IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 28 of 28 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM, LOIS 2016-01-21
16:45
Fukuoka Fukuoka Institute of Technology [Invited Talk] Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications
Yoshiyasu Nishibe, Ken Ito, Masaki Onishi (NTT Com) ICM2015-33 LOIS2015-55
In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations... [more] ICM2015-33 LOIS2015-55
pp.41-46
ICSS 2015-11-26
14:10
Fukushima AIST, Fukushima Renewable Energy Institute A Traffic Analysis to Identify Unintended Impact on Business Caused by an Incident Response
Minori Shiota, Yukiko Yamaguchi, Hajime Shiimada (Nagoya Univ), Hiroki Takakura (NII) ICSS2015-36
To confront recent sophisticated targeted attacks, we have to prevent the theft of information and the destruction of th... [more] ICSS2015-36
pp.7-12
ICSS 2015-11-27
14:40
Fukushima AIST, Fukushima Renewable Energy Institute A Suspicious Processes Detection Scheme using Process Frequency
Junji Nakazato, Yu Tsuda, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-45
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-45
pp.61-66
ICSS 2015-03-04
14:05
Okinawa Meio Univiersity Targeted Malware Detection Focused on Dummy Document Display
Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-89
In recent years, targeted attacks have become a bigger threat. Attackers usually try to intrude into targeted organizati... [more] ICSS2014-89
pp.157-161
NS, IN
(Joint)
2015-03-03
10:50
Okinawa Okinawa Convention Center Fast Log Tracing Method for Information-Leakage Prevention
Koki Ikeda, Takuya Suzuki, Pichaya Kietkaroon (Tokai Univ.), Takahiro Hamada, Yuichi Murata (NTT), Junichi Murayama (Tokai Univ.) IN2014-150
Recently, targeted attacks for enterprise information networks occur frequently and thus secret files are leaking via ap... [more] IN2014-150
pp.175-178
ICSS, IA 2014-06-05
15:15
Hyogo Takikawa Memorial Hall, Kobe University [Invited Talk] Threat and Countermeasure Against the Targeted Attack
Satoru Torii (Fujitsu Labs.) IA2014-2 ICSS2014-2
A lot of incidents by crafty cyber-attacks such as a targeted attack are made public. To confront such novel cyber-attac... [more] IA2014-2 ICSS2014-2
pp.7-8
ICSS, IA 2014-06-06
13:50
Hyogo Takikawa Memorial Hall, Kobe University Implementation of the Administration Policy Description Method on Automatic Network Organization System
Minori Shiota, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2014-10 ICSS2014-10
To confront recent sophisticated targeted attacks, we have to consider a information system to prevent the destruction ... [more] IA2014-10 ICSS2014-10
pp.49-54
SSS 2012-03-16
15:40
Tokyo Meiji Univ. Targeted Email Attack
Takehiko Nakayama (National Police Agency) SSS2011-29
Targeted e-mail attack is a form of attacks sending malicious e-mail to specific individual or company and it is very hu... [more] SSS2011-29
pp.17-18
 Results 21 - 28 of 28 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan