IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 4 of 4  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL Attack Blocking Method on Autonomous and Distributed Security Infrastructure for the Internet
Hiroyuki Kimiyama, Ken Eguchi, Tomoaki Tsutsumi, Kaori Sano, Hirohumi Yamaki, Yoichiro Ueno, Naoki Yonesaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2016-251
Cyber attacks on network connected equipment, such as servers, PCs, IoTs and so on, will never be ended. Over 600Gbit/s ... [more] NS2016-251
Hiroshima Hiroshima city university Generation of Dropping Request Message by Identifying Source Addresses and Attributes of Attacking Packets
Mamoru Yogosawa, Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Tsuyoshi Ishikawa, Teruaki Tsutsumi, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno, Hiroyuki Kimiyama, Naoki Yonezaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) IA2016-69
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. It naturally lead us to switching ... [more] IA2016-69
IA 2016-08-29
Tokyo IIJ Seminar Room Experiments to Block Bandwidth Attacks on Testbed Simulating Autonomous Internet Security Infrastructure
Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Mamoru Yogosawa, Kudou Wataru, Ryusei Suzuki, Kazuo Ohsawa, Tsuyoshi Ishikawa, Daichi Ashikawa, Tomoaki Tutumi, Kaoru Sano, Hirofumi Yamaki, Yoichirou Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (TDU) IA2016-14
 [more] IA2016-14
ICSS 2015-03-03
Okinawa Meio Univiersity Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router -- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow --
Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) ICSS2014-65
There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems, and ... [more] ICSS2014-65
 Results 1 - 4 of 4  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan