IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2017-03-13
15:15
Nagasaki University of Nagasaki Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data
Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] ICSS2016-51
pp.43-48
ICSS, IPSJ-SPT 2017-03-13
15:40
Nagasaki University of Nagasaki Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic
Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] ICSS2016-52
pp.49-54
PRMU, IBISML, IPSJ-CVIM [detail] 2015-09-15
15:00
Ehime   Proposal of selection of training data using misdetected goodware for preventing misdetection of a static detector of malware
Yasushi Okano, Atsutoshi Kumagai, Masaki Tanikawa, Yoshihito Oshima (NTT), Kenji Aiko, Kazumi Umehashi, Junichi Murakami (FFRI) PRMU2015-90 IBISML2015-50
A lot of variant and new malware is produced day by day, it is therefore the urgent need to countermeasure such as "unkn... [more] PRMU2015-90 IBISML2015-50
pp.163-170
IN 2014-10-16
15:20
Osaka Osaka Univ. A Method to Extract Security-related Tweets
Atsutoshi Kumagai, Shingo Orihara, Tetsuya Abe, Susumu Kakuta, Yasushi Okano, Yoshihito Oshima (NTT) IN2014-76
Recently, Twitter is becoming a place where security-related information is posted, such as a warning of cyber attacks w... [more] IN2014-76
pp.13-18
NC, IPSJ-BIO, IBISML, IPSJ-MPS [detail] 2014-06-25
16:10
Okinawa Okinawa Institute of Science and Technology A Discriminative Model resistant to Malicious Annotators
Atsutoshi Kumagai, Shingo Orihara, Yasushi Okano, Tomoharu Iwata, Yoshihito Oshima (NTT) NC2014-1 IBISML2014-1
Recently, there have been a lot of studies on learning a classifier from a large amount of labeled data collected from c... [more] NC2014-1 IBISML2014-1
pp.17-23
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan