IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 34 of 34 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2013-10-10
14:00
Overseas Konkuk Univ., Seoul Proposal of a Network Control System to Detect, Analyze and Mitigate Targeted Cyber Attacks
Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2013-26
Recently, targeted cyber attacks have been so sophisticated that we cannot detect them at early stage of intrusion.
The... [more]
IA2013-26
pp.1-6
IA, ICSS 2013-06-20
13:45
Niigata Ao-re Nagaoka [Invited Talk] Threats posed by High-Perfomance Information Devices Designed for Home
Hiroki Takakura (Nagoya Univ.) IA2013-2 ICSS2013-2
 [more] IA2013-2 ICSS2013-2
pp.7-12
IA, ICSS 2013-06-21
13:00
Niigata Ao-re Nagaoka Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet
Soshi Hirono (Nagoya Univ.), Kenji Ohira (NAIST), Yukiko Yamaguchi (Nagoya Univ.), Hirofumi Yamaki (Tokyo Denki Univ.), Hiroki Takakura (Nagoya Univ.) IA2013-12 ICSS2013-12
In dynamic malware analysis, we cannot obtain sufficient results of malware analysis without Internet connectivity. How... [more] IA2013-12 ICSS2013-12
pp.67-72
ICSS 2012-11-22
14:30
Hiroshima Miyajima Mori-no-Yado Proposal of a network design support system for risk mitigation against inside attacks
Hirokazu Hasegawa (Nagoya Univ.), Ray Atarashi (IIJ-II), Masahiko Kato (IIJ), Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura (Nagoya Univ.) ICSS2012-51
In sophisticated cyber attacks, even information protected by an isolated network is compromised. Although there are var... [more] ICSS2012-51
pp.37-42
IA 2012-10-18
16:30
Overseas Phuket A lightweight method to discriminate spamming hosts by periodically changing DNS response
Naoya Kitagawa, Hiroki Takakura (Nagoya Univ.), Tsunehiko Suzuki (Chukyo Univ.) IA2012-39
With widespread of IPv6 usage, current anti-spam techniques which depend on reputations of IP address are losing their a... [more] IA2012-39
pp.31-35
IA 2012-10-19
16:30
Overseas Phuket Transparent Server Migration between Datacenters by Utilizing OpenFlow
Tatsuya Fukushima, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-50
For disaster mitigation, mechanisms that restore network service swiftly have drawn attention.
For the swiftness, host... [more]
IA2012-50
pp.95-100
IA 2011-11-29
09:25
Hokkaido Greenpia Onuma (Hakodate) Development of Authentication Infrastructure for Tokai Academic Cloud Using Shibboleth and CAS
Shoji Kajita (Kyoto Univ.), Shoichi Saito (Nagoya Inst. of Tech.), Masatoshi Tsuchiya (Toyohashi Univ. of Tech.), Daisuke Yamamoto (Nagoya Inst. of Tech.), Tsunehiko Suzuki (Chukyo Univ.), Yukiko Yamaguchi (Nagoya Univ.), Takahiro Hasegawa (Shizuoka Univ.), Akiumi Hasegawa (Chukyo Univ.), Akiji Tanaka, Yuichi Uchida (Gifu Univ.), Ichiro Mitsuhashi, Yoshimasa Ohta (Mie Univ.), Hiroki Takakura (Nagoya Univ.), Hiroshi Matsuo (Nagoya Inst. of Tech.) IA2011-44
This paper describes the current status of Authentication Infrastructure for Tokai Academic Cloud. Currently we have bee... [more] IA2011-44
pp.49-53
IA 2011-10-21
14:00
Overseas Dalian University of Technology (Dalian, China) Current Status of Nagoya University Survivor Confirmation System and Lessons Learned from Great East Japan Earthquake
Shoji Kajita, Yoshihiro Ohta, Kenji Ohira, Hisanori Tajima, Satoshi Ishiguro, Jun Tobita, Hiroki Takakura, Yoshito Itoh (Nagoya Univ.) IA2011-33
Nagoya University has been stepwisely developing a home-grown survivor confirmation system on top of Nagoya University P... [more] IA2011-33
pp.45-50
IA 2010-11-24
17:45
Yamanashi Seisen-Ryo Construction of high performance network intrusion system
Moriteru Ishida (Kyoto Univ.), Hiroki Takakura (Nagoya Univ.), Yasuo Okabe (Kyoto Univ.) IA2010-56
Intrusion detection systems(IDSs) are equipments important to network security. Recently, there’s been an increase in re... [more] IA2010-56
pp.31-36
IA 2009-11-25
16:00
Saga Saga-Ken An analysis of IDS alerts to grasp attack situation in the third party's network
Kensuke Nakata, Hiroki Takakura, Yasuo Okabe (Kyoto Univ) IA2009-62
To fight against emerging cyber attacks on Internet,
various types of security solutions have been proposed.
As one ... [more]
IA2009-62
pp.25-30
ICSS 2009-05-15
15:10
Hyogo Kobe University Investigation of Spam Mail Driven Web-Based Passive Attack
Yuhei Kawakoya, Mitsuaki Akiyama, Kazufumi Aoki, Mitsutaka Itoh (NTT), Hiroki Takakura (Kyoto Univ) ICSS2009-5
In recent years, the number of web-based passive attacks which are driven by URLs included in spam mail is increasing. B... [more] ICSS2009-5
pp.21-26
IA 2007-01-19
11:25
Hiroshima International Conference Center Hiroshima Analysis and Visualization of Network IDS Data Using Machine Learning
Hayato Ohba, JungSuk Song, Hiroki Takakura, Yasuo Okabe (Kyoto Univ.) IA2006-36
In this paper, we clarify the differences between both datasets by using the log data of an IDS deployed in Kyoto Univer... [more] IA2006-36
pp.31-36
IA 2006-05-24
10:50
Kyoto Campus Plaza Kyoto A Construction Method of a Honeypot System to Safely Collect Unknown Malicious Codes
Kenji Ohira, JungSuk Song, Hiroki Takakura, Yasuo Okabe (Kyoto Univ.) IA2006-1
It is considered that an attacker tests his attacking codes by sending them to randomly selected nodes in the Internet.
... [more]
IA2006-1
pp.1-6
IA 2006-01-20
11:30
Miyagi Sendai International Center Analyzing traffic directed to unused IP address blocks
Kazuya Suzuki, Shunsuke Baba (Yokogawa Electric Corp.), Hiroki Takakura (Kyoto Univ.)
In network security, it is very important to detect a security incident such as scanning activity, which often is a prec... [more] IA2005-23
pp.25-30
 Results 21 - 34 of 34 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan