IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 66 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2018-12-06
09:50
Hiroshima Satellite Campus Hiroshima Secure PUF Authentication Method against Machine Learning Attack
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-49 DC2018-35
It has been reported that the challenge and response authentication, which is a typical PUF authentication method, is vu... [more] VLD2018-49 DC2018-35
pp.77-82
SITE, ISEC, LOIS 2018-11-04
11:30
Fukuoka   A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] ISEC2018-75 SITE2018-53 LOIS2018-35
pp.63-68
ICSS, IPSJ-SPT 2018-03-08
11:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Classification for Important Decoy Documents Based on Supervised Learning
Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-72
In recent targeted e-mail attacks, attackers often send their target organization an email with a malware disguised as a... [more] ICSS2017-72
pp.127-132
ICSS, IPSJ-SPT 2018-03-08
12:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Analyzing web application vulnerability reports by machine learning
Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com) ICSS2017-74
Web application vulnerability testing is important for preventing cyberattacks. However, it is difficult to test all URL... [more] ICSS2017-74
pp.139-144
NS, IN
(Joint)
2018-03-02
13:30
Miyazaki Phoenix Seagaia Resort Network Abnormality Detection Using Machine Learning
TsukasaMannen, Kohei Shiomoto (TCU) NS2017-226
Today, through the widespread use of internet, we need to take measures of Malicious Software. Once computers on the int... [more] NS2017-226
pp.327-332
NS, IN
(Joint)
2018-03-02
15:20
Miyazaki Phoenix Seagaia Resort Method for Generating a Data Set to Detect Cyber Attacks for Autonomous and Distributed Internet Security Infrastructure
Yusei Katsura, Hiroyuki Kimiyama (Tokyo Denki Univ.), Akihiro Nakao (Tokyo Univ.), Naoki Yonezaki, Tomoaki Tsutsumi, Kaoru Sano (Tokyo Denki Univ.), Takeshi Okamoto, Mitsuru Maruyama (Kanagawa Institutes of Technology), Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-238
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to protect our resources on... [more] NS2017-238
pp.397-401
VLD, HWS
(Joint)
2018-03-02
14:30
Okinawa Okinawa Seinen Kaikan Modeling Attacks on Double-Arbiter PUF Using Deep Neural Network
Tomoki Iizuka, Hiromitsu Awano, Makoto Ikeda (UTokyo) VLD2017-127
A deep neural network-based modeling attack for Double-Arbiter PUF (DAPUF) is proposed. Although DAPUF is known to be hi... [more] VLD2017-127
pp.231-236
IA, IN
(Joint)
2017-12-15
14:10
Hiroshima Hiroshima City Univ. A study of gini importance-based header feature selection methods for cyber attack detection
Yuta Kazato, Yuichi Nakatani, Takeshi Okamoto, Akira Shibata (NTT) IN2017-61
Growing the expansion of network services and IoT devices, the risk of cyber attacks is increased by high-frequency and ... [more] IN2017-61
pp.91-96
ICSS 2017-11-20
15:15
Oita Beppu International Convention Center Preliminary Evaluation on the Program Classification at the Processor Level using Machine Learning
Ryotaro Kobayashi (Kogakuin Univ.), Hayate Takase, Genki Otani, Ren Ohmura (Toyohashi Univ. of Tech.), Masahiko Kato (Univ. of Nagasaki) ICSS2017-39
As use of IoT devices becomes widespread, a lot of things are connected to the Internet, and the convenience of everyday... [more] ICSS2017-39
pp.5-10
IA 2017-11-15
13:50
Overseas KMITL, Bangkok, Thailand Machine Learning Approach for Phishing Detection in SDN Networking
Yu-Hung Chen, Jiun-Yu Yang, Po-Chun Hou, Jiann-Liang Chen (National Taiwan University of Science & Technology) IA2017-30
People have become increasingly dependent on information technology since the emergence of the Internet. Therefore, many... [more] IA2017-30
pp.1-6
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2017-11-07
09:50
Kumamoto Kumamoto-Kenminkouryukan Parea A PUF Based on the Instantaneous Response of Ring Oscillator Determined by the Convergence Time of Bistable Ring Oscillator Circuit
Yuki Tanaka, Song Bian, Masayuki Hiromoto, Takashi Sato (Kyoto Univ.) VLD2017-40 DC2017-46
Studies on physical unclonable function (PUF) have been actively conducted as one of the countermeasures against counter... [more] VLD2017-40 DC2017-46
pp.79-84
NS 2017-10-27
11:10
Osaka I-site nanba A Study of Infection Attack Detection Mechanism on a Carrier Network Considering Lightweight Feature Extraction
Yukihiro Togari, Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) NS2017-109
As many hosts which is not equipped with any security functions with respect to production cost connect to Internet and ... [more] NS2017-109
pp.89-94
IBISML 2016-11-17
14:00
Kyoto Kyoto Univ. Anomaly Deteciton with K-Means -- Comparison with Supervised Methods --
Hisashi Takahara (UNP) IBISML2016-75
Today, almost all computers have access to the Internet. Computers connected to the Internet are susceptible to various ... [more] IBISML2016-75
pp.207-214
ICSS, IPSJ-SPT 2016-03-04
14:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Autonomous DDoS Backscatter Detection System from Darknet Traffic
Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] ICSS2015-67
pp.123-128
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
ICSS 2015-03-03
14:15
Okinawa Meio Univiersity Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA
Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.) ICSS2014-66
In recent days, many botnet-based attacks are observed. In this thesis, our object is to detect the domain generation al... [more] ICSS2014-66
pp.19-24
SWIM 2014-11-29
11:20
Tokyo Tokyo Polytechnic Univ. A study of learning method for intrusion detection system using machine learning
Tadashi Ogino (Okinawa National College of Tech.) SWIM2014-18
The network intrusion is becoming a big threat. Recent intrusions are becoming more clever and difficult to detect. Many... [more] SWIM2014-18
pp.23-28
ICSS 2014-11-28
10:20
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting Backscatter of DDoS Attacks from Darknet Traffic
Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] ICSS2014-59
pp.49-53
ICSS 2014-11-28
11:35
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting infected hosts with machine learning analysis of DNS responses
Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] ICSS2014-62
pp.67-72
ET 2014-11-14
13:50
Osaka Osaka Prefecture University (Nakamozu Campus) A Consideration of Attacker Agent in Virtual Machine-based System to Support Network Security Learning
Kazuki Fukuyama, Yoshiaki Taniguchi, Nobukazu Iguchi (Kinki Univ.) ET2014-67
Education of network security has attracted a lot of attentions due to increasing unauthorized access, lack of engineers... [more] ET2014-67
pp.37-42
 Results 41 - 60 of 66 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan