Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SR |
2019-12-05 13:50 |
Okinawa |
Ishigaki City Hall (Ishigaki Island) |
[Poster Presentation]
Performance Evaluation of Secure Wireless Communications for PLNC with Untrusted Relay by Double-objective Optimization Problem Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) SR2019-88 |
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] |
SR2019-88 pp.15-22 |
SeMI, IPSJ-ITS, IPSJ-MBL, IPSJ-DPS |
2019-05-24 11:50 |
Kagoshima |
Amami-shi Syakai Fukushi Center |
Impact Detection for Polyethylene Net Animal Guard Fencing Takuya Kato, Izuru Nogaito, Eiji Utsunomiya (KDDI Research, Inc.) SeMI2019-13 |
Animal guard fencing is a way of the effective prevention of harmful wild animals which cause nearly twenty billion yen ... [more] |
SeMI2019-13 pp.177-181 |
IT, ISEC, WBS |
2019-03-07 10:20 |
Tokyo |
University of Electro-Communications |
Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research) IT2018-77 ISEC2018-83 WBS2018-78 |
The machine-translated text is playing an important role in modern life which establishes wide communication among vario... [more] |
IT2018-77 ISEC2018-83 WBS2018-78 pp.13-19 |
RCS, SR, SRW (Joint) |
2019-03-08 13:45 |
Kanagawa |
YRP |
Consideration of security for PLNC with Untrusted Relay by double-objective optimization problem Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) RCS2018-335 |
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] |
RCS2018-335 pp.279-284 |
IN, NS (Joint) |
2019-03-04 09:00 |
Okinawa |
Okinawa Convention Center |
Intrusion Detection System using semi-supervised learning with Adversarial Autoencoder Kazuki Hara, Kohei Shiomoto (Tokyo City Univ.) NS2018-193 |
In recent years the importance of intrusion detection system(IDS) is increasing. In particular, a method using machine l... [more] |
NS2018-193 pp.1-6 |
IN, NS, CS, NV (Joint) |
2018-09-07 09:20 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Consideration of Evaluation Dataset for Malware Detection System Hisashi Takahara (UNP) IN2018-33 |
Today, while internet cyber-attacks are increasing, protection against the cyber-attacks have become indispensable. Amon... [more] |
IN2018-33 pp.65-69 |
SITE, IPSJ-EIP |
2018-06-01 14:45 |
Kanagawa |
|
Implementation and Evaluation of Intrusion Detection System for Malicious PC by Sensor Hosts Hiroaki Kuno, Satoshi Kimura, Hiroyuki Inaba (KIT) SITE2018-4 |
In recent years, Intrusion Detection System(IDS) is not able to catch the unknown attack
as malware and its variant ar... [more] |
SITE2018-4 pp.95-99 |
VLD, HWS (Joint) |
2018-02-28 09:55 |
Okinawa |
Okinawa Seinen Kaikan |
On Memory Size Reduction of Programmable Hardware for Random Forest based Network Intrusion Detection Binbin Xue, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) VLD2017-90 |
In our previous research, we proposed dedicated programmable hardware of random forest based NIDSs. In this research, we... [more] |
VLD2017-90 pp.7-12 |
SIP, CAS, MSS, VLD |
2017-06-19 11:40 |
Niigata |
Niigata University, Ikarashi Campus |
An Implementation Method of Reconfigurable Network Intrusion Detection Systems Based on Random Forests Binbin Xue, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) CAS2017-7 VLD2017-10 SIP2017-31 MSS2017-7 |
In this paper, we propose an implementation method of reconfigurable network intrusion detection system based on random ... [more] |
CAS2017-7 VLD2017-10 SIP2017-31 MSS2017-7 pp.37-42 |
NLP |
2017-05-12 11:00 |
Okayama |
Okayama University of Science |
Investigation of Fast Construction for Intrusion Detection System using Multi-Layer Extreme Learning Machine. Daichi Noguchi, Masaharu Adachi (Tokyo Denki Univ.) NLP2017-18 |
Recently, there are incremental threats of cyber security for holding the Olympic Games in Tokyo in 2020. The fast const... [more] |
NLP2017-18 pp.87-92 |
IA, SITE, IPSJ-IOT [detail] |
2017-03-03 14:50 |
Okinawa |
Culture Resort Festone (Okinawa) |
Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage Masumi Uno (NAIST), Masahiro Ishii (Tokyo Tech), Atsuo Inomata (TDU), Ismail Arai, Kazutoshi Fujikawa (NAIST) SITE2016-68 IA2016-98 |
Confidential information have been leaked accidentally by targetted attacks by targeted attacks.
Remote Access Trojan/t... [more] |
SITE2016-68 IA2016-98 pp.41-46 |
VLD |
2017-03-02 09:00 |
Okinawa |
Okinawa Seinen Kaikan |
Generation of Optimum Screening Patterns for a Screening Circuit to Detect Network Intrusion Tomoaki Hashimoto, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) VLD2016-108 |
In our previous study, we proposed a dedicated circuit, called a screening circuit, that screens packes on a network at ... [more] |
VLD2016-108 pp.37-42 |
ICSS |
2016-11-25 15:20 |
Kanagawa |
Institute of Information Security |
Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42 |
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] |
ICSS2016-42 pp.21-26 |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55 |
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] |
ICSS2015-55 pp.47-52 |
ISEC, IT, WBS |
2015-03-02 10:55 |
Fukuoka |
The University of Kitakyushu |
A Consideration of NTRU Whose Modular Polynomial Is All One Polynomial Koki Misumi, Yasuyuki Nogami (Okayama Univ) IT2014-63 ISEC2014-76 WBS2014-55 |
Quantum computer will break most of recent public key cryptosystems by Shor's algorithm.
Post-quantum cryptosystem whic... [more] |
IT2014-63 ISEC2014-76 WBS2014-55 pp.5-10 |
SIP, RCS |
2015-01-23 11:55 |
Okayama |
Okayama Univ. |
Secure Cooperation Scheme Using Fountain codes to Resist Untrustworthy Relay Hao Niu, Tiantian Jiang, Masaki Ito, Kaoru Sezaki (Univ. of Tokyo) SIP2014-106 RCS2014-294 |
Physical layer security, which exploits wireless channel fading to realize secure transmission, has been an emerging res... [more] |
SIP2014-106 RCS2014-294 pp.147-150 |
IBISML |
2014-11-17 17:00 |
Aichi |
Nagoya Univ. |
[Poster Presentation]
Training Algorithm for Restricted Boltzmann Machines Using Auxiliary Function Approach Norihiro Takamune (Univ. of Tokyo), Hirokazu Kameoka (Univ. of Tokyo/NTT) IBISML2014-56 |
Layerwise pre-training is one of important elements for deep learning, and Restricted Boltzmann Machines (RBMs) is popul... [more] |
IBISML2014-56 pp.161-168 |
CPSY |
2014-11-13 14:25 |
Hiroshima |
Hiroshima University |
A Note on Survivability Analysis for VM-Based Intrusion Tolerant System Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) CPSY2014-58 |
Survivability is the capability of a system to perform intended functions at a given instant in time after a subset of c... [more] |
CPSY2014-58 pp.25-30 |
CS, NS, IN (Joint) |
2014-09-12 13:25 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Detection of Malicious Database Queries based on Matching with HTTP Requests Yuichi Sudo, Takahiro Hamada, Yuichi Murata, Hideo Kitazume (NTT) IN2014-65 |
If an attacker takes over a Web server by vulnerability attack or fraud login and so on, the attacker can control the se... [more] |
IN2014-65 pp.99-104 |
MICT, WBS |
2014-07-29 15:05 |
Osaka |
Osaka City Univ. (Umeda Satellite) |
[Encouragement Talk]
Indoor Intruder Detection Sensor System using Ultra-Wideband Stepped-FM Scheme Ryohei Nakamura (National Defense Academy) WBS2014-25 MICT2014-39 |
Home security sensor becomes more and more practical today for the protection against intruder, and several types of wir... [more] |
WBS2014-25 MICT2014-39 pp.89-94 |