IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 84 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:05
Hokkaido San-Refure Hakodate Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16
pp.75-80
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:40
Hokkaido San-Refure Hakodate Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
pp.239-246
SITE, IPSJ-CE, IPSJ-CLE 2013-12-15
13:25
Okinawa Ryukyu Univ. Dynamic Hybrid System of Honeypot and IDS for Network Security Analysis
Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-55
The development of information technology has come hand-in-hand with various security problems that are becoming increas... [more] SITE2013-55
pp.157-161
SWIM 2013-11-29
13:50
Kanagawa Tokyo Polytechnic University A Study about Cyber Attack Detection System using Machine Learning
Tadashi Ogino (Okinawa National College of Technology) SWIM2013-13
The network intrusion is becoming a big thread for a lot of companies, organization and so on. Many of today’s intrusion... [more] SWIM2013-13
pp.9-14
OCS, OFT, ITE-BCT, IEE-CMN
(Joint) [detail]
2013-11-21
15:15
Niigata Nagaoka University of Technology Polarization rotation of a light emitted from a vibrating optical fiber curl cord fixed at several points and its application to intrusion location
Akihiro Mizushima, Mitsuhiro Tateda (Chiba Univ.) OFT2013-39
When a hole assisted fiber curl cord expands and contracts, the polarization direction of the light emitted from it rota... [more] OFT2013-39
pp.13-18
AP, SAT
(Joint)
2013-07-25
14:30
Hokkaido Sun Refre Hakodate Study on Antenna Arrangement for MIMO Sensor in Outdoor Environment
Keita Konno, Naoki Honma (Iwate Univ.), Kentaro Nishimori (Niigata Univ.), Yoshitaka Tsunekawa (Iwate Univ.) AP2013-57
In this report, we investigate the use of the intrusion-detection MIMO (Multiple-Input Multiple-Output) sensor in the ou... [more] AP2013-57
pp.59-64
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:55
Nara Todaiji Total Cultural Center A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] SITE2012-52 IA2012-90
pp.43-48
IA, SITE, IPSJ-IOT [detail] 2013-03-15
11:15
Nara Todaiji Total Cultural Center Proposal of Active IDS by Risk Level Probe
Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-64 IA2012-102
Intrusion Detection System (IDS) is a security system in order to detect illegal access by checking the status of a comp... [more] SITE2012-64 IA2012-102
pp.169-174
CPSY, DC, IPSJ-SLDM, IPSJ-EMB [detail] 2013-03-14
14:05
Nagasaki   Development of High Speed Network Intrusion Detection System with High Scalability Using High-performance FPGA
Mamoru Sekiyama, Kenji Toda, Tetsuo Kotoku (AIST) CPSY2012-96 DC2012-102
We developed intrusion detection system (IDS) , that uses pattern matching circuit for Snort rules, on a high-performanc... [more] CPSY2012-96 DC2012-102
pp.265-269
SANE, SAT
(Joint)
2013-02-21
17:40
Okinawa Youth Center of Okinawa prefecture On Detection Performance of MIMO Security Sensor System for Indoor Intrusion Detection
Ken Ogawa, Hiroyoshi Yamada, Yoshio Yamaguchi (Niigata Univ.) SANE2012-154
Recently, researches on radio wave security sensors by using array antenna or MIMO have been attracting attention.In the... [more] SANE2012-154
pp.31-36
SITE 2012-12-12
14:00
Osaka   Trend and ethical problem of the honeypot
Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more]
SITE2012-45
pp.13-18
IA 2012-11-19
17:10
Fukushima Kanponoyado Iwaki (Fukushima) Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] IA2012-56
pp.23-28
DC, CPSY
(Joint)
2012-08-02
14:30
Tottori Torigin Bunka Kaikan Application Authentication System on Untrusted OS
Tsuyoshi Yamada, Masahiro Goshima, Shuichi Sakai (UT) CPSY2012-11
In order to prevent the information which an application deal from leakage, it is necessary to verify that following thr... [more] CPSY2012-11
pp.13-18
NS, IN
(Joint)
2012-03-09
10:10
Miyazaki Miyazaki Seagia Sensor Location Problem for Intruder Detection
Yuta Nakazono, Hiroyoshi Miwa (Kwansei Gakuin Univ.) IN2011-162
With the advancement of sensor network technology, sensor network systems are expected to be used for border security an... [more] IN2011-162
pp.151-156
VLD 2012-03-07
11:10
Oita B-con Plaza Implmentation of Look-ahead Assertion for Pattern-independent Regular Expression Matching Engine
Yoichi Wakaba, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) VLD2011-136
In this paper, we propose a look-ahead assertion matching method for regular expression matching hardware engine. In net... [more] VLD2011-136
pp.97-102
IN, IA
(Joint)
2011-12-16
12:50
Hiroshima Hiroshima City University Overlay Based, Distributed Defense-Framework against DDoS Attacks
Mohamad Eid, Hitoshi Aida (Univ. of Tokyo) IA2011-51
The World Wide Web plays vital roles in our daily lives. But cyber-attackers abuse this vitality by threatening web serv... [more] IA2011-51
pp.37-42
AP, SAT
(Joint)
2011-07-15
13:25
Nagano Fac. Eng., Shinshu Univ. Experimental Study on Channe lModel of MIMO Sensor for Event Detection
Akira Kumakura, Hiroyoshi Yamada, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) AP2011-42
In recent years, researches on radio security sensors by using array antenna or MIMO system has been attracting attentio... [more] AP2011-42
pp.87-90
AP, SAT
(Joint)
2011-07-15
13:50
Nagano Fac. Eng., Shinshu Univ. Performance Evaluation of Environment Change Detection method Using MIMO Sensor
Ken Ogawa, Hiroyoshi Yamada, Yuta Kurosaki, Yoshio Yamaguchi (Niigata Univ) AP2011-43
Recently, several indoor intrusion/event detection methods using radio propagation change have been proposed. One of the... [more] AP2011-43
pp.91-95
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-12
15:00
Shizuoka Shizuoka University Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses
Shunichi Mizoguchi, Hiroyuki Inaba (KIT) ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11
Recently, illegal access to network is increasing. Therefore the importance of a network intrusion detection system (IDS... [more] ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11
pp.19-24
SIS 2011-06-09
11:00
Okinawa Ishigaki Health & Wellness Center A Study on Detection Accuracy for Intruder Detection System Using Leaky Coaxial Cable
Tomonori Sato, Minoru Okada (NAIST) SIS2011-4
Recently, there has been an increasing demand for wide-area intruder detection systems for security purposes.
LCX(Leaky... [more]
SIS2011-4
pp.15-20
 Results 41 - 60 of 84 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan