IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 33 of 33 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2013-11-12
14:15
Fukuoka Nishijin Plaza Evaluations of Multi-Stage Traffic Analysis against Attacks on Websites
Takeshi Yagi, Takeo Hariu (NTT), Hiroki Takakura (Nagoya University) ICSS2013-57
This paper proposes a traffic analysis scheme to detect attacks from accesses to websites. Conventional schemes can dete... [more] ICSS2013-57
pp.3-8
IN, MoNA
(Joint)
2010-11-18
14:50
Fukuoka Fukuoka Institute of Technology Architecture Design of Web Phantom: Hybrid Web Honeypot
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] IN2010-85
pp.25-30
IA, ICSS 2010-06-18
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Life-cycle Monitoring Method of Malware Download Sites for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] IA2010-14 ICSS2010-14
pp.75-80
ICSS 2010-03-26
15:30
Fukuoka The University of Kitakyushu Investigation of Attacks to Websites using Multi-domain Web-based Honeypots
Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] ICSS2009-66
pp.25-28
NS, IN
(Joint)
2010-03-05
11:40
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) A Scheme of Detecting Malware for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] IN2009-200
pp.337-342
IN 2009-07-10
11:25
Hokkaido HOKKAIDO UNIVERSITY A Provider Provisioned Websites Protection Scheme against Malware Distribution
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) IN2009-34
This paper proposes a website protection scheme for service providers by analyzing accesses to web honeynets, which carr... [more] IN2009-34
pp.55-60
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:25
Akita Akita University Investigation about Malware Distribution to Websites
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] ISEC2009-32 SITE2009-24 ICSS2009-46
pp.175-180
ICSS 2009-05-15
15:10
Hyogo Kobe University Investigation of Spam Mail Driven Web-Based Passive Attack
Yuhei Kawakoya, Mitsuaki Akiyama, Kazufumi Aoki, Mitsutaka Itoh (NTT), Hiroki Takakura (Kyoto Univ) ICSS2009-5
In recent years, the number of web-based passive attacks which are driven by URLs included in spam mail is increasing. B... [more] ICSS2009-5
pp.21-26
DE 2008-12-01 Tokyo Gakushuin [Poster Presentation] A Concept of Oblivious CAPTCHA -- Fifth-Factor Technology for Practical CAPTCHA Usages --
Hiroaki Ozeki (IBM Japan) DE2008-63
The CAPTCHA idea (Completely Automated Public Turing test to tell Computers and Humans Apart) is widely used as a HIP (H... [more] DE2008-63
pp.31-32
SS, KBSE 2007-04-20
09:40
Fukushima Univ. of Aizu A Method of Detecting Security Flaws in Web Sessions through Model Checking
Ikuya Morikawa, Yuji Yamaoka, Yuko Nakayama (Fujitsu Labs.) SS2007-6 KBSE2007-6
We propose a method to find security flaws related to sessions in Web applications with model checking. In this method, ... [more] SS2007-6 KBSE2007-6
pp.29-34
LOIS, IPSJ-DC 2006-07-28
14:05
Yamagata Faculty of Engineering Yamagata University Server-side security requirements against the Web technology threats
Yutaka Matsunaga (TEL), Michiko Oba (Hitachi)
The number of the attacks to the Web servers exploiting Web technologies is increasing. These attacks have caused forced... [more] OIS2006-17
pp.47-53
ISEC, SITE, IPSJ-CSEC 2006-07-20
13:25
Okayama Okayama Univ. IDS for SSL Enncrypted Web Traffic
Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.)
The threat of attacks on web applications, such as SQL injection and cross site scripting, remains a serious problem. Th... [more] ISEC2006-32 SITE2006-29
pp.167-173
IA, MoNA 2005-01-19
09:30
Osaka Osaka University Nakanoshima Center Alarm Aggregation Architecture for Identifying One Way XSS Attacks
Omar Ismail, Masashi Etoh, Youki Kadobayashi, Suguru Yamaguchi (NAIST)
Cross-Site Scripting(XSS) is caused by the failure of web applications to properly
validate user input before returning... [more]
MoMuC2004-89 IA2004-20
pp.7-14
 Results 21 - 33 of 33 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan