IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM 2020-03-03
10:20
Okinawa Ohama Nobumoto Memorial Hall
(Cancelled but technical report was issued)
Large-Scale NW Traffic Identification Technique with Domain Adaptation
Shun Tobiyama, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Ltd.) ICM2019-51
 [more] ICM2019-51
pp.55-60
ICSS, IPSJ-SPT 2019-03-07
13:55
Okinawa NICT Okinawa Electromagnetic Technology Center Period Analysis for Visualization of Industrial Network
Hiroki Nagayama, Hu Bo, Kazunori Kamiya, Shingo Kashima, Masaki Tanikawa (NTT) ICSS2018-88
Since communications of the industrial network have strong periodicity, profiling the period of communications between d... [more] ICSS2018-88
pp.173-178
ICSS, IPSJ-SPT 2019-03-07
16:40
Okinawa NICT Okinawa Electromagnetic Technology Center Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data
Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security) ICSS2018-77
 [more] ICSS2018-77
pp.53-58
ICSS, IPSJ-SPT 2019-03-08
14:25
Okinawa NICT Okinawa Electromagnetic Technology Center Traffic analysis to detect abnormal smartphone application behavior
Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2018-87
With the spread of smartphones, its security management has become important. For smartphones, it is also necessary to c... [more] ICSS2018-87
pp.167-172
ICSS, IPSJ-SPT 2019-03-08
14:50
Okinawa NICT Okinawa Electromagnetic Technology Center Performance survey for IoT security function on smartphone
Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) ICSS2018-68
Recently, IoT devices are wide spreading, and its security management has become more important. There are two kinds of ... [more] ICSS2018-68
pp.1-6
ICSS, IPSJ-SPT 2018-03-07
13:25
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN
Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-52
In recent years, the increase of unknown malware is remarkable and it is difficult to prevent malware infiltration by 10... [more] ICSS2017-52
pp.7-12
ICSS, IPSJ-SPT 2018-03-07
14:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A study of decentralized IoT Security Controller
Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2017-58
With the spread of IoT devices, IoT security management has become important to network administrators. It is hard to im... [more] ICSS2017-58
pp.43-48
ICSS, IPSJ-SPT 2018-03-08
13:25
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Response Signature Generation method for Detecting Malicious Destinations
Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-77
Blacklist is frequently deployed for detecting malware-infected hosts. However, even when request traffic from one host ... [more] ICSS2017-77
pp.157-160
ICSS, IPSJ-SPT 2018-03-08
14:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification
Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-79
 [more] ICSS2017-79
pp.167-172
ICSS, IPSJ-SPT 2017-03-13
15:15
Nagasaki University of Nagasaki Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data
Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] ICSS2016-51
pp.43-48
ICSS, IPSJ-SPT 2017-03-13
15:40
Nagasaki University of Nagasaki Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic
Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] ICSS2016-52
pp.49-54
ICSS, IPSJ-SPT 2017-03-14
09:55
Nagasaki University of Nagasaki Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications
Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-59
A host-based intrusion detection is an approach for detecting critical web attacks. Because anomaly detection is leverag... [more] ICSS2016-59
pp.117-122
ICSS, IPSJ-SPT 2017-03-14
10:20
Nagasaki University of Nagasaki Attack Pattern Extraction by Clustering Parameters
Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-60
Web Application Firewall (WAF) is widely used to detect attacks against Web applications. New sorts of attacks occurs da... [more] ICSS2016-60
pp.123-128
ICSS, IPSJ-SPT 2016-03-03
13:10
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Actual Survey on Web Scanning by URI Co-occurrence Detection
Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more]
ICSS2015-51
pp.25-30
PRMU, IBISML, IPSJ-CVIM [detail] 2015-09-15
15:00
Ehime   Proposal of selection of training data using misdetected goodware for preventing misdetection of a static detector of malware
Yasushi Okano, Atsutoshi Kumagai, Masaki Tanikawa, Yoshihito Oshima (NTT), Kenji Aiko, Kazumi Umehashi, Junichi Murakami (FFRI) PRMU2015-90 IBISML2015-50
A lot of variant and new malware is produced day by day, it is therefore the urgent need to countermeasure such as "unkn... [more] PRMU2015-90 IBISML2015-50
pp.163-170
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan