IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 38 of 38 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, NS, CS
(Joint)
2006-09-15
15:40
Miyagi   Detecting Pulsing Denial-of-Service Attacks by Using Bandwidth Usage Condition
Kenjiro Arai, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-34
Pulsing Denial-of-Service (PDoS) attacks seriously degrade the throughput of TCP flow and consequently pose a grave conc... [more] CS2006-34
pp.73-78
IN, NS, CS
(Joint)
2006-09-15
16:00
Miyagi   Increasing Efficiency of DoS-Attack Traceback over Mobile Networks
Taishi Tochiori, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-35
Denial of Service(DoS) attacks pose a serious threat to the Internet. Mobile networks, which are expected to develop rap... [more] CS2006-35
pp.79-84
IN, NS, CS
(Joint)
2006-09-15
17:10
Miyagi   A TCP-based Congestion Avoidance Algorithm with Priority Control
Hiroki Nishiyama, Tarik Taleb, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) NS2006-98
Along with rapid growth of broadband access networks, it has become possible to transfer a large files such as music, hi... [more] NS2006-98
pp.157-162
IN, NS, CS
(Joint)
2006-09-15
10:30
Miyagi   A Distributed Feedback Mechanism for an Efficient Distribution of Traffic in Hierarchical Mobile IPv6 Networks
Yuji Ikeda, Tarik Taleb, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) NS2006-85
In next-generation mobile communication systems, quality of service (QoS) provisioning is vital. Hierarchical Mobile IPv... [more] NS2006-85
pp.83-88
IN, NS, CS
(Joint)
2006-09-15
10:50
Miyagi   Streaming Rate Control Mechanism Considering Handoff Operation in RTP/RTCP Communication
Kenichi Kashibuchi, Tarik Taleb, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) NS2006-86
Multimedia streaming services are becoming popular mainly in wired network. The wide bandwidth of next-generation mobile... [more] NS2006-86
pp.89-94
CQ 2006-07-13
13:00
Hokkaido Future University-Hakodate A Study on Automatic Classification of Worm Flows Based on Common Pieces of Flow Payloads
Hiroshi Tsunoda, Yuji Waizumi, Zheng Sekibe, Yoshiaki Nemoto (Tohoku Univ.) CQ2006-20
Security management is a core issue in the current Internet, and
illegal accesses is a serious problem in security mana... [more]
CQ2006-20
pp.17-22
NS 2006-05-18
17:00
Kyoto Kyoto University Clock Tower Centenial Hall A State Evaluation Method of Network Traffic using Histograms of Correlation Coefficients
Yuji Waizumi (Tohoku Univ.), Junichi Hirose (Honda Motor), Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) NS2006-29
We propose a network traffic modeling method using a histogram of the probabilities of of occurr
ence of correlation co... [more]
NS2006-29
pp.33-36
ICM, NS, CQ
(Joint)
2005-11-17
14:00
Shimane Kunibiki-messe (Matsue city) Traffic Pattern Filtering Based on Lower Bounds of Traffic Volume for Improving DDoS Traceback Accuracy
Hironori Utsumi, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.)
For Traffic pattern based traceback techniques, non-DoS traffic included in DoS traffic becomes a source of noise which ... [more] NS2005-110
pp.1-4
ICM, NS, CQ
(Joint)
2005-11-17
14:25
Shimane Kunibiki-messe (Matsue city) A network state evaluation method based on correlation between types of packets
Junichi Hirose, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.)
 [more] NS2005-111
pp.5-8
ICM, NS, CQ
(Joint)
2005-11-17
14:50
Shimane Kunibiki-messe (Matsue city) Detecting Worms based on Similarity of Flow Payloads
Masashi Tsuji, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.)
Owing to the excessive amount of damage they are causing, epidemic worms have become a social problem. Recent researches... [more] NS2005-112
pp.9-12
SAT 2005-10-14
14:05
Aichi Rubura Ohzan A Traffic Congestion Avoidance Scheme for LEO Satellite Networks by Using Traffic Detour Technique
Daisuke Mashimo, Tarik Taleb (Tohoku Univ.), Abbas Jamalipour (Univ.Sydney), Nei Kato, Yoshiaki Nemoto (Tohoku Univ.)
 [more] SAT2005-36
pp.125-130
CS, IN, NS
(Joint)
2005-09-15
10:15
Miyagi Tohoku Univ. A Detection Technique of Epidemic Worms using Clustering of Packet Payload
Yuji Waizumi, Masashi Tsuji, Yoshiaki Nemoto (Tohoku Univ.)
Global damages of information systems by epidemic worms
have been reported because the spreading speed of worms has be... [more]
CS2005-19
pp.19-24
CS, IN, NS
(Joint)
2005-09-16
10:15
Miyagi Tohoku Univ. A Network Anomaly Detection based on Multi-Stage Traffic Analysis
Masashi Tsuji, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.)
The explosive growth of the Internet has increasingly given rise to better sophisticated and larger number of intrusions... [more] IN2005-72
pp.67-72
CS, IN, NS
(Joint)
2005-09-16
10:15
Miyagi Tohoku Univ. Proposal and evaluation of a routing protocol for VANET using mobile velocity vector
Mitsuru Ochi, Tarik Taleb (Tohoku Univ.), Abbas Jamalipour (Univ. of Sydney), Nei Kato, Yoshiaki Nemoto (Tohoku Univ.)
 [more] CS2005-30
pp.79-84
NS
Toyama Toyama Prefectural University Improving Accuracy of Network-based Anomaly Detection Using Multiple Detection Modules
Yohei Sato, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.)
 [more] NS2004-144
pp.45-48
NS, CS, IN 2004-09-03
09:00
Miyagi Tohoku University Proposal of tracing DoS attack roots by analysing traffic patterns using Independent Component Analysis
Tohru Satoh, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.)
In recent years, DoS(Denial of Service) attack and more powerful DDoS(Distributed DoS) attack pose security problems on... [more] NS2004-101 IN2004-60 CS2004-56
pp.1-6
NS, CS, IN 2004-09-03
09:25
Miyagi Tohoku University Detecting DRDoS Attacks with Bidirectional Packet Confirmation
Atsunori Yamamoto (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Hiroshi Tsunoda, Nei Kato, Yoshiaki Nemoto (Tohoku Univ.)
In DRDoS attacks, which are threat in today's Internet, the attacker attacks the target host with response packets from ... [more] NS2004-102 IN2004-61 CS2004-57
pp.7-12
ISEC, IPSJ-CSEC 2004-07-20
17:05
Tokushima Tokushima Univ. A consideration from the peculiarity of a handwriting about the anonymity of a handwriting
Norihisa Segawa (Iwate Prefectural University), Yuko Murayama (IPU), Masatoshi Miyazaki (Digitally Advanced Integrated Solutions Labs), Yoshiaki Nemoto (Tohoku University)
 [more] ISEC2004-40
pp.187-194
 Results 21 - 38 of 38 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan