IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 33  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2022-06-23
14:30
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
Discussion about improving a detection accuracy of malware variants using time series differences in latent representation.
Atsushi Shinoda, Hajime Shimada, Yukiko Yamaguti (Nagoya Univ.), Hirokazu Hasegawa (NII) IA2022-4 ICSS2022-4
Today, computers are used for various purposes to support people's daily lives. Therefore, the existence of malware that... [more] IA2022-4 ICSS2022-4
pp.19-24
ICSS, IPSJ-SPT 2021-03-01
11:30
Online Online Method of Similarity Evaluation among Incidents for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] ICSS2020-31
pp.31-36
ICSS, IPSJ-SPT 2021-03-01
11:55
Online Online Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] ICSS2020-32
pp.37-42
ICSS 2020-11-26
15:00
Online Online Initial Study of Incident Response Support System for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] ICSS2020-22
pp.17-20
ICSS, IPSJ-SPT 2020-03-03
09:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] ICSS2019-84
pp.97-102
ICSS 2019-11-13
14:20
Miyazaki MRT Terrace(Miyazaki) Issue on Adversarial Malware Sample Generation using Reinforcement Learning against Machine Learning Based Malware Detection System
Seiya Takagi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-62
In recent years, security researchers have applied machine learning techniques to malware detection researches to improv... [more] ICSS2019-62
pp.13-18
ICSS 2019-11-13
15:45
Miyazaki MRT Terrace(Miyazaki) Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment
Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] ICSS2019-65
pp.31-36
EMD, R 2019-02-15
16:05
Osaka   [Invited Talk] Information System Construction which Balances Both Business Continuity and Security Incident Containment
Hajime Shimada (Nagoya Univ.) R2018-57 EMD2018-58
 [more] R2018-57 EMD2018-58
p.31
ICSS, IPSJ-SPT 2017-03-13
13:00
Nagasaki University of Nagasaki Clustering of Bot Port Scan and Brute-force Activities
Shohei Araki, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Jun Miyoshi (NTT), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-46
Cyber-attacks targeting IoT devices are rapidly spreading. In September 2016, malware called Mirai caused great damages ... [more] ICSS2016-46
pp.1-6
ICSS, IPSJ-SPT 2017-03-13
16:40
Nagasaki University of Nagasaki Primary Discussion about a Honeypot System for IoT Aimed Protocols
Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] ICSS2016-57
pp.103-108
ICSS 2016-11-25
15:20
Kanagawa Institute of Information Security Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set
Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] ICSS2016-42
pp.21-26
ICSS, IPSJ-SPT 2016-03-03
13:10
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Actual Survey on Web Scanning by URI Co-occurrence Detection
Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more]
ICSS2015-51
pp.25-30
IA, SITE, IPSJ-IOT [detail] 2016-03-04
11:10
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) Network Type Dynamic Analysis System for Prevention of Malware Infection Expansion
Satoshi Fuchigami, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) SITE2015-73 IA2015-105
In recent years, it has been a social issue that cyber-attacks are increasing for the purpose of money or secret informa... [more] SITE2015-73 IA2015-105
pp.221-226
IN, IA
(Joint)
2015-12-17
17:10
Hiroshima Hiroshima City University Dynamic construction of to-many communication topology by using OpenFlow
Shun Yanase, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) IA2015-76
To-many communication such as streaming and multi-point video conferencing basically uses tree structure of content dist... [more] IA2015-76
pp.43-48
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2015-12-03
10:50
Nagasaki Nagasaki Kinro Fukushi Kaikan Cache Energy Reduction by Switching between L1 High Power and Low Power Cache under DVFS Environment
Kaoru Saito, Ryotaro Kobayashi (Toyohashi Univ of Tech), Hajime Shimada (Nagoya Univ.) CPSY2015-72
Current CPU utilizes cache memory for decreasing an access speed gap between CPU and main memory.
But the cache occupie... [more]
CPSY2015-72
pp.63-68
CPSY, IPSJ-EMB, IPSJ-SLDM, DC [detail] 2015-03-07
09:45
Kagoshima   Energy Reduction of BTB by focusing on Number of Branches per Cache Line
Hiroki Yamamoto, Ryotaro Kobayashi (TUT), Hajime Shimada (NU) CPSY2014-177 DC2014-103
Recent processors exploit Instruction Level Parallelism to improve performance, but it's limited by control dependency. ... [more] CPSY2014-177 DC2014-103
pp.89-94
ICSS 2015-03-04
15:55
Okinawa Meio Univiersity Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary
Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] ICSS2014-96
pp.199-204
IA 2014-11-06
15:30
Overseas Thailand Network Access Control by FPGA-Based Network Switch using HW/SW Cooperated IDS
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2014-52
In recent years, cyber targeted attacks are becoming so sophisticated so that countermeasures for them is becoming impor... [more] IA2014-52
pp.91-96
CPSY 2014-10-10
14:15
Chiba Meeting Room 303, International Conference Hall, Makuhari-Messe Study of Processor Core for Many-core Architecture Combining ALU Cascading and 3-way In-order Execution
Hajime Shimada (Nagoya Univ.), Ryotaro Kobayashi (Toyohashi Univ. of Tech.) CPSY2014-53
Recent many-core processor frequently utilizes 2-way in-order execution core which is diverted from
high-performance em... [more]
CPSY2014-53
pp.37-42
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:05
Hokkaido San-Refure Hakodate Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16
pp.75-80
 Results 1 - 20 of 33  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan