|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 08:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
A Method for Detecting Mirai Botnet Groups and Their C2 Servers Using Flow Data Collected in Large-Scale Network Kosuke Murakami, Masataka Nakahara, Ayumu Kubota (KDDIR/KDDI) ICSS2023-83 |
(To be available after the conference date) [more] |
ICSS2023-83 pp.100-107 |
ICSS, IPSJ-SPT |
2023-03-13 16:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
An Analysis of the Risk of Unauthorized Access to the WebUI of IoT Devices Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-63 |
(To be available after the conference date) [more] |
ICSS2022-63 pp.91-96 |
ICSS |
2022-11-08 09:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Weak Password Settings for IoT Devices and Results of User Notifications Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-42 |
IoT devices with weak ID/Password settings that are accessible from the Internet by services that enable password authen... [more] |
ICSS2022-42 pp.25-30 |
IA, ICSS |
2022-06-23 15:20 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
An Investigation of Abuse Possibility of IoT Devices After Unauthorized Login Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) IA2022-6 ICSS2022-6 |
IoT devices with weak ID/Password settings and accessible from the Internet by Telnet and SSH services are infected with... [more] |
IA2022-6 ICSS2022-6 pp.31-36 |
IN, NS (Joint) |
2021-03-04 11:20 |
Online |
Online |
Resource Authorization Patterns on Edge Computing Ryu Watanabe, Ayumu Kubota (KDDIR), Jun Kurihara (UOH) IN2020-68 |
In order to realize a distribution of processing load and a prompt response, the concept of edge computing is drawing an... [more] |
IN2020-68 pp.85-90 |
ICSS, IPSJ-SPT |
2021-03-01 10:25 |
Online |
Online |
Construction of Vulnerability Evaluation System with Machine Learning Methods Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29 |
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] |
ICSS2020-29 pp.19-24 |
MoNA, IN (Joint) |
2015-11-18 13:30 |
Kumamoto |
Kumamoto University |
Missions of Information-Centric Networking Tohru Asami, Masaru Takagi, Yoshihiro Kawahara (TODAI), Atsushi Tagami (KDDIR&D Labs.), Kenichi Nakamura (Panasonic), Tomohiko Yagyu (NEC), Hidenori Nakazato (Waseda) IN2015-67 |
From the point of views of communication secrecy, traffic engineering and information leakage prevention, this paper rev... [more] |
IN2015-67 pp.35-40 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|