IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, NWS
(Joint)
2021-01-22
13:30
Online Online [Encouragement Talk] A Study on Detection and Prevention of Stealthy DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] NS2020-116
pp.31-36
ICSS 2020-11-26
14:00
Online Online Malware detection for IoT devices using whitelist and Isolation Forest
Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake (KDDI Research) ICSS2020-20
As the number of IoT (Internet of Things) devices increases, the countermeasures against cyberattacks related to IoT dev... [more] ICSS2020-20
pp.7-12
NS 2020-04-16
13:50
Online Online A Proposal of FQDN-based Whitelist Filter on DNS Cache Server against DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (OPU) NS2020-2
A Distributed Denial of Service (DDoS) attack is a major social issue, and as one of the DDoS incidents, a Domain Name S... [more] NS2020-2
pp.7-12
SSS 2018-06-20
13:00
Tokyo   Application of Rationality diagnosis to Railway Signalling system -- Application to Closing Signal machine --
Yusuke Takano, Takashi Kawano (JRE) SSS2018-7
The railway signal system is a system to prevent train collision and derailment and to support safe and stable transport... [more] SSS2018-7
pp.1-4
ICM 2018-03-09
11:50
Okinawa   [Encouragement Talk] Evaluation of the improvement method on the regular expressions generator for the log monitoring
Shinichiro Goto, Toyonori Fujiura, Masafumi Higuchi (NTT) ICM2017-72
We proposed the efficient generating method of whitelists for log monitoring, and showed its effectiveness. However, in... [more] ICM2017-72
pp.97-101
ICSS, IPSJ-SPT 2018-03-07
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A study of security requirements and function implementation for home networks in a period of IoT expansion
Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT) ICSS2017-59
We discuss the security requirements in the home networks in a period of IoT expansion. Based on the security requiremen... [more] ICSS2017-59
pp.49-54
IA, SITE, IPSJ-IOT [detail] 2018-03-06
12:05
Tochigi Kinugawa Onsen Hotel Evaluation for application of white list based network switches to hospital network systems
Osamu Takaki (Gunma Univ.), Keigo Uchizumi, Ichiroh Suzuta (ALAXALA Networks Corp.), Kota Torikai, Yuichiro Saito (Gunma Univ.), Tetsuya Sato, Hiroki Endo (Carecom Corp.), Yoshifumi Atarashi (ALAXALA Networks Corp.) SITE2017-73 IA2017-84
It is useful to apply a network switch, which is called a white list switch or WLS, with monitoring and/or filtering fun... [more] SITE2017-73 IA2017-84
pp.193-198
SIP 2017-08-24
15:40
Tokyo Tokyo Denki University [Special Invited Talk] Cyber security in IoT Era
Hiroshi Yasuda (TDU)
This paper first describes research on image compression technology and related international standardization activity w... [more]
ICSS, IPSJ-SPT 2017-03-13
16:15
Nagasaki University of Nagasaki A Study on Parameter Adjustment of Whitelist Detection Rule
Takeshi Ueda (Mitsubishi Electric Corp.), Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ) ICSS2016-56
Recently, the whitelist detection rule has been used as security measures for various system such control systems.
Only... [more]
ICSS2016-56
pp.97-102
ICM, LOIS 2017-01-20
11:10
Nagasaki The Nagasaki Chamber of Commerce & Industry A Study on Improving the Operationality and the Performance of the Whitelist Generator
Shinichiro Goto, Hiroki Miura, Tetsuaki Kamata, Toyonori Fujiura, Masayoshi Nose (NTT) ICM2016-51 LOIS2016-60
We have proposed a log filtering method using whitelists with numeric character regular expression, and validated it thr... [more] ICM2016-51 LOIS2016-60
pp.69-74
ICM, IPSJ-IOT, IPSJ-CSEC 2016-05-27
13:40
Shimane   Feasibility study of an Automated Whitelist Generator for Log Monitoring
Hiroki Miura, Tetsuaki Kamata, Toyonori Fujiura, Yuzuru Mori (NTT) ICM2016-7
The log monitoring with the white list has a big problem that takes to create a white list.
So far, we proposed an Auto... [more]
ICM2016-7
pp.139-144
IA 2016-01-29
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room Neutralization of malware-polluted IoT by limiting communications partners using MLB router
Yuto Yamamoto, Soushu Kawashita, Shingo Tanaka, Hiroshi Yamaki, Hiroshi kobayashi (Tokyo Denki Univ) IA2015-86
Security measures of IoT devices and social infrastructure have become urgent issues. A bidirectional white list to limi... [more] IA2015-86
pp.43-48
CQ, ICM, NS
(Joint)
2015-11-27
09:00
Niigata Niigata University An Automated Whitelist Generator for Log Monitoring
Atsushi Sasaki, Toyonori Fujiura, Tetsuaki Kamata, Yuzuru Mori (NTT) ICM2015-22
We have traditionally monitored log messages in system managements mainly with a blacklist, whether the log messages coi... [more] ICM2015-22
pp.27-32
LOIS, ISEC, SITE 2015-11-07
11:20
Kanagawa Kanagawa Univ. A dynamic filtering method to reduce DDoS packets by using access tokens
Ryota Suzuki, Hikaru Morita (Kanagawa Univ.) ISEC2015-53 SITE2015-40 LOIS2015-47
The flow controls on packets in transmission channel are general measures against DDoS (Distributed Denial of Service) a... [more] ISEC2015-53 SITE2015-40 LOIS2015-47
pp.111-116
IN 2011-01-21
14:55
Osaka Osaka Univ. Face Routing Protocol based on Incomplete Location Information of Neighbor Nodes
Tomokazu Ezaki, Hiroaki Higaki (Tokyo Denki Univ.) IN2010-137
In Face ad-hoc routing protocols, a wireless multihop transmission route from a source node to a destination one is dete... [more] IN2010-137
pp.109-114
IN 2007-06-22
14:35
Hokkaido Future University-Hakodate Identifying Worm-Infected Hosts Using White List
Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino (NTT) IN2007-24
In the Internet, a rapid spread of worm is a serious problem. In many cases, worm-infected hosts generate huge amount of... [more] IN2007-24
pp.79-84
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan