Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:05 |
Hokkaido |
San-Refure Hakodate |
Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 |
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] |
ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 pp.75-80 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:40 |
Hokkaido |
San-Refure Hakodate |
Cryptanalysis of a matrix variant of NTRU Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 |
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] |
ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 pp.239-246 |
SITE, IPSJ-CE, IPSJ-CLE |
2013-12-15 13:25 |
Okinawa |
Ryukyu Univ. |
Dynamic Hybrid System of Honeypot and IDS for Network Security Analysis Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-55 |
The development of information technology has come hand-in-hand with various security problems that are becoming increas... [more] |
SITE2013-55 pp.157-161 |
SWIM |
2013-11-29 13:50 |
Kanagawa |
Tokyo Polytechnic University |
A Study about Cyber Attack Detection System using Machine Learning Tadashi Ogino (Okinawa National College of Technology) SWIM2013-13 |
The network intrusion is becoming a big thread for a lot of companies, organization and so on. Many of today’s intrusion... [more] |
SWIM2013-13 pp.9-14 |
OCS, OFT, ITE-BCT, IEE-CMN (Joint) [detail] |
2013-11-21 15:15 |
Niigata |
Nagaoka University of Technology |
Polarization rotation of a light emitted from a vibrating optical fiber curl cord fixed at several points and its application to intrusion location Akihiro Mizushima, Mitsuhiro Tateda (Chiba Univ.) OFT2013-39 |
When a hole assisted fiber curl cord expands and contracts, the polarization direction of the light emitted from it rota... [more] |
OFT2013-39 pp.13-18 |
AP, SAT (Joint) |
2013-07-25 14:30 |
Hokkaido |
Sun Refre Hakodate |
Study on Antenna Arrangement for MIMO Sensor in Outdoor Environment Keita Konno, Naoki Honma (Iwate Univ.), Kentaro Nishimori (Niigata Univ.), Yoshitaka Tsunekawa (Iwate Univ.) AP2013-57 |
In this report, we investigate the use of the intrusion-detection MIMO (Multiple-Input Multiple-Output) sensor in the ou... [more] |
AP2013-57 pp.59-64 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:55 |
Nara |
Todaiji Total Cultural Center |
A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
SITE2012-52 IA2012-90 pp.43-48 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 11:15 |
Nara |
Todaiji Total Cultural Center |
Proposal of Active IDS by Risk Level Probe Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-64 IA2012-102 |
Intrusion Detection System (IDS) is a security system in order to detect illegal access by checking the status of a comp... [more] |
SITE2012-64 IA2012-102 pp.169-174 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB [detail] |
2013-03-14 14:05 |
Nagasaki |
|
Development of High Speed Network Intrusion Detection System with High Scalability Using High-performance FPGA Mamoru Sekiyama, Kenji Toda, Tetsuo Kotoku (AIST) CPSY2012-96 DC2012-102 |
We developed intrusion detection system (IDS) , that uses pattern matching circuit for Snort rules, on a high-performanc... [more] |
CPSY2012-96 DC2012-102 pp.265-269 |
SANE, SAT (Joint) |
2013-02-21 17:40 |
Okinawa |
Youth Center of Okinawa prefecture |
On Detection Performance of MIMO Security Sensor System for Indoor Intrusion Detection Ken Ogawa, Hiroyoshi Yamada, Yoshio Yamaguchi (Niigata Univ.) SANE2012-154 |
Recently, researches on radio wave security sensors by using array antenna or MIMO have been attracting attention.In the... [more] |
SANE2012-154 pp.31-36 |
SITE |
2012-12-12 14:00 |
Osaka |
|
Trend and ethical problem of the honeypot Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45 |
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more] |
SITE2012-45 pp.13-18 |
IA |
2012-11-19 17:10 |
Fukushima |
Kanponoyado Iwaki (Fukushima) |
Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
IA2012-56 pp.23-28 |
DC, CPSY (Joint) |
2012-08-02 14:30 |
Tottori |
Torigin Bunka Kaikan |
Application Authentication System on Untrusted OS Tsuyoshi Yamada, Masahiro Goshima, Shuichi Sakai (UT) CPSY2012-11 |
In order to prevent the information which an application deal from leakage, it is necessary to verify that following thr... [more] |
CPSY2012-11 pp.13-18 |
NS, IN (Joint) |
2012-03-09 10:10 |
Miyazaki |
Miyazaki Seagia |
Sensor Location Problem for Intruder Detection Yuta Nakazono, Hiroyoshi Miwa (Kwansei Gakuin Univ.) IN2011-162 |
With the advancement of sensor network technology, sensor network systems are expected to be used for border security an... [more] |
IN2011-162 pp.151-156 |
VLD |
2012-03-07 11:10 |
Oita |
B-con Plaza |
Implmentation of Look-ahead Assertion for Pattern-independent Regular Expression Matching Engine Yoichi Wakaba, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) VLD2011-136 |
In this paper, we propose a look-ahead assertion matching method for regular expression matching hardware engine. In net... [more] |
VLD2011-136 pp.97-102 |
IN, IA (Joint) |
2011-12-16 12:50 |
Hiroshima |
Hiroshima City University |
Overlay Based, Distributed Defense-Framework against DDoS Attacks Mohamad Eid, Hitoshi Aida (Univ. of Tokyo) IA2011-51 |
The World Wide Web plays vital roles in our daily lives. But cyber-attackers abuse this vitality by threatening web serv... [more] |
IA2011-51 pp.37-42 |
AP, SAT (Joint) |
2011-07-15 13:25 |
Nagano |
Fac. Eng., Shinshu Univ. |
Experimental Study on Channe lModel of MIMO Sensor for Event Detection Akira Kumakura, Hiroyoshi Yamada, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) AP2011-42 |
In recent years, researches on radio security sensors by using array antenna or MIMO system has been attracting attentio... [more] |
AP2011-42 pp.87-90 |
AP, SAT (Joint) |
2011-07-15 13:50 |
Nagano |
Fac. Eng., Shinshu Univ. |
Performance Evaluation of Environment Change Detection method Using MIMO Sensor Ken Ogawa, Hiroyoshi Yamada, Yuta Kurosaki, Yoshio Yamaguchi (Niigata Univ) AP2011-43 |
Recently, several indoor intrusion/event detection methods using radio propagation change have been proposed. One of the... [more] |
AP2011-43 pp.91-95 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 15:00 |
Shizuoka |
Shizuoka University |
Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses Shunichi Mizoguchi, Hiroyuki Inaba (KIT) ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11 |
Recently, illegal access to network is increasing. Therefore the importance of a network intrusion detection system (IDS... [more] |
ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11 pp.19-24 |
SIS |
2011-06-09 11:00 |
Okinawa |
Ishigaki Health & Wellness Center |
A Study on Detection Accuracy for Intruder Detection System Using Leaky Coaxial Cable Tomonori Sato, Minoru Okada (NAIST) SIS2011-4 |
Recently, there has been an increasing demand for wide-area intruder detection systems for security purposes.
LCX(Leaky... [more] |
SIS2011-4 pp.15-20 |