IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 37  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2018-03-01
09:20
Miyazaki Phoenix Seagaia Resort A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts
Ryuji Maeda, Junichi Murayama (Tokai Univ.)
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] IN2017-90
pp.5-10
NS, IN
(Joint)
2018-03-01
09:40
Miyazaki Phoenix Seagaia Resort A Cooperation Scheme between Distributive Virtual Firewall and NAT for Countermeasuring DNS Amplification Attacks
Eitetsu Gen, Junichi Murayama (Tokai Univ.)
Recently, DNS amplification attacks are occurring frequently.
This attack is one of DDoS attacks.
Thus, a large-scale ... [more]
IN2017-91
pp.11-14
RCS, IN, NV
(Joint)
2017-05-12
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet
Ryuji Maeda, Junichi Murayama (Tokai Univ.)
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] IN2017-5
pp.21-24
RCS, IN, NV
(Joint)
2017-05-12
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Lecture] Implementing a distributive virtual firewall using OpenFlow
Eitetsu Gen, Junichi Murayama (Tokai Univ.)
Recently, DNS amplification attacks to a targeted server is occurring frequently. Those attacks also cause congestion of... [more] IN2017-11 RCS2017-49
pp.55-58(IN), pp.109-112(RCS)
IN, RCS
(Joint)
2016-05-20
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Virtual Firewall Scheme that Filters DNS Fragment Packets caused by DNS Amplification Attacks
Eitetsu Gen (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.)
Recently, DNS amplification attacks occur frequently. Those attacks disturb service offering by means of sending many pa... [more] IN2016-16
pp.85-88
SC 2016-03-25
10:20
Tokyo NII Visualization Technique to Colorize and Categorize Occurrence Frequency of Key Words in Newspapers with Temporal Scalability
Ken T. Murata, Yoshiaki Nagaya, Kazunori Yamamoto (NICT), Kentaro Ukawa, Kazuya Muranaga, Junichi Murayama, Yutaka Suzuki (SEC)
We propose a technique to visualize occurrence frequency of specified categories or key words in archived database of ne... [more] SC2015-22
pp.1-6
NS, IN
(Joint)
2016-03-04
13:30
Miyazaki Phoenix Seagaia Resort Evaluation on Virtual Firewall Schemes against DNS Amplification Attacks
Eitetsu Gen, Shota Endo (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.)
Recently, DDoS attacks that disturb service offering in the Internet have occurred frequently. In order to mitigate such... [more] IN2015-140
pp.189-192
NS, IN
(Joint)
2015-03-03
10:50
Okinawa Okinawa Convention Center Fast Log Tracing Method for Information-Leakage Prevention
Koki Ikeda, Takuya Suzuki, Pichaya Kietkaroon (Tokai Univ.), Takahiro Hamada, Yuichi Murata (NTT), Junichi Murayama (Tokai Univ.)
Recently, targeted attacks for enterprise information networks occur frequently and thus secret files are leaking via ap... [more] IN2014-150
pp.175-178
MI 2015-03-03
10:34
Okinawa Hotel Miyahira Development of New 4K Hi-speed Camera and Applications for Medical Engineering
Ken T. Murata (NICT), Takamichi Mizuhara (Clealink), Eizen Kimura (Ehime Univ.), Yoshiaki Nagaya, Hidenobu Watanabe (NICT), Takashi Kurosawa (Hitachi Solutions), Kazuya Muranaga, Kentaro Ukawa, Junichi Murayama, Yutaka Suzuki (SEC), Osamu Tatebe, Masahiro Tanaka (Tsukuba Univ.), Kazunori Yamamoto (NICT)
(To be available after the conference date) [more]
NS, IN
(Joint)
2015-03-03
14:10
Okinawa Okinawa Convention Center A Flow Screening Control Scheme for Flow Networks
Yusuke Watanabe, Pichaya Kietkaroon (Tokai Univ), Takahiro Hamada, Yuminobu Igarashi (NTT), Junichi Murayama (Tokai Univ)
Recently, targeted attacks for enterprise information networks occur frequently. Since a data center accommodates many e... [more] IN2014-161
pp.239-242
IN 2012-10-12
11:25
Tokyo Tokyo Univ. Sanjo-Kaikan A Study of Paper AttributeAnalysis on Information Networks
Masashi Toyama, Hiroto Nomura, Junichi Murayama (NTT)
When a user post a technical report, IEICE registration system requires many useful attribute information related to his... [more] IN2012-102
pp.151-154
NS, IN
(Joint)
2012-03-09
11:00
Miyazaki Miyazaki Seagia On Evaluation of Integrated Control of Live Migration and Traffic Engineering in Cloud Computing
Hirofumi Ichihara, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.)
Virtual machine live migration, which migrate a virtual machine between data centers, is studied as a way to improve qua... [more] IN2011-172
pp.211-216
NS, IN
(Joint)
2012-03-09
11:20
Miyazaki Miyazaki Seagia Proposal and Evaluation of a Stable Traffic Engineering Method for Live Migration in Cloud Computing
Motohiro Seki, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.)
Virtual machine live migration, which migrate a virtual machine between data centers, is studied as a way to improve qua... [more] IN2011-173
pp.217-222
IN, NV
(Joint)
2011-07-22
11:05
Hokkaido Hokkaido University On Router Virtualization for Realizing Group-Based Communication in Content-Centric Networking
Masato Ohtani, Keiichiro Tsukamoto, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.)
Data-centric network architecture, which takes the data transferred on network rather than the point-to-point communicat... [more] IN2011-59
pp.81-86
IN, NS
(Joint)
2011-03-03
10:30
Okinawa Okinawa Convention Center Proposal of Inter-Cloud System Architecture
Kunio Hato, Hu Bo, Yuichi Murata, Junichi Murayama (NTT Corp.)
Commercial services using cloud systems have been spreading widely because server virtualization technologies and broadb... [more] IN2010-169
pp.151-156
IN, NS
(Joint)
2011-03-03
10:50
Okinawa Okinawa Convention Center Proposal of an Inter-Cloud Resource Assignment Algorithm
Hu Bo, Kunio Hato, Yuichi Murata, Junichi Murayama (NTT Corp.)
We proposes a resource assignment algorithm for inter-cloud computing systems. An inter-cloud computing system is promis... [more] IN2010-170
pp.157-162
IN 2011-01-20
08:50
Osaka Osaka Univ. On Estimating Referring Block in Hyperlinked Web Page based on Block-to-Block Similarity
Keiichiro Tsukamoto, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.)
(Advance abstract in Japanese is available) [more] IN2010-118
pp.1-6
CS, IN, NS
(Joint)
2008-09-11
15:40
Miyagi Tohoku University [Invited Talk] Trend of VPN-based communication technology
Junichi Murayama (NTT)
The Internet is attractive because of its global reachability, while it causes security problems. On the other hand, a v... [more] NS2008-54 IN2008-48 CS2008-17
pp.69-74(NS), pp.27-32(IN), pp.1-6(CS)
IN 2008-06-20
14:55
Hokkaido Hokkaido Univ. Dynamic Topology Reconfiguration Method for Overlay Networks using Users' Community Information
Tomoyasu Ogasa, Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT)
In an overlay network, it is important to reconfigure its network topology appropriately according to change of traffic ... [more] IN2008-24
pp.85-90
NS, IN
(Joint)
2008-03-06
11:50
Okinawa Bankoku Shinryokan Identification Method of Attacking Source Using Traffic Flow in Backbone Networks
Takeshi Kuwahara, Tsuyoshi Kondoh, Takeshi Yagi, Keisuke Ishibashi, Junichi Murayama (NTT)
In this paper, we propose a novel identification method of attacking source using traffic flow information in backbone n... [more] IN2007-169
pp.61-66
 Results 1 - 20 of 37  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan