|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, LOIS |
2016-01-21 16:45 |
Fukuoka |
Fukuoka Institute of Technology |
[Invited Talk]
Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications Yoshiyasu Nishibe, Ken Ito, Masaki Onishi (NTT Com) ICM2015-33 LOIS2015-55 |
In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations... [more] |
ICM2015-33 LOIS2015-55 pp.41-46 |
ICSS |
2015-11-26 14:10 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Traffic Analysis to Identify Unintended Impact on Business Caused by an Incident Response Minori Shiota, Yukiko Yamaguchi, Hajime Shiimada (Nagoya Univ), Hiroki Takakura (NII) ICSS2015-36 |
To confront recent sophisticated targeted attacks, we have to prevent the theft of information and the destruction of th... [more] |
ICSS2015-36 pp.7-12 |
ICSS |
2015-11-27 14:40 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Suspicious Processes Detection Scheme using Process Frequency Junji Nakazato, Yu Tsuda, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-45 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-45 pp.61-66 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
Targeted Malware Detection Focused on Dummy Document Display Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-89 |
In recent years, targeted attacks have become a bigger threat. Attackers usually try to intrude into targeted organizati... [more] |
ICSS2014-89 pp.157-161 |
NS, IN (Joint) |
2015-03-03 10:50 |
Okinawa |
Okinawa Convention Center |
Fast Log Tracing Method for Information-Leakage Prevention Koki Ikeda, Takuya Suzuki, Pichaya Kietkaroon (Tokai Univ.), Takahiro Hamada, Yuichi Murata (NTT), Junichi Murayama (Tokai Univ.) IN2014-150 |
Recently, targeted attacks for enterprise information networks occur frequently and thus secret files are leaking via ap... [more] |
IN2014-150 pp.175-178 |
ICSS, IA |
2014-06-05 15:15 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
[Invited Talk]
Threat and Countermeasure Against the Targeted Attack Satoru Torii (Fujitsu Labs.) IA2014-2 ICSS2014-2 |
A lot of incidents by crafty cyber-attacks such as a targeted attack are made public. To confront such novel cyber-attac... [more] |
IA2014-2 ICSS2014-2 pp.7-8 |
ICSS, IA |
2014-06-06 13:50 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Implementation of the Administration Policy Description Method on Automatic Network Organization System Minori Shiota, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2014-10 ICSS2014-10 |
To confront recent sophisticated targeted attacks, we have to consider a information system to prevent the destruction ... [more] |
IA2014-10 ICSS2014-10 pp.49-54 |
SSS |
2012-03-16 15:40 |
Tokyo |
Meiji Univ. |
Targeted Email Attack Takehiko Nakayama (National Police Agency) SSS2011-29 |
Targeted e-mail attack is a form of attacks sending malicious e-mail to specific individual or company and it is very hu... [more] |
SSS2011-29 pp.17-18 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|