IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2023-03-13
15:20
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Multimodal Feature Integration Toward High-Accuracy Network Intrusion Detection
Masazumi Iida, Kohei Miyamoto, Yoshinari Takeishi, Shota Kawanaka (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2022-55
(To be available after the conference date) [more] ICSS2022-55
pp.43-48
ICSS, IPSJ-SPT 2021-03-01
09:10
Online Online Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts
Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-26
(To be available after the conference date) [more] ICSS2020-26
pp.1-6
ICSS 2018-11-22
14:20
Kagoshima   Part II: Calculating Similarity between IoT Malware over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more]
ICSS2018-66
pp.73-78
ICSS, IA 2018-06-25
13:25
Ehime Ehime University Calculating Similarity between IoT Malware Samples over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more]
IA2018-2 ICSS2018-2
pp.7-12
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] ICSS2017-69
pp.109-114
IA, ICSS 2017-06-08
14:25
Kochi Kochi University of Technolo, Eikokuji Campus A First Trend Review of Runtime Packers for IoT Malware
Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] IA2017-4 ICSS2017-4
pp.19-24
ICSS, IPSJ-SPT 2016-03-03
12:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Malicious-Spam-Mail Detection System with Autonomous Learning Ability
Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more]
ICSS2015-50
pp.19-24
ICSS, IPSJ-SPT 2016-03-04
14:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Autonomous DDoS Backscatter Detection System from Darknet Traffic
Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] ICSS2015-67
pp.123-128
ICSS 2014-11-28
10:20
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting Backscatter of DDoS Attacks from Darknet Traffic
Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] ICSS2014-59
pp.49-53
ICSS, IPSJ-SPT 2014-03-28
09:25
Okinawa Meio Univiersity Spam Analysis based on Mail Relay Routing
Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] ICSS2013-75
pp.101-106
ICSS 2012-11-22
13:15
Hiroshima Miyajima Mori-no-Yado Packer Identification Based on Binary Code of Malware Using Machine Learning
Ryoichi Isawa, Tao Ban, Daisuke Inoue (NICT) ICSS2012-48
PEiD is a well-known packer identi cation tool. However, it often fails to identify a packer name of the target le beca... [more] ICSS2012-48
pp.19-24
NC 2011-07-26
14:40
Hyogo Graduate School of Engineering, Kobe University P2P Network Traffic Analysis Using Data Mining Engines
Tao Ban (NICT), Shanqing Guo (Shandong Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) NC2011-41
Characterization of P2P trac is an essential step before
developing workload models towards network capacity planning ... [more]
NC2011-41
pp.115-118
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan