|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, IN (Joint) |
2020-12-15 11:40 |
Online |
Online |
Application Identification Method with Meta-Learning Shun Tobiyama, Bo Hu, Kazunori Kamiya (NTT), Kenji Takahashi (NTT Ltd.) IN2020-40 |
With the continuous evolution of the Internet, a variety of web applications, such as video streaming, social network se... [more] |
IN2020-40 pp.43-48 |
NS, IN (Joint) |
2020-03-06 10:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
[Technology Exhibit]
Machine learning pipeline for analyzing Large-scale traffic Morikawa Akira, Bo Hu (NTT) NS2019-212 IN2019-103 |
Recently, machine learning becomes promising to automatically extract intelligence from network traffic for cybersecurit... [more] |
NS2019-212 IN2019-103 p.191(NS), p.151(IN) |
ICM |
2020-03-03 10:20 |
Okinawa |
Ohama Nobumoto Memorial Hall (Cancelled but technical report was issued) |
Large-Scale NW Traffic Identification Technique with Domain Adaptation Shun Tobiyama, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Ltd.) ICM2019-51 |
[more] |
ICM2019-51 pp.55-60 |
ICSS, IPSJ-SPT |
2019-03-07 16:40 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security) ICSS2018-77 |
[more] |
ICSS2018-77 pp.53-58 |
ICSS, IPSJ-SPT |
2018-03-07 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-52 |
In recent years, the increase of unknown malware is remarkable and it is difficult to prevent malware infiltration by 10... [more] |
ICSS2017-52 pp.7-12 |
ICSS, IPSJ-SPT |
2018-03-08 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Response Signature Generation method for Detecting Malicious Destinations Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-77 |
Blacklist is frequently deployed for detecting malware-infected hosts. However, even when request traffic from one host ... [more] |
ICSS2017-77 pp.157-160 |
ICSS, IPSJ-SPT |
2018-03-08 14:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-79 |
[more] |
ICSS2017-79 pp.167-172 |
ICSS, IPSJ-SPT |
2017-03-13 13:00 |
Nagasaki |
University of Nagasaki |
Clustering of Bot Port Scan and Brute-force Activities Shohei Araki, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Jun Miyoshi (NTT), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-46 |
Cyber-attacks targeting IoT devices are rapidly spreading. In September 2016, malware called Mirai caused great damages ... [more] |
ICSS2016-46 pp.1-6 |
ICSS, IPSJ-SPT |
2017-03-14 11:20 |
Nagasaki |
University of Nagasaki |
Graph based Detection of Advanced Persistent Threat on LAN Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT) ICSS2016-65 |
Recently the countermeasures against continuously increasing Advanced Persistent Threats(APT) are urgently necessary.
I... [more] |
ICSS2016-65 pp.153-158 |
IN |
2015-10-15 14:55 |
Osaka |
Osaka University |
Intrusion Path Prediction of Advanced Persistent Threat Yasuhiro Teramoto, Bo Hu, Toshiharu Kishi, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume (NTT) IN2015-54 |
Recent year, Cyber targeted attack becomes more sophisticated and threaten the organizations in the world. The targeted ... [more] |
IN2015-54 pp.7-12 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|