|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 14:20 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
A proposal of detection system for malicious DoH communication generated by DGA-based malware Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) SITE2021-59 IA2021-72 |
(To be available after the conference date) [more] |
SITE2021-59 IA2021-72 pp.79-82 |
IN, IA (Joint) |
2021-12-17 14:55 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Recognition of Malicious DNS Tunnel Tools by DoH Traffic Analysis Using Multi-stage Machine Learning Technology Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) IA2021-48 |
(To be available after the conference date) [more] |
IA2021-48 pp.85-92 |
DC |
2008-10-20 15:00 |
Tokyo |
National Center of Sciences |
A Power Optimization Method for Quorum Systems Munetoshi Ishikawa, Koji Hasebe (Tsukuba Univ.), Akiyoshi Sugiki (JST), Takahiro Shinagawa (Tsukuba Univ.), Kazuhiko Kato (Tsukuba Univ., JST) DC2008-25 |
In this paper, we present a power optimization algorithm for quorum systems, more specifically for a general class of qu... [more] |
DC2008-25 pp.17-22 |
ISEC |
2008-05-16 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A method to reduce false positive of Anomaly Detection System Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri (NTT DoCoMo), Satoshi Kawasaki (Univ. of Tsukuba), Hirotake Abe (Toyohashi Univ. of Technology), Takahiro Shinagawa, Kazuhiko Kato (Univ. of Tsukuba) ISEC2008-8 |
We proposed a new anomaly detection system. In this system, software behavior that deviates from a model representing no... [more] |
ISEC2008-8 pp.49-56 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 17:00 |
Okayama |
Okayama Univ. |
Preventing Buffer Overflow Attacks bypassing NXbit Protection Takahiro Shinagawa (TUAT) |
This paper presents a protection scheme to prevent buffer overflow attacks that bypass the NXbit protection and execute ... [more] |
ISEC2006-38 SITE2006-35 pp.215-222 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|