IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2014-03-28
09:50
Okinawa Meio Univiersity Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform
Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] ICSS2013-76
pp.107-112
IA, ICSS 2013-06-21
13:50
Niigata Ao-re Nagaoka Network Observation and Analysis Report on nicter -- Close Encounters of Network Incident Sign --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] IA2013-14 ICSS2013-14
pp.79-84
DE 2012-12-13
13:00
Kyoto Campus Plaza Kyoto [Invited Talk] State-of-the-art Cybersecurity Technologies and Challenges for Security Big Data
Daisuke Inoue (NICT) DE2012-32
We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter) in order to fight ... [more] DE2012-32
p.105
NS, IN
(Joint)
2012-03-09
15:20
Miyazaki Miyazaki Seagia Expanding Darknet Space with Virtual Sensors
Kazuhiro Tobe, Shigeki Goto (Waseda Univ.) IN2011-189
Only anomalous traffic can be monitored in a network consisting of assigned but unused IP addresses (darknet). Although ... [more] IN2011-189
pp.311-316
ICSS 2009-11-13
16:20
Miyazaki University of Miyazaki The relation betwenn the arrangement of network sensors and the information obtained by the sensors
Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more]
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan