IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 74 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, IN
(Joint)
2020-12-15
10:50
Online Online Development of an Intrusion Detection System Utilizing Social Network Analysis Principles
James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] IA2020-29
pp.18-21
ICSS 2020-11-26
15:25
Online Online Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more]
ICSS2020-23
pp.21-25
COMP, IPSJ-AL 2020-05-09
09:30
Online Online On Power and limitation of adversarial example attacks
Kouichi Sakurai (Kyushu Univ.) COMP2020-5
A risk of adversarial example attacks which cause deep learning to make wrong decisions is getting serious even from a c... [more] COMP2020-5
pp.33-36
ICSS, IPSJ-SPT 2020-03-03
09:50
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] ICSS2019-85
pp.103-108
NS, ICM, CQ, NV
(Joint)
2019-11-21
16:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Trends and Countermeasures of Cyber Attacks -- Introduction to Cyber Security for Network Engineers --
Yukiko Yano (NEC) CQ2019-93
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] CQ2019-93
p.27
KBSE, SC 2019-11-08
13:30
Nagano Shinshu University Malicious Domain Names Detection Based on TF-IDE and Variational Autoencoder: Classification with Quantum-enhanced Support Vector Machine
Yuwei Sun (UTokyo), Ng S. T. Chong (UNU), Hideya Ochiai (UTokyo) KBSE2019-26 SC2019-23
With the development of network technology, the use of domain name system (DNS) becomes common. However, the attacks on ... [more] KBSE2019-26 SC2019-23
pp.19-23
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
10:20
Kochi Kochi University of Technology An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
pp.7-14
AI 2019-07-22
16:30
Hokkaido   Modeling of Cyber Attack Based on POMDP
Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] AI2019-15
pp.77-82
CS, CQ
(Joint)
2019-04-18
09:20
Osaka Osaka Univ. Library Dynamic Redundancy Switching Method of Network Paths for Tamper-Tolerant Networked Control
Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CS2019-1
According to the growing of information and communication technology (ICT), various kinds of things are connected to the... [more] CS2019-1
pp.1-6
IBISML 2019-03-05
17:00
Tokyo RIKEN AIP A Study on Automatic Generation of False Data Injection Attack against Connected Car Service Based on Reinforcement Learning
Yuichiro Dan, Keita Hasegawa, Takafumi Harada, Tomoaki Washio, Yoshihito Oshima (NTT) IBISML2018-109
While the connected car is predicted to prevail by 2025, the appearance of novel cyber attacks is concerned. In this pap... [more] IBISML2018-109
pp.31-38
IN, NS
(Joint)
2019-03-05
11:30
Okinawa Okinawa Convention Center A study on Maliciousness Measurement in Cyber Threat Intelligence Using Graph Convolutional Networks
Yuta Kazato, Yoshihide Nakagawa, Yuichi Nakatani (NTT) IN2018-128
Cyber threat information (CTI) sharing is one of the important functions to protect end-users and services from cyber-at... [more] IN2018-128
pp.265-270
IN, NS
(Joint)
2019-03-05
14:10
Okinawa Okinawa Convention Center Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack
Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2018-271
pp.455-460
ICSS 2018-11-21
16:05
Kagoshima   [Invited Talk] Security Countermeasure at ShowNet in Interop Tokyo 2018
Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) ICSS2018-59
Cyber attacks become emerging threats on the Internet.We held an exhibition in ICT called Interop Tokyo every June. In t... [more] ICSS2018-59
p.37
ICSS 2018-11-22
11:15
Kagoshima   [Invited Talk] An Overview of Cyber Security for Connected Vehicles
Junko Takahashi (NTT) ICSS2018-63
This paper presents an overview of cyber security for connected vehicles based on the recent previous studies of vehicle... [more] ICSS2018-63
pp.55-59
SITE, ISEC, LOIS 2018-11-04
10:00
Fukuoka   Introduction of PKI Electronic Authentication for Important IoT Devices -- For Establishment of Secure IoT Platform --
Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] ISEC2018-72 SITE2018-50 LOIS2018-32
pp.45-50
CS 2018-07-12
17:00
Okinawa Eef Information Plaza (Kumejima Is.) [Special Invited Talk] Cyber Security: Lessons Learned from Actual Cases -- Recent Trends of Cyber Attacks and Effective Approaches --
Hiroo Suzuki, Tetsushi Morita (NTT) CS2018-34
In 5G/IoT era, cyber security is an indispensable element for the sound development of digital economy utilizing informa... [more] CS2018-34
p.109
ASN, NS, RCS, SR, RCC
(Joint)
2018-07-11
13:10
Hokkaido Hakodate Arena [Encouragement Talk] Proposal of Automatic Data Collection and Repository Generation for Statistical Analysis and Visualization of Dark Web Markets
Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2018-41
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2018-41
pp.25-30
NS, OCS, PN
(Joint)
2018-06-14
13:00
Fukushima Koriyama-Shoko-Kaigisho [Invited Talk] Cyber security defense techniques for IoT systems
Hiroaki Mukai, Testuya Yokotani (KIT) NS2018-27 OCS2018-10 PN2018-10
n recent years, with the development of AI technology, IoT technique is adopted in various fields such as plant, logisti... [more] NS2018-27 OCS2018-10 PN2018-10
p.1(NS), p.1(OCS), p.37(PN)
NS, IN
(Joint)
2018-03-01
11:30
Miyazaki Phoenix Seagaia Resort Statistical Analysis on Dark Web Market Focusing on DDoS/Botnet
Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2017-182
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2017-182
pp.85-90
NS, IN
(Joint)
2018-03-02
14:40
Miyazaki Phoenix Seagaia Resort Development of an Emulation System for Autonomous and Distributed Internet Security Infrastructure
Masaya Shimode, Tomohiro Akasaki, Hiroyuki Kimiyama, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-236
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" for protecting our resources on the Inte... [more] NS2017-236
pp.385-390
 Results 21 - 40 of 74 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan