IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 42 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IA 2016-06-07
10:35
Saga Saga University An Experiment to Shut off DDoS Attacks on Testbed Simulating Autonomous Internet Security Infrastructure
Kishi Yuya, Eguchi Ken, Ishikawa Tsuyoshi, Suzuki Ryusei, Miyaguchi Yuki, Ohsawa Kazuo, Yogosawa Mamoru, Sano Kaoru, Yamaki Hiroshi, Ueno Yoichirou, Sasaki Ryoichi, Kobayashi Hiroshi (Tokyo Denki Univ) IA2016-9 ICSS2016-9
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. A shift in thinking is required fr... [more] IA2016-9 ICSS2016-9
pp.45-50
NS, IN
(Joint)
2016-03-04
11:00
Miyazaki Phoenix Seagaia Resort Cyber Attack Prediction using News Article Analysis
Baatarsuren Munkhdorj, Sekiya Yuji (UTokyo) IN2015-136
The common operation of current cyber defense systems is to search a signature of cyber attack by monitoring network tra... [more] IN2015-136
pp.165-170
IA 2016-01-29
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room Neutralization of malware-polluted IoT by limiting communications partners using MLB router
Yuto Yamamoto, Soushu Kawashita, Shingo Tanaka, Hiroshi Yamaki, Hiroshi kobayashi (Tokyo Denki Univ) IA2015-86
Security measures of IoT devices and social infrastructure have become urgent issues. A bidirectional white list to limi... [more] IA2015-86
pp.43-48
LOIS, ISEC, SITE 2015-11-06
16:20
Kanagawa Kanagawa Univ. A Feasibility Study of Autonomous Security Infrastructure in the Internet
Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] ISEC2015-46 SITE2015-33 LOIS2015-40
pp.67-74
IA, ICSS 2015-06-11
16:05
Fukuoka Kyushu Institute of Technology Univ. Traffic Data Analysis for Multiple Darknet and its Applications
Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] IA2015-7 ICSS2015-7
pp.33-38
IA, ICSS 2015-06-12
10:30
Fukuoka Kyushu Institute of Technology Univ. Experimental Results on an Attack Detection System for Advanced Persistent Threats
Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] IA2015-9 ICSS2015-9
pp.45-50
ICSS 2015-03-03
13:50
Okinawa Meio Univiersity Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router -- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow --
Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) ICSS2014-65
There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems, and ... [more] ICSS2014-65
pp.13-18
ICSS 2015-03-03
15:15
Okinawa Meio Univiersity A Pluggable and Programmable Flamework for Analyzing Security Logs
Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] ICSS2014-68
pp.31-36
ICSS 2015-03-03
15:40
Okinawa Meio Univiersity A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique
Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, c... [more]
ICSS2014-69
pp.37-42
ICSS 2015-03-04
11:15
Okinawa Meio Univiersity A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis
Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-81
The integrated malware detection service is a web service that analyzes suspicious files, domains and URLs which are pos... [more] ICSS2014-81
pp.109-114
ICSS 2015-03-04
12:05
Okinawa Meio Univiersity Finding Network Address Blocks Intensively Used for Cyber Attacks
Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-83
Recently, cyber attacks have diversified on Internet, so immediate actions are required for them. In this report, we poi... [more] ICSS2014-83
pp.121-126
IA 2014-10-07
16:55
Osaka Grand Front OSAKA Tower-B 10F Recent cyber attack methodology and protection -- The Consideration based on Interop Tokyo 2014 ShowNet Security --
Ken Hashimoto (FireEye), Takashi Tomine (NICT), Yuji Sekiya (Univ. of Tokyo) IA2014-33
In social activities and daily life, a share of activities from the Internet has been gotten higher. Due to that changes... [more] IA2014-33
pp.51-56
IA 2014-09-12
10:00
Tokyo Tokyo Tech Front A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attack
Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-14
An architecture of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets... [more] IA2014-14
pp.1-6
IA 2014-09-12
10:30
Tokyo Tokyo Tech Front An Implementation and Evaluation of Multi-Layer-Binding Router using OpenFlow
Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-15
A prototype of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets to ... [more] IA2014-15
pp.7-12
R 2014-05-23
14:20
Aichi   Optimal Monitoring Policy for a System with Cyber Attack
Mitsuhiro Imaizumi (Aichi Gakusen Univ.), Mitsutaka Kimura (Gifu City Women's Coll.) R2014-3
Recently, the case that malware enters into an organization's LAN through e-mail and so on, has become a serious problem... [more] R2014-3
pp.13-16
ICSS, IPSJ-SPT 2014-03-28
09:50
Okinawa Meio Univiersity Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform
Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] ICSS2013-76
pp.107-112
ICSS, IPSJ-SPT 2014-03-28
11:15
Okinawa Meio Univiersity Timeline-Based Event Log Viewer over Multi-Host Environment
Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more]
ICSS2013-79
pp.125-130
IA, ICSS 2013-06-21
14:15
Niigata Ao-re Nagaoka NONSTOP: Secure Remote Analysis Platform for Cybersecurity Information
Tatsuya Takehisa (NICT/Nissin), Daisuke Inoue, Masashi Eto (NICT), Katsunari Yoshioka (YNU), Takahiro Kasama, Junji Nakazato, Koji Nakao (NICT) IA2013-15 ICSS2013-15
Practical attack information such as attack traffic and malware samples is extremely important for researchers in the fi... [more] IA2013-15 ICSS2013-15
pp.85-90
ICSS 2013-03-25
15:30
Kanagawa Yokohama National University [Invited Talk] PRACTICE - Proactive Response Against Cyber-attacks Through International Collaborative Exchange
Katsunari Yoshioka (Yokohama National Univ.) ICSS2012-66
Proactive Response Against Cyber Attacks Through International Collaborative Exchange (PRACTICE) project aims at develop... [more] ICSS2012-66
p.55
SSS 2012-11-22
15:00
Tokyo   [Invited Talk] Change the way of thinking Countermeasure for cyber attack, considering "Virus shuld be inside"
Takeyasu Kishiro (HISYS)
(To be available after the conference date) [more]
 Results 21 - 40 of 42 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan