|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2021-03-05 14:45 |
Online |
Online |
Consideration of embedding methods and machine learning models for detecting malicious URLs Qisheng Chen, Kazumasa omote (Univ. of Tsukuba) IT2020-157 ISEC2020-87 WBS2020-76 |
Nowadays, Internet access is becoming more and more popular, which makes the harm of malicious websites more and more se... [more] |
IT2020-157 ISEC2020-87 WBS2020-76 pp.281-287 |
IA |
2020-10-01 11:15 |
Online |
Online |
Malicious URLs Detection Using an Integrated AI Framework Bo-Xiang Wang, Ren-Feng Deng, Yi-Wei Ma, Jiann-Liang Chen (NTUST) IA2020-1 |
Malicious attacks on computer networks are quite common, and the internet attacks are even more widespread, such as Malv... [more] |
IA2020-1 pp.1-5 |
IA |
2019-11-15 13:15 |
Tokyo |
Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) |
Malicious URL Classification using Machine Learning Techniques Yu-Chen Chen, Li-Dong Chen, Yan-Ju Chen, Jiann-Liang Chen (NTUST) IA2019-41 |
The Website security is an important research topic that must be pursued to protect internet users. Traditionally, black... [more] |
IA2019-41 pp.79-83 |
ICSS |
2014-11-28 11:10 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
searching malicious URL from vast webspace Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61 |
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more] |
ICSS2014-61 pp.61-66 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 13:50 |
Hokkaido |
San-Refure Hakodate |
A Case Study on Light-weight URL Blacklist Generation based on Sandbox Analysis Mitsuhiro Hatada, Takanori Inazumi, Jun Arikawa, Yasuyuki Tanaka (NTT Communications) ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44 |
In order to detect the malware infection in internal network, we focus on HTTP traffic to the Internet. URL blacklist is... [more] |
ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44 pp.309-314 |
IA, ICSS |
2009-06-18 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A Study on effective usage of the URL Blacklists Takahiro Matsuki, Yuu Arai (LAC) IA2009-4 ICSS2009-12 |
In these days, various menaces are increasing in the Web. The web-based malware infection become the mainstream. Many we... [more] |
IA2009-4 ICSS2009-12 pp.19-23 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|