Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2018-03-06 11:15 |
Tochigi |
Kinugawa Onsen Hotel |
Study on Effect Testing of Persuasive Message Stimulating Computer Virus Measures based on Collective Protection Motivation Theory Kana Shimbo, Komagome Tasuku, Takahashi Momomi, Harada Akane, Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.) SITE2017-74 IA2017-85 |
Numerous Internet users not recovering their infected PCs are reported. In order to have them recover their PCs, the pro... [more] |
SITE2017-74 IA2017-85 pp.205-208 |
RCS, RCC, ASN, NS, SR (Joint) |
2016-07-21 13:20 |
Aichi |
|
[Encouragement Talk]
The Effect of Network Topology on the Spread of Self-Evolving Botnets Takanori Kudo (Setsunan Univ.), Tomotaka Kimura (Tokyo Univ. of Science), Yoshiaki Inoue (Osaka Univ.), Hirohisa Aman (Ehime Univ.), Kouji Hirata (Kansai Univ.) NS2016-63 |
As the previous work, we have proposed an epidemic model of new botnets
named self-evolving botnets that autonomously ... [more] |
NS2016-63 pp.69-74 |
ISEC |
2007-12-19 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Classification and feature extraction by using computer virus static analysis Kazuki Iwamoto (JCSR), Katsumi Wasaki (Shinshu Univ.) ISEC2007-127 |
About the variant judgment of the computer virus, we consider the method of classification and feature extraction based ... [more] |
ISEC2007-127 pp.107-113 |
SAT |
2007-04-20 16:00 |
Mie |
Mie University |
[Special Talk]
Network Security between "an-zen" and "an-shin" Masakatu Morii (Kobe Univ.) SAT2007-7 |
The author has been working in the field of Network Security and Cryptography. Recently it is in malware, computer virus... [more] |
SAT2007-7 pp.37-42 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:20 |
Okayama |
Okayama Univ. |
Proposal and Evaluation on Epidemiological Approach to Computer Virus Ryoichi Sasaki (Dendai) |
Because computer virus has evolved every moment, the range which encounters computer virus is expanded or damage has tur... [more] |
ISEC2006-48 pp.61-67 |
IN, ICM, LOIS (Joint) |
2006-01-20 09:50 |
Kyoto |
Kyoto Univ. |
A method for describing the data of computer virus and its behavior Hideo Ichimiya, Atsuko Imose, Ryoichi Isawa, Sachihiro Ichikawa (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masami Mohri (The Univ. of Tokushima), Masakatu Morii (Kobe Univ.) |
Each analysis result about computer virus output by various virus analysis systems, e.g. behavior analysis system and si... [more] |
OIS2005-81 pp.11-16 |
RECONF |
2005-12-01 11:25 |
Fukuoka |
Kitakyushu International Conference Center |
Proposal of a virus check system using FPGA Kei Shimane (Toho Univ.), Yosuke Iijima (Univ. Of Tsukuba), Eiichi Takahashi (AIST), Tatsumi Furuya (Toho Univ.), Tetsuya Higuchi (AIST) |
As regular broadband connections to the Internet are now common in homes, private users need to take measures against va... [more] |
RECONF2005-63 pp.25-30 |
LOIS |
2005-05-13 09:30 |
Kagawa |
Sunport Hall Takamatsu |
On constructing the virtual virus simulation system to analyze spreading and infection on wide network Ryoichi Isawa, Masami Mohri (The Univ. of Tokushima), Naoto Sone (Naruto Univ. of Edu.), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.) |
This paper presents a simulator to analyze behavior of virus, such as spreading and infection, on wide network. Network ... [more] |
OIS2005-8 pp.7-11 |
LOIS |
2005-05-13 10:00 |
Kagawa |
Sunport Hall Takamatsu |
Definition and its description method of virtual virus for P2P type simulation system Atsuko Imose (The Univ. of Tokushima), Naoto Sone (Naruto Univ, of Edu.), Ryoichi Isawa, Masami Mohri (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.) |
It is important to know the behavior of computer virus on network from the point of view of Anti-Virus in order to keep ... [more] |
OIS2005-9 pp.13-18 |
IN |
2005-02-17 14:15 |
Aichi |
Aichi University of Technology |
An Analysis of Computer Viruses Diffusion in Corporate Intranets Daisuke Uete, Takashi Okuda, Tetsuo Ideguchi (Aichi Prefectural Univ) |
In these years, information systems are widely used in modern society from education to business fields. So, computer vi... [more] |
IN2004-177 pp.19-24 |
ISEC, LOIS |
2004-11-09 13:25 |
Osaka |
Osaka Univ. |
Virtual Transmission Monitoring System for Behavior Analysis of Virus Toshihiko Hirooka (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima), Yuji Hoshizawa (Secure Brain), Koji Nakao (KDDI) |
The resarch of virus such as detection of virus, or behavior analysis of virus is active. It is difficult to know the be... [more] |
ISEC2004-92 OIS2004-59 pp.51-56 |