IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 42  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, NS
(Joint)
2023-03-03
09:50
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Cyber-Attack Detection Method for Closed Network -- A study of the detection technique of network-bridged equipment --
Nobuyuki Nakamura (OKI) IN2022-100
Cyber-Attacks in closed network occur recently. As closed network is not connected to the internet and may contain equip... [more] IN2022-100
pp.205-210
MSS, NLP 2022-03-29
10:45
Online Online A proposal of method for defending against cyber attacks by combining honeypots and IPS
Yudai Yamamoto, Shingo Yamaguchi (Yamaguchi Univ.) MSS2021-71 NLP2021-142
We propose a defense system that makes it possible to detect and prevent attacks targeting web applications and IoT devi... [more] MSS2021-71 NLP2021-142
pp.83-88
IN, NS, CS, NV
(Joint)
2021-09-09
14:05
Online Online A Machine Learning Based Network Intrusion Detection System with Appling Different Algorithms in Multiple Stages
Seiichi Sasa, Hiroyuki Suzuki, Akio Koyama (Yamagata Univ.) NS2021-63
In recent years, the rapid development of Information and Communication Technology (ICT) has led to the provision of a w... [more] NS2021-63
pp.36-41
IA, ICSS 2021-06-22
09:50
Online Online Etherpot: A honeypot for observing cyberattacks on Ethereum client
Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] IA2021-11 ICSS2021-11
pp.56-61
ICSS, IPSJ-SPT 2020-03-03
09:50
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] ICSS2019-85
pp.103-108
NS, ICM, CQ, NV
(Joint)
2019-11-21
16:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Trends and Countermeasures of Cyber Attacks -- Introduction to Cyber Security for Network Engineers --
Yukiko Yano (NEC) CQ2019-93
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] CQ2019-93
p.27
AI 2019-07-22
16:30
Hokkaido   Modeling of Cyber Attack Based on POMDP
Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] AI2019-15
pp.77-82
CS, CQ
(Joint)
2019-04-18
09:20
Osaka Osaka Univ. Library Dynamic Redundancy Switching Method of Network Paths for Tamper-Tolerant Networked Control
Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CS2019-1
According to the growing of information and communication technology (ICT), various kinds of things are connected to the... [more] CS2019-1
pp.1-6
ICSS 2018-11-21
16:05
Kagoshima   [Invited Talk] Security Countermeasure at ShowNet in Interop Tokyo 2018
Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) ICSS2018-59
Cyber attacks become emerging threats on the Internet.We held an exhibition in ICT called Interop Tokyo every June. In t... [more] ICSS2018-59
p.37
SITE, ISEC, LOIS 2018-11-04
11:00
Fukuoka   Development of named entity recognition and polarity analysis function for security incidents.
Shinta Nakano, Daisuke Uto, Yuichiro Kurosawa, Masaki Hanada, Yoichi Murakami, Eiji Nunohiro (TUIS) ISEC2018-74 SITE2018-52 LOIS2018-34
The authors focused on analyzing the information related to security incidents from articles on news sites published on ... [more] ISEC2018-74 SITE2018-52 LOIS2018-34
pp.57-62
NS, OCS, PN
(Joint)
2018-06-14
13:00
Fukushima Koriyama-Shoko-Kaigisho [Invited Talk] Cyber security defense techniques for IoT systems
Hiroaki Mukai, Testuya Yokotani (KIT) NS2018-27 OCS2018-10 PN2018-10
n recent years, with the development of AI technology, IoT technique is adopted in various fields such as plant, logisti... [more] NS2018-27 OCS2018-10 PN2018-10
p.1(NS), p.1(OCS), p.37(PN)
NS, IN
(Joint)
2018-03-02
14:40
Miyazaki Phoenix Seagaia Resort Development of an Emulation System for Autonomous and Distributed Internet Security Infrastructure
Masaya Shimode, Tomohiro Akasaki, Hiroyuki Kimiyama, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-236
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" for protecting our resources on the Inte... [more] NS2017-236
pp.385-390
NS, IN
(Joint)
2018-03-02
15:00
Miyazaki Phoenix Seagaia Resort Distributed High-Speed Packet Filtering System for Autonomous and Distributed Internet Security Infrastructure
Hiroyuki Kimiyama, Yuya Kishi, Haruka Momo, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-237
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to
protect our resources ... [more]
NS2017-237
pp.391-396
NS, IN
(Joint)
2018-03-02
15:20
Miyazaki Phoenix Seagaia Resort Method for Generating a Data Set to Detect Cyber Attacks for Autonomous and Distributed Internet Security Infrastructure
Yusei Katsura, Hiroyuki Kimiyama (Tokyo Denki Univ.), Akihiro Nakao (Tokyo Univ.), Naoki Yonezaki, Tomoaki Tsutsumi, Kaoru Sano (Tokyo Denki Univ.), Takeshi Okamoto, Mitsuru Maruyama (Kanagawa Institutes of Technology), Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-238
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to protect our resources on... [more] NS2017-238
pp.397-401
IA, IN
(Joint)
2017-12-15
14:10
Hiroshima Hiroshima City Univ. A study of gini importance-based header feature selection methods for cyber attack detection
Yuta Kazato, Yuichi Nakatani, Takeshi Okamoto, Akira Shibata (NTT) IN2017-61
Growing the expansion of network services and IoT devices, the risk of cyber attacks is increased by high-frequency and ... [more] IN2017-61
pp.91-96
ICTSSL 2017-07-13
15:40
Kagawa Kagawa Univ. A think of Correspondence Exercise Management at the Multiple Organizations' Emergency Management of Widespread Cyber-attack using information sharing system -- Application of Comprehensive Emergency Management Support System,"KADAN(R)" --
Yoshihiro Yoshida, Koji Kishi, Tsuneko Kura, Naoko Kosaka (NTT) ICTSSL2017-23
In crisis response work in the cyber field of large scale and multiple organizations, efficient information gathering an... [more] ICTSSL2017-23
pp.33-38
ICSS, IPSJ-SPT 2017-03-13
16:40
Nagasaki University of Nagasaki Primary Discussion about a Honeypot System for IoT Aimed Protocols
Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] ICSS2016-57
pp.103-108
ISEC, WBS, IT 2017-03-10
16:00
Tokyo TOKAI University Development of Security Incident Symptomatic Analysis function in SIAS
Mitsumu Katsuno, Hiroki Sakamoto, Hiroyuki Ookawa, Takashi Yamaguchi, Eiji Nunohiro (TUIS), Akira Orita, Tatsuya Sekiguchi (HISYS.ISR) IT2016-134 ISEC2016-124 WBS2016-110
(To be available after the conference date) [more] IT2016-134 ISEC2016-124 WBS2016-110
pp.223-228
NS, IN
(Joint)
2017-03-03
14:50
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL Attack Blocking Method on Autonomous and Distributed Security Infrastructure for the Internet
Hiroyuki Kimiyama, Ken Eguchi, Tomoaki Tsutsumi, Kaori Sano, Hirohumi Yamaki, Yoichiro Ueno, Naoki Yonesaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2016-251
Cyber attacks on network connected equipment, such as servers, PCs, IoTs and so on, will never be ended. Over 600Gbit/s ... [more] NS2016-251
pp.541-546
IA, IN
(Joint)
2016-12-15
16:20
Hiroshima Hiroshima city university Generation of Dropping Request Message by Identifying Source Addresses and Attributes of Attacking Packets
Mamoru Yogosawa, Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Tsuyoshi Ishikawa, Teruaki Tsutsumi, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno, Hiroyuki Kimiyama, Naoki Yonezaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) IA2016-69
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. It naturally lead us to switching ... [more] IA2016-69
pp.35-40
 Results 1 - 20 of 42  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan