IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 57 of 57 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-12
15:00
Shizuoka Shizuoka University Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses
Shunichi Mizoguchi, Hiroyuki Inaba (KIT) ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11
Recently, illegal access to network is increasing. Therefore the importance of a network intrusion detection system (IDS... [more] ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11
pp.19-24
ISEC, IT, WBS 2011-03-04
13:25
Osaka Osaka University An anomaly detection method using gamma-divergence and its application to system call sequence
Shintaro Murakami, Masanori Kawakita, Jun'ichi Takeuchi (ISIT/Kyushu Univ.) IT2010-98 ISEC2010-102 WBS2010-77
Nowadays, damage by malwares is increasing. In this paper, we discuss anomaly detection by machine learning and its appl... [more] IT2010-98 ISEC2010-102 WBS2010-77
pp.191-197
AP 2011-01-20
10:55
Saga Saga Univ. Experimental Study on Indoor Intrusion Detection with Asynchronous Distributed Transmitters
Kei Tanaka, Yuta Kurosaki, Hiroyoshi Yamada, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) AP2010-137
In recent years, several indoor intrusion/event detection methods using radio propagation change caused by intruder have... [more] AP2010-137
pp.25-30
IA 2010-11-24
17:45
Yamanashi Seisen-Ryo Construction of high performance network intrusion system
Moriteru Ishida (Kyoto Univ.), Hiroki Takakura (Nagoya Univ.), Yasuo Okabe (Kyoto Univ.) IA2010-56
Intrusion detection systems(IDSs) are equipments important to network security. Recently, there’s been an increase in re... [more] IA2010-56
pp.31-36
AP, SAT
(Joint)
2010-07-21
13:00
Hokkaido Kitami Inst. Tech. Fundamental Study on Indoor Intrusion/Location Detection using Radio Propagation Change
Yuta Kurosaki, Kei Tanaka, Hiroyoshi Yamada, Yoshio Yamaguchi (Niigata Univ.) AP2010-42
In recent years, several indoor intrusion/event detection methods using radio propagation change caused by intruder have... [more] AP2010-42
pp.25-30
SANE 2010-04-23
09:55
Okinawa Okinawa Subtropical Environment Remote-Sensing Center, NICT An Intruder-Detection algorithm by Wide-area Perimeter Surveillance Sensor with Leaky Coaxial Cabels
Koichi Ikuta, Naoki Aizawa, Sayu Takamatsu, Kenji Inomata, Hiroshi Kage, Kazuhiko Sumi (Mitsubishi Electric Corp.) SANE2010-6
This paper presents an intruder-detection algorithm by wide-area perimeter surveillance sensor with
LCX(Leaky Coaxial ... [more]
SANE2010-6
pp.31-35
IA 2009-11-25
16:00
Saga Saga-Ken An analysis of IDS alerts to grasp attack situation in the third party's network
Kensuke Nakata, Hiroki Takakura, Yasuo Okabe (Kyoto Univ) IA2009-62
To fight against emerging cyber attacks on Internet,
various types of security solutions have been proposed.
As one ... [more]
IA2009-62
pp.25-30
IA, SITE 2009-03-05
14:40
Kumamoto   String Matching Algorithms specialized for IDS
Takashi Imaizumi (Chiba Univ.), Keisuke Mizuno (Nara Inst. of S and T) SITE2008-62 IA2008-85
While we use intrusion detection system, we can not be free from false positive alerts. In other words, there is little... [more] SITE2008-62 IA2008-85
pp.107-112
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:45
Fukuoka Fukuoka Institute of System LSI Design Industry A Proposal of Intrusion Detection using Third-parties Support
Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2008-37
Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies ... [more] ISEC2008-37
pp.15-22
NS, IN
(Joint)
2008-03-07
08:15
Okinawa Bankoku Shinryokan Evaluation of Manager-Based Architecture for Intrusion Detection System in Ad Hoc Networks
Muhammad Arifin Ritonga, Masaya Nakayama (Univ. of Tokyo) NS2007-181
Ad hoc network faces more security problems that we need to deploy intrusion detection system in this network. However, ... [more] NS2007-181
pp.279-284
IN 2007-12-14
13:30
Hiroshima Hiroshima City University A Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads
Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-114
Internet worms are one of the most serious threats in the Internet. For accurately detecting newly created worms, we hav... [more] IN2007-114
pp.91-96
ISEC, SITE, IPSJ-CSEC 2006-07-20
13:25
Okayama Okayama Univ. IDS for SSL Enncrypted Web Traffic
Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.)
The threat of attacks on web applications, such as SQL injection and cross site scripting, remains a serious problem. Th... [more] ISEC2006-32 SITE2006-29
pp.167-173
ISEC, IPSJ-CSEC, SITE 2005-07-21
09:55
Iwate Iwate Prefectural University A Study on Implementation of the Worm Prevention System Following the Infection Process
Shusuke Maeda, Tatsuya Baba, Hisamichi Ohtani, Masataka Kado, Tsutomu Inada (NTT DATA)
The network incidents caused by Internet worms are increasing every year. Infection of worms that exploit the vulnerabil... [more] ISEC2005-10 SITE2005-8
pp.7-14
ISEC, IPSJ-CSEC, SITE 2005-07-21
11:35
Iwate Iwate Prefectural University A Note of Intrusion Detection using Alteration of Data
Fumiaki Nagano, Kohei Tatara (Kyushu Univ.), Toshihiro Tabata (Okayama Univ), Kouichi Sakurai (Kyushu Univ.)
These days, Attacks which alter data in memory illegally are one of the most serious security threats.Although a lot of ... [more] ISEC2005-14 SITE2005-12
pp.37-44
NS 2005-04-21
14:25
Aichi Nanzan-Univ. Design and Implementation of Anomaly Detection System with Classified Packet Counting
Kunio Goto, Koji Kojima (Nanzan Univ.)
In this research, practical application for quasi-realtime intrusion and network failure detection was designed and impl... [more] NS2005-4
pp.13-16
ICM 2005-03-11
15:45
Okinawa Ishigaki City Hall Study of a distributed processing type intrusion detection system method
Takao Kurahashi, Teruyuki Soba, Kazuo Kitamura (NTT SL Lab.)
Recently, IDS(Intrusion Detection System) is paid to attention as a security system to diversified unlawful computer acc... [more] TM2004-114
pp.73-77
ISEC, IPSJ-CSEC 2004-07-20
11:35
Tokushima Tokushima Univ. Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka (KDDI Labs.)
Although many anomaly detection systems based on learning algorithms
have been proposed to detect unknown attacks or v... [more]
ISEC2004-31
pp.119-126
 Results 41 - 57 of 57 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan