IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 21  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2021-03-01
11:30
Online Online Method of Similarity Evaluation among Incidents for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] ICSS2020-31
pp.31-36
ICSS, IPSJ-SPT 2021-03-01
11:55
Online Online Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] ICSS2020-32
pp.37-42
ICSS 2020-11-26
15:00
Online Online Initial Study of Incident Response Support System for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] ICSS2020-22
pp.17-20
ICSS, IPSJ-SPT 2020-03-03
09:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] ICSS2019-84
pp.97-102
ICSS 2019-11-13
15:45
Miyazaki MRT Terrace(Miyazaki) Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment
Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] ICSS2019-65
pp.31-36
ICSS, IPSJ-SPT 2017-03-13
16:40
Nagasaki University of Nagasaki Primary Discussion about a Honeypot System for IoT Aimed Protocols
Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] ICSS2016-57
pp.103-108
IA, SITE, IPSJ-IOT [detail] 2016-03-04
11:10
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) Network Type Dynamic Analysis System for Prevention of Malware Infection Expansion
Satoshi Fuchigami, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) SITE2015-73 IA2015-105
In recent years, it has been a social issue that cyber-attacks are increasing for the purpose of money or secret informa... [more] SITE2015-73 IA2015-105
pp.221-226
IN, IA
(Joint)
2015-12-17
17:10
Hiroshima Hiroshima City University Dynamic construction of to-many communication topology by using OpenFlow
Shun Yanase, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) IA2015-76
To-many communication such as streaming and multi-point video conferencing basically uses tree structure of content dist... [more] IA2015-76
pp.43-48
ICSS 2015-11-26
14:10
Fukushima AIST, Fukushima Renewable Energy Institute A Traffic Analysis to Identify Unintended Impact on Business Caused by an Incident Response
Minori Shiota, Yukiko Yamaguchi, Hajime Shiimada (Nagoya Univ), Hiroki Takakura (NII) ICSS2015-36
To confront recent sophisticated targeted attacks, we have to prevent the theft of information and the destruction of th... [more] ICSS2015-36
pp.7-12
ICSS 2015-03-04
15:55
Okinawa Meio Univiersity Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary
Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] ICSS2014-96
pp.199-204
IA 2014-11-06
15:30
Overseas Thailand Network Access Control by FPGA-Based Network Switch using HW/SW Cooperated IDS
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2014-52
In recent years, cyber targeted attacks are becoming so sophisticated so that countermeasures for them is becoming impor... [more] IA2014-52
pp.91-96
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:05
Hokkaido San-Refure Hakodate Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16
pp.75-80
ICSS, IA 2014-06-06
13:50
Hyogo Takikawa Memorial Hall, Kobe University Implementation of the Administration Policy Description Method on Automatic Network Organization System
Minori Shiota, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2014-10 ICSS2014-10
To confront recent sophisticated targeted attacks, we have to consider a information system to prevent the destruction ... [more] IA2014-10 ICSS2014-10
pp.49-54
ICSS, IPSJ-SPT 2014-03-28
13:55
Okinawa Meio Univiersity Proposal of malware classification method based on pattern similarity of traffic
Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2013-83
 [more] ICSS2013-83
pp.149-154
IA 2013-10-10
14:00
Overseas Konkuk Univ., Seoul Proposal of a Network Control System to Detect, Analyze and Mitigate Targeted Cyber Attacks
Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2013-26
Recently, targeted cyber attacks have been so sophisticated that we cannot detect them at early stage of intrusion.
The... [more]
IA2013-26
pp.1-6
IA, ICSS 2013-06-21
13:00
Niigata Ao-re Nagaoka Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet
Soshi Hirono (Nagoya Univ.), Kenji Ohira (NAIST), Yukiko Yamaguchi (Nagoya Univ.), Hirofumi Yamaki (Tokyo Denki Univ.), Hiroki Takakura (Nagoya Univ.) IA2013-12 ICSS2013-12
In dynamic malware analysis, we cannot obtain sufficient results of malware analysis without Internet connectivity. How... [more] IA2013-12 ICSS2013-12
pp.67-72
ICSS 2012-11-22
14:30
Hiroshima Miyajima Mori-no-Yado Proposal of a network design support system for risk mitigation against inside attacks
Hirokazu Hasegawa (Nagoya Univ.), Ray Atarashi (IIJ-II), Masahiko Kato (IIJ), Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura (Nagoya Univ.) ICSS2012-51
In sophisticated cyber attacks, even information protected by an isolated network is compromised. Although there are var... [more] ICSS2012-51
pp.37-42
IA 2012-10-19
16:30
Overseas Phuket Transparent Server Migration between Datacenters by Utilizing OpenFlow
Tatsuya Fukushima, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-50
For disaster mitigation, mechanisms that restore network service swiftly have drawn attention.
For the swiftness, host... [more]
IA2012-50
pp.95-100
ICSS, IA 2012-06-22
09:50
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University A High-Speed Classification Method based on Opcode of Malware
Yang Zong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-8 ICSS2012-8
Malicious software in form of Internet worms, computer viruses, and trojan horses poses a major threat to the security o... [more] IA2012-8 ICSS2012-8
pp.43-48
IA 2011-11-29
09:25
Hokkaido Greenpia Onuma (Hakodate) Development of Authentication Infrastructure for Tokai Academic Cloud Using Shibboleth and CAS
Shoji Kajita (Kyoto Univ.), Shoichi Saito (Nagoya Inst. of Tech.), Masatoshi Tsuchiya (Toyohashi Univ. of Tech.), Daisuke Yamamoto (Nagoya Inst. of Tech.), Tsunehiko Suzuki (Chukyo Univ.), Yukiko Yamaguchi (Nagoya Univ.), Takahiro Hasegawa (Shizuoka Univ.), Akiumi Hasegawa (Chukyo Univ.), Akiji Tanaka, Yuichi Uchida (Gifu Univ.), Ichiro Mitsuhashi, Yoshimasa Ohta (Mie Univ.), Hiroki Takakura (Nagoya Univ.), Hiroshi Matsuo (Nagoya Inst. of Tech.) IA2011-44
This paper describes the current status of Authentication Infrastructure for Tokai Academic Cloud. Currently we have bee... [more] IA2011-44
pp.49-53
 Results 1 - 20 of 21  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan