IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 61 - 74 of 74 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2015-03-04
11:15
Okinawa Meio Univiersity A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis
Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-81
The integrated malware detection service is a web service that analyzes suspicious files, domains and URLs which are pos... [more] ICSS2014-81
pp.109-114
ICSS 2015-03-04
12:05
Okinawa Meio Univiersity Finding Network Address Blocks Intensively Used for Cyber Attacks
Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-83
Recently, cyber attacks have diversified on Internet, so immediate actions are required for them. In this report, we poi... [more] ICSS2014-83
pp.121-126
ICSS 2014-11-27
14:20
Miyagi Tohoku Gakuin University (Tagajo Campus) Dynamic Zoning of the Industrial Control System for Security improvement
Wataru Machii, Isao Kato, Masahito Koike, Masafumi Matta, Tomomi Aoyama, Ichiro Koshijima, Yoshihiro Hashimoto (NIT) ICSS2014-52
In the previous paper, our authors proposed a design methodology of zones and conduits not only to isolate incidents cau... [more] ICSS2014-52
pp.7-12
IA 2014-11-06
15:30
Overseas Thailand Network Access Control by FPGA-Based Network Switch using HW/SW Cooperated IDS
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2014-52
In recent years, cyber targeted attacks are becoming so sophisticated so that countermeasures for them is becoming impor... [more] IA2014-52
pp.91-96
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
10:40
Hokkaido San-Refure Hakodate Deceptive defense architecture toward protection against APT
Takahiro Kakumaru, Shigeyoshi Shima, Masafumi Watanabe (NEC), Katsunari Yoshioka (YNU) ISEC2014-15 SITE2014-10 ICSS2014-19 EMM2014-15
It has been difficult to detect all of increasingly-sophisticated cyber-attacks, so that we must assume th... [more] ISEC2014-15 SITE2014-10 ICSS2014-19 EMM2014-15
pp.69-74
R 2014-05-23
14:20
Aichi   Optimal Monitoring Policy for a System with Cyber Attack
Mitsuhiro Imaizumi (Aichi Gakusen Univ.), Mitsutaka Kimura (Gifu City Women's Coll.) R2014-3
Recently, the case that malware enters into an organization's LAN through e-mail and so on, has become a serious problem... [more] R2014-3
pp.13-16
ICSS, IPSJ-SPT 2014-03-28
09:50
Okinawa Meio Univiersity Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform
Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] ICSS2013-76
pp.107-112
ICSS, IPSJ-SPT 2014-03-28
11:15
Okinawa Meio Univiersity Timeline-Based Event Log Viewer over Multi-Host Environment
Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more]
ICSS2013-79
pp.125-130
IA 2013-10-10
14:00
Overseas Konkuk Univ., Seoul Proposal of a Network Control System to Detect, Analyze and Mitigate Targeted Cyber Attacks
Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2013-26
Recently, targeted cyber attacks have been so sophisticated that we cannot detect them at early stage of intrusion.
The... [more]
IA2013-26
pp.1-6
ICSS 2013-03-25
15:30
Kanagawa Yokohama National University [Invited Talk] PRACTICE - Proactive Response Against Cyber-attacks Through International Collaborative Exchange
Katsunari Yoshioka (Yokohama National Univ.) ICSS2012-66
Proactive Response Against Cyber Attacks Through International Collaborative Exchange (PRACTICE) project aims at develop... [more] ICSS2012-66
p.55
DE 2012-12-13
13:00
Kyoto Campus Plaza Kyoto [Invited Talk] State-of-the-art Cybersecurity Technologies and Challenges for Security Big Data
Daisuke Inoue (NICT) DE2012-32
We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter) in order to fight ... [more] DE2012-32
p.105
ICSS 2012-03-16
15:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy
Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] ICSS2011-47
pp.49-54
SSS 2012-03-16
15:40
Tokyo Meiji Univ. Targeted Email Attack
Takehiko Nakayama (National Police Agency) SSS2011-29
Targeted e-mail attack is a form of attacks sending malicious e-mail to specific individual or company and it is very hu... [more] SSS2011-29
pp.17-18
ICSS 2009-05-15
13:40
Hyogo Kobe University [Special Talk] Internatinal Standarization Activities in ITU-T Study Group 17 (Security) -- Standarizatoin on Network Security and ID Management --
Yutaka Miyake, Ryu Watanabe (KDDI Labs.) ICSS2009-2
This paper describes activities of international standard related security issues at the ITU-T which is international st... [more] ICSS2009-2
pp.3-8
 Results 61 - 74 of 74 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan