IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 57 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIP, CAS, MSS, VLD 2017-06-19
11:40
Niigata Niigata University, Ikarashi Campus An Implementation Method of Reconfigurable Network Intrusion Detection Systems Based on Random Forests
Binbin Xue, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) CAS2017-7 VLD2017-10 SIP2017-31 MSS2017-7
In this paper, we propose an implementation method of reconfigurable network intrusion detection system based on random ... [more] CAS2017-7 VLD2017-10 SIP2017-31 MSS2017-7
pp.37-42
NLP 2017-05-12
11:00
Okayama Okayama University of Science Investigation of Fast Construction for Intrusion Detection System using Multi-Layer Extreme Learning Machine.
Daichi Noguchi, Masaharu Adachi (Tokyo Denki Univ.) NLP2017-18
Recently, there are incremental threats of cyber security for holding the Olympic Games in Tokyo in 2020. The fast const... [more] NLP2017-18
pp.87-92
IA, SITE, IPSJ-IOT [detail] 2017-03-03
14:50
Okinawa Culture Resort Festone (Okinawa) Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage
Masumi Uno (NAIST), Masahiro Ishii (Tokyo Tech), Atsuo Inomata (TDU), Ismail Arai, Kazutoshi Fujikawa (NAIST) SITE2016-68 IA2016-98
Confidential information have been leaked accidentally by targetted attacks by targeted attacks.
Remote Access Trojan/t... [more]
SITE2016-68 IA2016-98
pp.41-46
ICSS 2016-11-25
15:20
Kanagawa Institute of Information Security Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set
Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] ICSS2016-42
pp.21-26
ICSS, IPSJ-SPT 2016-03-03
15:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots
Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] ICSS2015-55
pp.47-52
CS, NS, IN
(Joint)
2014-09-12
13:25
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan Detection of Malicious Database Queries based on Matching with HTTP Requests
Yuichi Sudo, Takahiro Hamada, Yuichi Murata, Hideo Kitazume (NTT) IN2014-65
If an attacker takes over a Web server by vulnerability attack or fraud login and so on, the attacker can control the se... [more] IN2014-65
pp.99-104
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:05
Hokkaido San-Refure Hakodate Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16
pp.75-80
SITE, IPSJ-CE, IPSJ-CLE 2013-12-15
13:25
Okinawa Ryukyu Univ. Dynamic Hybrid System of Honeypot and IDS for Network Security Analysis
Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-55
The development of information technology has come hand-in-hand with various security problems that are becoming increas... [more] SITE2013-55
pp.157-161
SWIM 2013-11-29
13:50
Kanagawa Tokyo Polytechnic University A Study about Cyber Attack Detection System using Machine Learning
Tadashi Ogino (Okinawa National College of Technology) SWIM2013-13
The network intrusion is becoming a big thread for a lot of companies, organization and so on. Many of today’s intrusion... [more] SWIM2013-13
pp.9-14
AP, SAT
(Joint)
2013-07-25
14:30
Hokkaido Sun Refre Hakodate Study on Antenna Arrangement for MIMO Sensor in Outdoor Environment
Keita Konno, Naoki Honma (Iwate Univ.), Kentaro Nishimori (Niigata Univ.), Yoshitaka Tsunekawa (Iwate Univ.) AP2013-57
In this report, we investigate the use of the intrusion-detection MIMO (Multiple-Input Multiple-Output) sensor in the ou... [more] AP2013-57
pp.59-64
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:55
Nara Todaiji Total Cultural Center A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] SITE2012-52 IA2012-90
pp.43-48
IA, SITE, IPSJ-IOT [detail] 2013-03-15
11:15
Nara Todaiji Total Cultural Center Proposal of Active IDS by Risk Level Probe
Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-64 IA2012-102
Intrusion Detection System (IDS) is a security system in order to detect illegal access by checking the status of a comp... [more] SITE2012-64 IA2012-102
pp.169-174
CPSY, DC, IPSJ-SLDM, IPSJ-EMB [detail] 2013-03-14
14:05
Nagasaki   Development of High Speed Network Intrusion Detection System with High Scalability Using High-performance FPGA
Mamoru Sekiyama, Kenji Toda, Tetsuo Kotoku (AIST) CPSY2012-96 DC2012-102
We developed intrusion detection system (IDS) , that uses pattern matching circuit for Snort rules, on a high-performanc... [more] CPSY2012-96 DC2012-102
pp.265-269
SANE, SAT
(Joint)
2013-02-21
17:40
Okinawa Youth Center of Okinawa prefecture On Detection Performance of MIMO Security Sensor System for Indoor Intrusion Detection
Ken Ogawa, Hiroyoshi Yamada, Yoshio Yamaguchi (Niigata Univ.) SANE2012-154
Recently, researches on radio wave security sensors by using array antenna or MIMO have been attracting attention.In the... [more] SANE2012-154
pp.31-36
SITE 2012-12-12
14:00
Osaka   Trend and ethical problem of the honeypot
Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more]
SITE2012-45
pp.13-18
IA 2012-11-19
17:10
Fukushima Kanponoyado Iwaki (Fukushima) Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] IA2012-56
pp.23-28
VLD 2012-03-07
11:10
Oita B-con Plaza Implmentation of Look-ahead Assertion for Pattern-independent Regular Expression Matching Engine
Yoichi Wakaba, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) VLD2011-136
In this paper, we propose a look-ahead assertion matching method for regular expression matching hardware engine. In net... [more] VLD2011-136
pp.97-102
IN, IA
(Joint)
2011-12-16
12:50
Hiroshima Hiroshima City University Overlay Based, Distributed Defense-Framework against DDoS Attacks
Mohamad Eid, Hitoshi Aida (Univ. of Tokyo) IA2011-51
The World Wide Web plays vital roles in our daily lives. But cyber-attackers abuse this vitality by threatening web serv... [more] IA2011-51
pp.37-42
AP, SAT
(Joint)
2011-07-15
13:25
Nagano Fac. Eng., Shinshu Univ. Experimental Study on Channe lModel of MIMO Sensor for Event Detection
Akira Kumakura, Hiroyoshi Yamada, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) AP2011-42
In recent years, researches on radio security sensors by using array antenna or MIMO system has been attracting attentio... [more] AP2011-42
pp.87-90
AP, SAT
(Joint)
2011-07-15
13:50
Nagano Fac. Eng., Shinshu Univ. Performance Evaluation of Environment Change Detection method Using MIMO Sensor
Ken Ogawa, Hiroyoshi Yamada, Yuta Kurosaki, Yoshio Yamaguchi (Niigata Univ) AP2011-43
Recently, several indoor intrusion/event detection methods using radio propagation change have been proposed. One of the... [more] AP2011-43
pp.91-95
 Results 21 - 40 of 57 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan