Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS (Joint) |
2023-03-03 15:40 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Performance Evaluation of Segmented File Download Methods Using Parallel TCP/MPTCP Connections on Multiple Paths Noriaki Hiraoka, Junichi Funasaka (Hiroshima City Univ.) NS2022-248 |
Since mobile terminals which can use multiple communication media are emerging, we can improve the performance of segmen... [more] |
NS2022-248 pp.464-469 |
NS |
2022-04-15 11:35 |
Tokyo |
kikai shinkou kaikan + online (Primary: On-site, Secondary: Online) |
On Control Parameters of Segmented File Downloading Using PR-SCTP on WebRTC Seiya Shimada, Junichi Funasaka (Hiroshima City Univ.) NS2022-3 |
Since everything connects to the Internet in the IoT era, the load concentration to the server is one of the most seriou... [more] |
NS2022-3 pp.13-18 |
IN, NS (Joint) |
2021-03-05 14:00 |
Online |
Online |
Evaluation on influence of packet loss features over segmented file download schemes using PR-SCTP Masami Terahata, Junichi Funasaka (Hiroshima City Univ.) IN2020-92 |
TCP is often used for segmented file download when we use Internet applications through wireless networks, but there are... [more] |
IN2020-92 pp.226-231 |
IA, IN (Joint) |
2020-12-14 15:00 |
Online |
Online |
Comparative performance evaluation between QUIC and TCP on parallel connections over wireless LAN Nobuo Aoki, Hiroyasu Obata, Junichi Funasaka (Hiroshima City Univ.) IN2020-33 |
In IEEE 802.11g wireless LAN, the performance of TCP parallel connections has been evaluated, and the condition that the... [more] |
IN2020-33 pp.1-6 |
SITE, IPSJ-EIP [detail] |
2020-06-04 10:30 |
Online |
Online |
Right of Reproduction and its Limitations
-- Amendment to the Copyright Act of Japan in 2020 and its Relevant Provisions -- Makoto Koike (MK Microwave) SITE2020-1 |
The Copyright Act of Japan provides for the right of reproduction, reproduction for private use and the exception of the... [more] |
SITE2020-1 pp.1-6 |
IN, RCS, NV (Joint) |
2020-05-22 13:00 |
Online |
Online |
[Invited Lecture]
Evaluation on Total Throughput of Segmented File Download Processes on Multiple Nodes over IEEE 802.11g Wireless LAN Junichi Funasaka, Hiroyasu Obata, Kenji Ishida (Hiroshima City Univ.) IN2020-7 RCS2020-20 |
We have evaluated the conditions in terms of the number of TCP connections to obtain the highest total throughput on an ... [more] |
IN2020-7 RCS2020-20 pp.31-36(IN), pp.55-60(RCS) |
SITE, ISEC, LOIS |
2018-11-04 11:30 |
Fukuoka |
|
A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35 |
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] |
ISEC2018-75 SITE2018-53 LOIS2018-35 pp.63-68 |
NS |
2018-05-17 13:25 |
Kanagawa |
Yokohama City Education Center |
Implementation of requesting methods considering sequence control for progressive download using parallel TCP connections Mitsuo Heijo, Junichi Funasaka (Hiroshima City Univ.) NS2018-20 |
When realizing progressive download which replays a video file with simultaneously fetching divided partial les through... [more] |
NS2018-20 pp.31-36 |
RCS, NS (Joint) |
2017-12-15 13:15 |
Hiroshima |
Aster Plaza |
Requesting Scheme for Arrival Order Control of Progressive Download Utilizing Multiple Connections on Each of Multiple Paths Junichi Funasaka (Hiroshima City Univ.) NS2017-137 |
Since a lot of high performance mobile phones are emerging and most of
delivered packets from and into such devices bec... [more] |
NS2017-137 pp.59-64 |
NS |
2017-10-26 14:55 |
Osaka |
I-site nanba |
[Poster Presentation]
A Study on Scheduling Method for Progressive Download Multi-view Video Transmission Considering Content Characteristics Takahito Kito (Osaka Univ.), Takuya Fujihashi (Ehime Univ.), Yusuke Hirota, Takashi Watanabe (Osaka Univ.) NS2017-105 |
Multi-view video systems using progressive download are expected as a technology to provide interactive immersive experi... [more] |
NS2017-105 pp.73-77 |
CS |
2017-07-27 09:39 |
Nagasaki |
Fukue Bunka Kaikan |
Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15 |
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] |
CS2017-15 pp.13-18 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 13:25 |
Tokyo |
|
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 |
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] |
ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 pp.81-86 |
NS, IN (Joint) |
2017-03-03 11:00 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Analysis of Segmented File Download Methods using PR-SCTP in Saturated Flow Cases
-- Relation between Back-off Duration and Control Parameters on Servers -- Kazuya Takeda, Junichi Funasaka, Kenji Ishida (Hirosima City Univ.) NS2016-193 |
On the network where packets are often lost due to data-link errors like wireless one, a segmented file download method ... [more] |
NS2016-193 pp.205-210 |
NS, IN (Joint) |
2017-03-03 13:20 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
A Progressive Download Method using Multiple TCP Flows to Obtain Maximum Goodput on Each of Multiple Paths Tokumasa Hiraoka, Junichi Funasaka, Kenji Ishida (Hirosima City Univ.) NS2016-229 |
We have proposed a progressive download method using multiple concurrent TCP flows on each of multiple paths which consi... [more] |
NS2016-229 pp.411-416 |
NS, IN (Joint) |
2016-03-04 13:50 |
Miyazaki |
Phoenix Seagaia Resort |
Evaluation on Required Time and Arrival Order of Blocks for Segmented File Downloading Methods Using PR-SCTP Kazuya Takeda, Funasaka Junichi (Hirosima City Univ.) NS2015-238 |
To yield better performance on highly lossy networks, a segmented file download method composed of both Time-to-Live(TTL... [more] |
NS2015-238 pp.405-410 |
IN |
2015-10-16 13:30 |
Osaka |
Osaka University |
Performance Enhancement of Segmented File Download Method Using PR-SCTP with Suitable Control Parameters Kazuya Takeda, Funasaka Junichi (Hirosima City Univ.) IN2015-59 |
To yield better performance on highly lossy networks, a segmented file download method composed of both Time-to-Live (TT... [more] |
IN2015-59 pp.35-40 |
IA, ICSS |
2015-06-12 10:50 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10 |
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] |
IA2015-10 ICSS2015-10 pp.51-56 |
ICSS |
2015-03-03 16:40 |
Okinawa |
Meio Univiersity |
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] |
ICSS2014-71 pp.49-54 |
ICSS |
2014-11-28 10:45 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
A Study of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] |
ICSS2014-60 pp.55-60 |
ICSS |
2014-11-28 11:10 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
searching malicious URL from vast webspace Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61 |
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more] |
ICSS2014-61 pp.61-66 |