IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 35  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2021-03-01
09:10
Online Online On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures
Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] ICSS2020-34
pp.49-54
ICSS, IPSJ-SPT 2021-03-01
09:35
Online Online A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background
Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] ICSS2020-35
pp.55-60
ICSS 2016-11-25
13:00
Kanagawa Institute of Information Security [Invited Talk] Analyses of social needs and training programs of security human resources in Japan
Masashi Eto (NICT), Masaki Kamizono (PwC Cyber Services LLC) ICSS2016-38
In response to the serious shortage of cybersecurity human resources in the domestic industry, a number of training prog... [more] ICSS2016-38
p.1
ICSS, IPSJ-SPT 2016-03-04
11:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Suspicious Processes Detection Scheme using Process Frequency and Network State
Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-60
pp.77-82
ICSS 2015-11-27
13:00
Fukushima AIST, Fukushima Renewable Energy Institute [Invited Talk] International Standardization for Secure Software Update of ITS Communication Devices
Masashi Eto (NICT)
 [more]
ICSS 2015-11-27
14:40
Fukushima AIST, Fukushima Renewable Energy Institute A Suspicious Processes Detection Scheme using Process Frequency
Junji Nakazato, Yu Tsuda, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-45
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-45
pp.61-66
ICSS 2015-03-03
15:15
Okinawa Meio Univiersity A Pluggable and Programmable Flamework for Analyzing Security Logs
Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] ICSS2014-68
pp.31-36
ICSS 2015-03-04
10:50
Okinawa Meio Univiersity Prediction of Malware Activities based on Loopback Address from DNS
Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] ICSS2014-80
pp.103-108
ICSS 2015-03-04
11:40
Okinawa Meio Univiersity Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information
Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] ICSS2014-82
pp.115-120
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:40
Hokkaido San-Refure Hakodate Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell
Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46
 [more] ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46
pp.321-326
ICSS, IA 2014-06-06
10:30
Hyogo Takikawa Memorial Hall, Kobe University Malicious Web Site Detection Based on Redirection Control using Client Environment
Takahiro Kasama, Masashi Eto (NICT), Masaki Kamizono (NICT/SecureBrain), Daisuke Inoue (NICT) IA2014-5 ICSS2014-5
 [more] IA2014-5 ICSS2014-5
pp.21-26
ICSS, IA 2014-06-06
10:55
Hyogo Takikawa Memorial Hall, Kobe University Development of an Environment-independent Dynamic Analysis System for Document Malware
Masaki Kamizono (NICT/SecureBrain), Kazuki Iwamoto (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2014-6 ICSS2014-6
 [more] IA2014-6 ICSS2014-6
pp.27-32
ICSS, IPSJ-SPT 2014-03-28
09:25
Okinawa Meio Univiersity Spam Analysis based on Mail Relay Routing
Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] ICSS2013-75
pp.101-106
ICSS, IPSJ-SPT 2014-03-28
09:50
Okinawa Meio Univiersity Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform
Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] ICSS2013-76
pp.107-112
ICSS 2013-11-12
15:50
Fukuoka Nishijin Plaza Experimental Evaluation of A Botnet Detection Method based on Non-negative Matrix Factorization
Yuki Kawamura (Kyushu Univ.), Junpei Shimamura, Junji Nakazato (NICT), Katsunari Yoshioka (Yokohama National Univ.), Masashi Eto, Daisuke Inoue (NICT), Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2013-61
 [more] ICSS2013-61
pp.23-28
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
11:30
Hokkaido   Network Observation and Analysis Report on nicter -- Malware infection to embedded systems --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50
 [more] ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50
pp.381-385
IA, ICSS 2013-06-21
13:50
Niigata Ao-re Nagaoka Network Observation and Analysis Report on nicter -- Close Encounters of Network Incident Sign --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] IA2013-14 ICSS2013-14
pp.79-84
IA, ICSS 2013-06-21
14:15
Niigata Ao-re Nagaoka NONSTOP: Secure Remote Analysis Platform for Cybersecurity Information
Tatsuya Takehisa (NICT/Nissin), Daisuke Inoue, Masashi Eto (NICT), Katsunari Yoshioka (YNU), Takahiro Kasama, Junji Nakazato, Koji Nakao (NICT) IA2013-15 ICSS2013-15
Practical attack information such as attack traffic and malware samples is extremely important for researchers in the fi... [more] IA2013-15 ICSS2013-15
pp.85-90
ICSS 2012-11-22
13:40
Hiroshima Miyajima Mori-no-Yado Malicious Traffic Detection based on Multimodal Analysis
Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT) ICSS2012-49
 [more] ICSS2012-49
pp.25-30
ICSS, IA 2012-06-22
09:25
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University Network Observation and Analysis Report on nicter -- Transition and Categorization of DDoS Backscatter --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2012-7 ICSS2012-7
Since e-commerce progressed quickly, a DDoS attack became a social problem. A lot of rebounding packets called backscatt... [more] IA2012-7 ICSS2012-7
pp.37-42
 Results 1 - 20 of 35  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan