|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, IPSJ-EIP |
2011-05-19 10:25 |
Tokyo |
Tokyo Univ. of Science |
A study on Action research and Antivirus awareness that uses Boolean Analysis Nobuo Iiduka, Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.) SITE2011-2 |
A virus infection situation can be considered a kind of state of panic. Although such a situation is an area applicable ... [more] |
SITE2011-2 pp.5-10 |
ICSS |
2009-11-13 15:55 |
Miyazaki |
University of Miyazaki |
A Consideration of Feature Extraction for Attacks on Darknet Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60 |
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] |
ICSS2009-60 pp.37-42 |
IN |
2009-07-09 15:15 |
Hokkaido |
HOKKAIDO UNIVERSITY |
[Invited Talk]
Anomalous Traffic Observed in DNS Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato (NTT) IN2009-28 |
DNS is one onf the most critical infrastructure of the Internet, and used for most of Internet applications. On the othe... [more] |
IN2009-28 pp.19-24 |
IA, ICSS |
2009-06-18 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A study on detection of botnet based on probabilistic dependencies Shintaro Murakami, Hiroki Hamasaki, Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ/ISIT), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IA2009-1 ICSS2009-9 |
Damage by malware is becoming more serious. Especally, bots, which are a kind of malware, are a great problem these days... [more] |
IA2009-1 ICSS2009-9 pp.1-6 |
DC, CPSY |
2009-04-21 14:30 |
Tokyo |
Akihabara Satellite Campus, Tokyo Metropolitan Univ. |
[Invited Talk]
Evolution and threat of botnet Toshiaki Sudou (NTT Communications) CPSY2009-6 DC2009-6 |
The damage of a variety of security problems such as Information leakage ,DDoS, and spam from terminal that hooks up to ... [more] |
CPSY2009-6 DC2009-6 pp.31-35 |
WBS, IT, ISEC |
2009-03-10 17:05 |
Hokkaido |
Hakodate Mirai Univ. |
A study of incident detection based on correlation analysis between network traffic time series Junya Kitagawa, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies,), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-93 ISEC2008-151 WBS2008-106 |
Damage caused by malwares such as botnets is getting more
serious, as the Internet is spreading. To detect such
incide... [more] |
IT2008-93 ISEC2008-151 WBS2008-106 pp.321-328 |
IN |
2009-02-05 16:20 |
Kagawa |
Kagawa University |
[Invited Talk]
Outbound Intrusion Detection for Policy Watch Satoru Torii (Fujitsu Labs) IN2008-126 |
The present condition, such as illegal access, a virus, and a botnet, is introduced. The trend of the network monitoring... [more] |
IN2008-126 pp.25-26 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|