|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2014-03-28 09:50 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76 |
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] |
ICSS2013-76 pp.107-112 |
IA, ICSS |
2013-06-21 13:50 |
Niigata |
Ao-re Nagaoka |
Network Observation and Analysis Report on nicter
-- Close Encounters of Network Incident Sign -- Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14 |
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] |
IA2013-14 ICSS2013-14 pp.79-84 |
DE |
2012-12-13 13:00 |
Kyoto |
Campus Plaza Kyoto |
[Invited Talk]
State-of-the-art Cybersecurity Technologies and Challenges for Security Big Data Daisuke Inoue (NICT) DE2012-32 |
We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter) in order to fight ... [more] |
DE2012-32 p.105 |
NS, IN (Joint) |
2012-03-09 15:20 |
Miyazaki |
Miyazaki Seagia |
Expanding Darknet Space with Virtual Sensors Kazuhiro Tobe, Shigeki Goto (Waseda Univ.) IN2011-189 |
Only anomalous traffic can be monitored in a network consisting of assigned but unused IP addresses (darknet). Although ... [more] |
IN2011-189 pp.311-316 |
ICSS |
2009-11-13 16:20 |
Miyazaki |
University of Miyazaki |
The relation betwenn the arrangement of network sensors and the information obtained by the sensors Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more] |
|
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|