IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, ICTSSL, IEE-SMF 2023-10-19
09:00
Fukuoka Fukuoka University Effects and Investigate Attack Messages on the IoT-ZTN System
Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] IN2023-32
pp.1-4
IA 2023-09-21
16:30
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Performance Evaluation of Access Control Functions in IoT-ZTN System Gateway
Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IA2023-17
With the increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks ... [more] IA2023-17
pp.38-42
R 2018-05-25
14:25
Aichi Aichi Institute of Technology, Motoyama Campus Reliability consideration of a system with multiple-stage check policy
Mitsuhiro Imaizumi (Aichi Gakusen Univ.), Mitsutaka Kimura (Gifu City Women's col.) R2018-2
This paper formulates a stochastic model for a system with illegal access. The server has the function of IDS, and illeg... [more] R2018-2
pp.7-12
ICSS 2015-11-26
15:25
Fukushima AIST, Fukushima Renewable Energy Institute Study on Rogue Access Point detection method
Takaaki Hoyo, Atsushi Kanai (Hosei Univ.) ICSS2015-39
Wireless LAN access points are installed everywhere, it has become possible to connect to the Internet. While such acces... [more] ICSS2015-39
pp.25-30
IA, IN
(Joint)
2014-12-18
12:50
Hiroshima Hiroshima City University Detecting rogue access points by traffic analysis on both wireless and wired LAN
Takehiro Kawata, Takeshi Yada (NTT) IN2014-91
We propose a novel method for detecting rogue access points(APs) of IEEE 802.11 wireless LAN connected to managed networ... [more] IN2014-91
pp.1-4
ICSS, IA 2014-06-05
13:35
Hyogo Takikawa Memorial Hall, Kobe University [Invited Talk] A two-path authentication for protecting net banking against illegal access -- How to prevent Man-In-The-Middle/Browser Attack --
Haruhiko Fujii (NTT) IA2014-1 ICSS2014-1
(To be available after the conference date) [more] IA2014-1 ICSS2014-1
pp.1-5
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
13:25
Shizuoka Shizuoka University On Usage of Practical Web Application Source Code for Learning Support on Secure Coding
Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ) ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21
Security holes (vulnerabilities) in web applications causes security
incidents like personal information leakage and vi... [more]
ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21
pp.123-129
IN 2010-02-04
13:00
Okinawa   Development of Invasion Prevention System with NIDS and Honeypot
Tetsuya Higa, Tomokazu Nagata, Yuji Taniguchi, Shiro Tamaki (Univ. of Ryukyu) IN2009-126
In recent years, the Internet becomes necessary to social and business infrastructure. Moreover, the Internet in spread,... [more] IN2009-126
pp.1-4
CPM 2009-08-11
13:55
Aomori Hirosaki Univ. FPGA implementation of a Wave-Pipelined Firewall Unit
Keisuke Saito, Kei Ito, Shuya Imaruoka, Tomoaki Sato, Masa-aki Fukase (Hirosaki Univ.) CPM2009-48
We have been working on the development of H-HIPS by using a FPGA. A FPGA can change circuits information easily. But, i... [more] CPM2009-48
pp.77-81
SITE 2007-11-02
15:05
Tokyo University of Electro-Communications Legal consideration on cryptographic research-groups' actions in case of finding vulnerability
Yusuke Inomata, Kazuo Ohta, Noboru Kunihiro (UEC) SITE2007-42
We consider a research-group’s action in a case of finding a vulnerability of cryptographic protocol and/or products. W... [more] SITE2007-42
pp.15-20
ISEC, SITE, IPSJ-CSEC 2007-07-20
10:20
Hokkaido Future University-Hakodate Orthogonal expansion of port-scan packets
Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitachi)
Observation of port-scan packets performed over the Internet is involved with so many parameters including time,
port ... [more]
ISEC2007-51
pp.43-49
ISEC, SITE, IPSJ-CSEC 2007-07-20
10:45
Hokkaido Future University-Hakodate Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet
Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai)
We try to analyze access logs from multiple sensors to get information about distribution of malicious hosts. We use the... [more] ISEC2007-52
pp.51-56
R 2007-05-18
14:00
Hiroshima Hiroshima University Proposal of the cyber attack detection model based on multivariate analysis
Yuto Sakai (Hiroshima Univ), Koichiro Rinsaka (Kobe Gakuin Univ), Tadashi Dohi (Hiroshima Univ) R2007-8
In many computer network systems, in order to secure an information security, the intrusion detection systems (IDS) are ... [more] R2007-8
pp.1-6
CS, IN, NS
(Joint)
2005-09-15
10:15
Miyagi Tohoku Univ. A Detection Technique of Epidemic Worms using Clustering of Packet Payload
Yuji Waizumi, Masashi Tsuji, Yoshiaki Nemoto (Tohoku Univ.)
Global damages of information systems by epidemic worms
have been reported because the spreading speed of worms has be... [more]
CS2005-19
pp.19-24
ISEC, IPSJ-CSEC, SITE 2005-07-21
09:30
Iwate Iwate Prefectural University A Proposal of Worm Detection System by Taking a Statistics of Series of Packets to Honeypot
Maki Kataoka, Yumiko Ishige (NTT Data Corporation), Nobutaka Mantani, Humiharu Ohashi (National Police Agency)
A worm detection system tells us when an unknown worm occurs as well as its attributes. In the proposed system, traffic ... [more] ISEC2005-9 SITE2005-7
pp.1-6
NS 2005-04-21
14:25
Aichi Nanzan-Univ. Design and Implementation of Anomaly Detection System with Classified Packet Counting
Kunio Goto, Koji Kojima (Nanzan Univ.)
In this research, practical application for quasi-realtime intrusion and network failure detection was designed and impl... [more] NS2005-4
pp.13-16
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan