IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 41 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2017-03-14
11:20
Nagasaki University of Nagasaki Graph based Detection of Advanced Persistent Threat on LAN
Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT) ICSS2016-65
Recently the countermeasures against continuously increasing Advanced Persistent Threats(APT) are urgently necessary.
I... [more]
ICSS2016-65
pp.153-158
ICSS, IPSJ-SPT 2017-03-14
11:45
Nagasaki University of Nagasaki Representation for Attack Activity to Associate Threat Information
Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] ICSS2016-64
pp.147-152
IA, IN
(Joint)
2016-12-16
13:20
Hiroshima Hiroshima city university A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures
Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] IN2016-82
pp.91-96
ICSS 2016-11-25
14:40
Kanagawa Institute of Information Security A fuzz testing method cooperated with threat modeling
Yasuhiko Nishio, Tadashi Shiroma (CCDS), Hiroyuki Inoue (CCDS/HCU) ICSS2016-41
The purpose of this study is to develop a fuzz testing method that can ensure the IoT security especially automotive sys... [more] ICSS2016-41
pp.15-20
ASN 2016-05-12
13:00
Tokyo   [Invited Talk] IoT
Hiroyuki Baba (Tokyo University)
Challenges for the prompt realization of IoT will be shown at this presentation which is based on study of HEMS, a use c... [more]
ICSS, IPSJ-SPT 2016-03-04
10:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs
Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) ICSS2015-62
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] ICSS2015-62
pp.89-94
IA 2015-11-12
16:00
Chiba NARITA VIEW HOTEL Enhancing performance of cardinality analysis for faster network
Shinichi Mori, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2015-52
Cardinality in network flow data gives useful information for network administrators about suspicious communication on t... [more] IA2015-52
pp.81-85
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
13:50
Aichi NAGOYA TRADE & INDUSTRY CENTER Study on Application of Measure Behavior Intention Model for Information Security into Security Action Cyc
Noriaki Yoshikai (Nihon Univ.) ISEC2015-16 SITE2015-14 ICSS2015-26 EMM2015-24
In order to operate information security system safely and normally, it is necessary to realize the information security... [more] ISEC2015-16 SITE2015-14 ICSS2015-26 EMM2015-24
pp.81-86
IA, ICSS 2015-06-12
10:30
Fukuoka Kyushu Institute of Technology Univ. Experimental Results on an Attack Detection System for Advanced Persistent Threats
Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] IA2015-9 ICSS2015-9
pp.45-50
IA 2014-10-07
16:55
Osaka Grand Front OSAKA Tower-B 10F Recent cyber attack methodology and protection -- The Consideration based on Interop Tokyo 2014 ShowNet Security --
Ken Hashimoto (FireEye), Takashi Tomine (NICT), Yuji Sekiya (Univ. of Tokyo) IA2014-33
In social activities and daily life, a share of activities from the Internet has been gotten higher. Due to that changes... [more] IA2014-33
pp.51-56
ICSS, IPSJ-SPT 2014-03-28
10:15
Okinawa Meio Univiersity MATATABI: Multi-layer Threat Analysis Platform with Hadoop
Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] ICSS2013-77
pp.113-118
ICSS, IPSJ-SPT 2014-03-28
11:15
Okinawa Meio Univiersity Timeline-Based Event Log Viewer over Multi-Host Environment
Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more]
ICSS2013-79
pp.125-130
ISEC, IT, WBS 2014-03-10
10:35
Aichi Nagoya Univ., Higashiyama Campus An XML Based Document Management Framework to Prevent Data Leakage
Kamran Morovati (Univ. of pune), Sanjay Kadam (C-DAC) IT2013-58 ISEC2013-87 WBS2013-47
This paper proposes a secure document management framework to reduce the risk of unauthorized data disclosure in an orga... [more] IT2013-58 ISEC2013-87 WBS2013-47
pp.27-34
LOIS 2014-03-08
16:20
Okinawa   Linkable System Using Encrypted Personal Identification Information for Clinical Research
Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] LOIS2013-79
pp.149-154
KBSE 2013-09-13
15:00
Tokyo The University of Electro-Communications A classification method in identifying security patterns for a dependable Security Case -- From Security Patterns to D-Case --
Vaise Patu, Nada Olayan, Shuichiro Yamamoto (Nagoya Univ.) KBSE2013-52
Today's software systems are facing new and complicated challenges in confronting with security issues. There are lots o... [more] KBSE2013-52
pp.91-96
SITE, IPSJ-EIP 2013-05-16
11:00
Kanagawa Institute of Infomation Security Empirical study on cognitive effect about threat data for information security
Noriaki Yoshikai, Hiroaki Kanda, Sho Hamatsu, Mayako Sato, Shun-ichi Kurino (Nihon Univ.) SITE2013-2
We have collected the data on psychology and action of a person under a virus infection environment, by a questionnaire ... [more] SITE2013-2
pp.5-10
SS 2013-05-09
14:40
Kagawa Kagawa University (Saiwaimachi) Detection of Security Threats Using Patterns of Sequence Diagrams
Tatsuya Abe, Shinpei Hayashi, Motoshi Saeki (Tokyo Inst. of Tech.) SS2013-1
Detecting security threats of information system in design phase helps to develop secure systems. However, the more thre... [more] SS2013-1
pp.1-6
IMQ 2012-07-27
13:00
Aichi Nagoya University, Venture Business Laboratory [Special Talk] An innate threat detection system in the human brain -- Scale is the key to fear for snake --
Nobuyuki Kawai (Nagoya Univ.) IMQ2012-7
Humans are afraid of specific stimuli, such as angry faces and snakes. It has been a long debate on whether such fear re... [more] IMQ2012-7
pp.1-6
HIP 2009-12-17
16:10
Miyagi RIEC The influence of darkness on recognition of facial expressions
Satoshi Nakashima, Yuko Morimoto, Sakiko Yoshikawa (Kyoto Univ.) HIP2009-103
We examined the effects of darkness on recognition of facial expression. Participants were shown a set of unfamiliar fac... [more] HIP2009-103
pp.41-46
ICM 2009-05-28
13:25
Kagawa Kagawa University Security management for university network in distributed environment -- An Approach of Kagawa University for Security-based Computer Network Management in Distributed Campus Environment --
Kazuyoshi Kawauchi, Kazutoshi Sone, Masahide Kawaguchi, Takanori Doi, Yoshiro Imai, Zengo Furukawa (Kagawa Univ.) ICM2009-2
This report presents an approach of security measures for Kagawa University and its results during a few months monitori... [more] ICM2009-2
pp.7-10
 Results 21 - 40 of 41 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan