IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 191 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICD, HWS [detail] 2020-10-26
15:45
Online Online Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] HWS2020-37 ICD2020-26
pp.71-76
IN, CCS
(Joint)
2020-08-03
13:00
Online Online 5G Threat Analysis Based on Smart Factory Operational Scenario -- Security from a NFV perspective --
Takahashi Hideaki, Taenaka Yuzo, Kadobayashi Youki (NAIST) IN2020-13
The 5th generation mobile communication system (5G) is expected to bring major innovations to mobile communication netwo... [more] IN2020-13
pp.25-30
NS, IN
(Joint)
2020-03-06
10:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
[Technology Exhibit] Machine learning pipeline for analyzing Large-scale traffic
Morikawa Akira, Bo Hu (NTT) NS2019-212 IN2019-103
Recently, machine learning becomes promising to automatically extract intelligence from network traffic for cybersecurit... [more] NS2019-212 IN2019-103
p.191(NS), p.151(IN)
ICSS, IPSJ-SPT 2020-03-02
10:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Estimation method of information asset security attributes using design mode
Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.) ICSS2019-69
In security evaluation such as risk analysis, analysis is performed based on the value of information assets in the syst... [more] ICSS2019-69
pp.7-12
ICSS, IPSJ-SPT 2020-03-03
09:50
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] ICSS2019-85
pp.103-108
SSS 2019-12-17
14:10
Tokyo   Proposal of a Risk Access Method of Steel Plant Control System using Remote Acccess
Shuji Tsuchida (Nippon Steel) SSS2019-24
In plant control system, there is an increasing need for online operation analysis and maintenance using a remote access... [more] SSS2019-24
pp.9-10
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:20
Hyogo Rokkodai 2nd Campus, Kobe Univ. Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree
Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] NS2019-123
pp.19-25
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:45
Hyogo Rokkodai 2nd Campus, Kobe Univ. Analysis of UTM traffic log using LLL algorithm
Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] NS2019-124
pp.27-30
ICSS 2019-11-13
15:45
Miyazaki MRT Terrace(Miyazaki) Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment
Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] ICSS2019-65
pp.31-36
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:00
Kochi Kochi University of Technology A Countermeasure against Side-Channel Analysis using Dynamic Power Control
Tomoaki Ukezono (Fukuoka Univ.) ISEC2019-28 SITE2019-22 BioX2019-20 HWS2019-23 ICSS2019-26 EMM2019-31
With the spread of IoT devices, there is an interest in physical security for cryptography. Among them, side-channel att... [more] ISEC2019-28 SITE2019-22 BioX2019-20 HWS2019-23 ICSS2019-26 EMM2019-31
pp.145-149
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:30
Kochi Kochi University of Technology Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA -- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis --
Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45
In this paper we propose a method for machine learning similar chains of words (word chains) similar to "rules for infer... [more] ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45
pp.243-249
EMCJ 2019-07-18
13:35
Tokyo Kikai-Shinko-Kaikan Bldg. Fundamental study on influence of intentional electromagnetic interference on IC communication
Hikaru Nishiyama, Takumi Okamoto, Daisuke Fujimoto, Yuichi Hayashi (NAIST) EMCJ2019-23
Low-Power Intentional Electromagnetic Interference (IEMI) has been reported, which causes malfunction without damaging t... [more] EMCJ2019-23
pp.29-33
SC 2019-06-01
10:30
Ibaraki National Institute for Materials Science An Introduction of Security Case Studies for Service Robots and IoT Devices
Jiro Yamazaki, Hidenori Tsuiji, Fumiaki Yamasaki (NOS) SC2019-8
In the past years, robots worked in very restricted area such as industrial factory for a certain purposes and
also iso... [more]
SC2019-8
pp.45-50
ICSS, IPSJ-SPT 2019-03-08
14:25
Okinawa NICT Okinawa Electromagnetic Technology Center Traffic analysis to detect abnormal smartphone application behavior
Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2018-87
With the spread of smartphones, its security management has become important. For smartphones, it is also necessary to c... [more] ICSS2018-87
pp.167-172
ICSS, IPSJ-SPT 2019-03-08
14:50
Okinawa NICT Okinawa Electromagnetic Technology Center Performance survey for IoT security function on smartphone
Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) ICSS2018-68
Recently, IoT devices are wide spreading, and its security management has become more important. There are two kinds of ... [more] ICSS2018-68
pp.1-6
IBISML 2019-03-05
17:00
Tokyo RIKEN AIP A Study on Automatic Generation of False Data Injection Attack against Connected Car Service Based on Reinforcement Learning
Yuichiro Dan, Keita Hasegawa, Takafumi Harada, Tomoaki Washio, Yoshihito Oshima (NTT) IBISML2018-109
While the connected car is predicted to prevail by 2025, the appearance of novel cyber attacks is concerned. In this pap... [more] IBISML2018-109
pp.31-38
IN, NS
(Joint)
2019-03-05
14:10
Okinawa Okinawa Convention Center Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack
Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2018-271
pp.455-460
KBSE 2019-03-02
09:00
Kyoto Doshisha University Kambaikan Development of Knowledge Presentation Method in Security Requirement Analysis and Design Using a Software Security Knowledge Base and Evaluation by a Case Study
Yuki Yamada, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) KBSE2018-62
In recent years, the threat of cyber attacks such as information disclosure due to unauthorized access has become seriou... [more] KBSE2018-62
pp.51-56
HWS, VLD 2019-03-01
16:20
Okinawa Okinawa Ken Seinen Kaikan Low-Cost Power Analysis Countermeasures for Unrolled Architecture Implementation PRINCE
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-134 HWS2018-97
Lightweight block ciphers, which can be implemented with low cost, are suitable for improving the safety of small device... [more] VLD2018-134 HWS2018-97
pp.243-248
RCS, SIP, IT 2019-01-31
16:10
Osaka Osaka University [Special Invited Talk] Engaged in Studies on Wireless Communication and Physical Layer Security using Antenna and Propagation
Hideichi Sasaoka (Doshisha Univ.) IT2018-51 SIP2018-81 RCS2018-258
In this paper, the history passing in the past 35 years of my study on wireless communication and physical layer securit... [more] IT2018-51 SIP2018-81 RCS2018-258
pp.91-96
 Results 41 - 60 of 191 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan