IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 61  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, NS
(Joint)
2023-03-03
15:40
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Performance Evaluation of Segmented File Download Methods Using Parallel TCP/MPTCP Connections on Multiple Paths
Noriaki Hiraoka, Junichi Funasaka (Hiroshima City Univ.) NS2022-248
Since mobile terminals which can use multiple communication media are emerging, we can improve the performance of segmen... [more] NS2022-248
pp.464-469
NS 2022-04-15
11:35
Tokyo kikai shinkou kaikan + online
(Primary: On-site, Secondary: Online)
On Control Parameters of Segmented File Downloading Using PR-SCTP on WebRTC
Seiya Shimada, Junichi Funasaka (Hiroshima City Univ.) NS2022-3
Since everything connects to the Internet in the IoT era, the load concentration to the server is one of the most seriou... [more] NS2022-3
pp.13-18
IN, NS
(Joint)
2021-03-05
14:00
Online Online Evaluation on influence of packet loss features over segmented file download schemes using PR-SCTP
Masami Terahata, Junichi Funasaka (Hiroshima City Univ.) IN2020-92
TCP is often used for segmented file download when we use Internet applications through wireless networks, but there are... [more] IN2020-92
pp.226-231
IA, IN
(Joint)
2020-12-14
15:00
Online Online Comparative performance evaluation between QUIC and TCP on parallel connections over wireless LAN
Nobuo Aoki, Hiroyasu Obata, Junichi Funasaka (Hiroshima City Univ.) IN2020-33
In IEEE 802.11g wireless LAN, the performance of TCP parallel connections has been evaluated, and the condition that the... [more] IN2020-33
pp.1-6
SITE, IPSJ-EIP [detail] 2020-06-04
10:30
Online Online Right of Reproduction and its Limitations -- Amendment to the Copyright Act of Japan in 2020 and its Relevant Provisions --
Makoto Koike (MK Microwave) SITE2020-1
The Copyright Act of Japan provides for the right of reproduction, reproduction for private use and the exception of the... [more] SITE2020-1
pp.1-6
IN, RCS, NV
(Joint)
2020-05-22
13:00
Online Online [Invited Lecture] Evaluation on Total Throughput of Segmented File Download Processes on Multiple Nodes over IEEE 802.11g Wireless LAN
Junichi Funasaka, Hiroyasu Obata, Kenji Ishida (Hiroshima City Univ.) IN2020-7 RCS2020-20
We have evaluated the conditions in terms of the number of TCP connections to obtain the highest total throughput on an ... [more] IN2020-7 RCS2020-20
pp.31-36(IN), pp.55-60(RCS)
SITE, ISEC, LOIS 2018-11-04
11:30
Fukuoka   A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] ISEC2018-75 SITE2018-53 LOIS2018-35
pp.63-68
NS 2018-05-17
13:25
Kanagawa Yokohama City Education Center Implementation of requesting methods considering sequence control for progressive download using parallel TCP connections
Mitsuo Heijo, Junichi Funasaka (Hiroshima City Univ.) NS2018-20
When realizing progressive download which replays a video file with simultaneously fetching divided partial les through... [more] NS2018-20
pp.31-36
RCS, NS
(Joint)
2017-12-15
13:15
Hiroshima Aster Plaza Requesting Scheme for Arrival Order Control of Progressive Download Utilizing Multiple Connections on Each of Multiple Paths
Junichi Funasaka (Hiroshima City Univ.) NS2017-137
Since a lot of high performance mobile phones are emerging and most of
delivered packets from and into such devices bec... [more]
NS2017-137
pp.59-64
NS 2017-10-26
14:55
Osaka I-site nanba [Poster Presentation] A Study on Scheduling Method for Progressive Download Multi-view Video Transmission Considering Content Characteristics
Takahito Kito (Osaka Univ.), Takuya Fujihashi (Ehime Univ.), Yusuke Hirota, Takashi Watanabe (Osaka Univ.) NS2017-105
Multi-view video systems using progressive download are expected as a technology to provide interactive immersive experi... [more] NS2017-105
pp.73-77
CS 2017-07-27
09:39
Nagasaki Fukue Bunka Kaikan Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL
Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] CS2017-15
pp.13-18
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
13:25
Tokyo   A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download
Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
pp.81-86
NS, IN
(Joint)
2017-03-03
11:00
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL Analysis of Segmented File Download Methods using PR-SCTP in Saturated Flow Cases -- Relation between Back-off Duration and Control Parameters on Servers --
Kazuya Takeda, Junichi Funasaka, Kenji Ishida (Hirosima City Univ.) NS2016-193
On the network where packets are often lost due to data-link errors like wireless one, a segmented file download method ... [more] NS2016-193
pp.205-210
NS, IN
(Joint)
2017-03-03
13:20
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL A Progressive Download Method using Multiple TCP Flows to Obtain Maximum Goodput on Each of Multiple Paths
Tokumasa Hiraoka, Junichi Funasaka, Kenji Ishida (Hirosima City Univ.) NS2016-229
We have proposed a progressive download method using multiple concurrent TCP flows on each of multiple paths which consi... [more] NS2016-229
pp.411-416
NS, IN
(Joint)
2016-03-04
13:50
Miyazaki Phoenix Seagaia Resort Evaluation on Required Time and Arrival Order of Blocks for Segmented File Downloading Methods Using PR-SCTP
Kazuya Takeda, Funasaka Junichi (Hirosima City Univ.) NS2015-238
To yield better performance on highly lossy networks, a segmented file download method composed of both Time-to-Live(TTL... [more] NS2015-238
pp.405-410
IN 2015-10-16
13:30
Osaka Osaka University Performance Enhancement of Segmented File Download Method Using PR-SCTP with Suitable Control Parameters
Kazuya Takeda, Funasaka Junichi (Hirosima City Univ.) IN2015-59
To yield better performance on highly lossy networks, a segmented file download method composed of both Time-to-Live (TT... [more] IN2015-59
pp.35-40
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
ICSS 2015-03-03
16:40
Okinawa Meio Univiersity Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] ICSS2014-71
pp.49-54
ICSS 2014-11-28
10:45
Miyagi Tohoku Gakuin University (Tagajo Campus) A Study of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] ICSS2014-60
pp.55-60
ICSS 2014-11-28
11:10
Miyagi Tohoku Gakuin University (Tagajo Campus) searching malicious URL from vast webspace
Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more]
ICSS2014-61
pp.61-66
 Results 1 - 20 of 61  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan