11:45
Nagasaki University of Nagasaki Representation for Attack Activity to Associate Threat Information
Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] ICSS2016-64
pp.147-152
ICSS, IPSJ-SPT 2017-03-14
10:55
Nagasaki University of Nagasaki A Vulnerability Analysis of Android Applications from the View of Framework
Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)
 [more]
ICSS, IPSJ-SPT 2017-03-14
11:20
Nagasaki University of Nagasaki Ransomware Detection Focused on Encryption Processing
Shigeta Takanari, Morii Masakatu (Kobe Univ.), Hasegawa Tomohisa, Ikegami Masato, Ishikawa Teiichi (Canon IT Solutions) ICSS2016-67
 [more] ICSS2016-67
pp.165-169
ISEC, WBS, IT 2017-03-09
13:35
Tokyo TOKAI University On the Design of Locally Repairable Codes Based on Code Modification
Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2016-106 ISEC2016-96 WBS2016-82
Locally repairable codes (LRCs) are a class of codes designed for the local correction of erasures.
Locality and Availa... [more]
IT2016-106 ISEC2016-96 WBS2016-82
pp.49-53
ICSS 2016-11-25
16:10
Kanagawa Institute of Information Security Performance of link-mining techniques to detect malicious websites
Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] ICSS2016-44
pp.31-35
IT 2016-09-02
10:00
Saga New Heartpia On Error Correction Capability of Irregular LDPC Codes under the Bit-Flipping Decoding Algorithm
Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2016-35
The error-correction capability of LDPC codes for iterative decoding algorithms have been investigated. However, it is d... [more] IT2016-35
pp.7-12
IT 2016-07-28
15:50
Fukuoka Seminar House, Fukuoka Univ. [Invited Talk] Coding theory and its application to new implementation
Masakatu Morii (Kobe Univ.) IT2016-28
 [more] IT2016-28
p.43
ICSS, IA 2016-06-06
14:10
Saga Saga University Method to Locate Cryptographic Functions from Malware
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT)
 [more]
ICSS, IA 2016-06-06
16:05
Saga Saga University
Kenta Nomura (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-5 ICSS2016-5
(To be available after the conference date) [more] IA2016-5 ICSS2016-5
pp.25-30
ICSS, IA 2016-06-07
09:30
Saga Saga University
Daiki Ito (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-7 ICSS2016-7
 [more] IA2016-7 ICSS2016-7
pp.33-38
ICSS, IA 2016-06-07
13:25
Saga Saga University
Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services LLCPwC Cyber Services), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services LLCPwC Cyber Services), Masakatu Morii (Kobe Univ.) IA2016-12 ICSS2016-12
(To be available after the conference date) [more] IA2016-12 ICSS2016-12
pp.63-68
IT 2015-09-04
09:25
Ishikawa Hakusan Shobutei On the Decoding Problem of Algebraic Codes over Symbol-Pair Read Channels
Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2015-35
In this paper, we discuss a decoding problem of algebraic codes over symbol-pair read channels.
The channels output ove... [more]
IT2015-35
pp.7-12
IA, ICSS 2015-06-11
14:55
Fukuoka Kyushu Institute of Technology Univ. An Empirical Evaluation of Locating Cryptographic Functions on the Memory
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more]
IA2015-4 ICSS2015-4
pp.15-20
IA, ICSS 2015-06-11
15:45
Fukuoka Kyushu Institute of Technology Univ. The Analysis of the CREAM vulnerability against OpenSSL
Jun Hasegawa, Yuhei Watanabe, Masakatu Morii (Kobe Univ.) IA2015-6 ICSS2015-6
In this paper we discuss vulnerability of "CREAM", which was originally created by Daniel J. Bernstein in 2005 and named... [more] IA2015-6 ICSS2015-6
pp.27-32
 Results 41 - 60 of 180 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan