IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 38  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CS, CQ
(Joint)
2010-04-27
09:55
Aomori Oirase Keiryu Hotel An Image Transfer System using Multiple Cellular Phone Line
Yuji Waizumi (Tohoku Univ.), Kouichi Abe (MagickWorX), Kaoru Miyauchi (K&C), Hiroki Nishiyama (Tohoku Univ.), Hiroshi Tsunoda, Hidehisa Nakayama (Tohoku Inst. of Tech.), Takuya Kitamura (Fudoki), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2010-8
 [more] CS2010-8
pp.41-46
IN, NS, CS
(Joint)
2009-09-10
13:50
Miyagi Tohoku University (Miyagi) Network Application Identification based on Characteristics of Message Transmission
Yuji Waizumi, Yuya Tsukabe (Tohoku Univ.), Hiroshi Tsunoda (Tohoku Inst. of Tech.), Yoshiaki Nemoto (Tohoku Univ.) CS2009-35
A person-to-person imformation sharing is easily realized by P2P networks that serves are unnecessary
to do so. Leakage... [more]
CS2009-35
pp.13-18
IN, NS, CS
(Joint)
2009-09-10
14:15
Miyagi Tohoku University (Miyagi) Efficient Log Transfer based on Priority Queuing and Message Aggregation for Logging over Wireless Networks
Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Mashimo, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2009-36
 [more] CS2009-36
pp.19-24
CQ, CS
(Joint)
2009-04-16
10:50
Okinawa Okinawaken Seinen Kaikan Experiments of WLAN based Activity Monitoring System for Real-time Simultaneous Utilization
Hidehisa Nakayama, Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Akihiro Suzuki (I.T.Research Co.,Ltd), Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2009-1
 [more] CS2009-1
pp.1-6
CS, SIP, CAS 2008-03-06
14:45
Yamaguchi Yamaguchi University Priority-based Adaptive Transmission Control for Efficient Log Transfer
Hiroshi Tsunoda, Takafumi Maruyama, Satoru Abe (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto (Tohoku Univ.) CAS2007-113 SIP2007-188 CS2007-78
Logs generated by operating systems and application programs provide important information to a network administrator. L... [more] CAS2007-113 SIP2007-188 CS2007-78
pp.27-32
CS, SIP, CAS 2008-03-06
15:35
Yamaguchi Yamaguchi University Generating Appropriate Templates for Efficient Application Identification
Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CAS2007-115 SIP2007-190 CS2007-80
Recently, damages of information leakage caused by
illegal use of network applications have been reported.
To prevent ... [more]
CAS2007-115 SIP2007-190 CS2007-80
pp.39-44
IN 2007-12-14
13:30
Hiroshima Hiroshima City University A Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads
Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-114
Internet worms are one of the most serious threats in the Internet. For accurately detecting newly created worms, we hav... [more] IN2007-114
pp.91-96
IN 2007-12-14
13:55
Hiroshima Hiroshima City University Classifying Network Anomaly Events Using the Occurence Probability of Correlation Coefficients
Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-115
For taking effective countermeasures against network anomaly events,the classification of detected anomaly events is req... [more] IN2007-115
pp.97-102
NS, ICM, CQ
(Joint)
2007-11-15
16:25
Fukuoka Institute of System LSI Design Industry, Fukuoka [Encouragement Talk] An evaluation of transition pattern of payload legnth for network application identification
Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) TM2007-34
Recently, increasing of information leakages caused by illegal use of network applications have been reported. To preven... [more] TM2007-34
pp.1-6
NS, CS, IN
(Joint)
2007-09-21
13:20
Miyagi Tohoku University Detector Selection Method for Detecting Malicious Nodes in Wireless Sensor Networks
Hiroshi Tsunoda (Tohoku Univ.), Ake Olbert, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2007-18
 [more] CS2007-18
pp.9-14
NS, CS, IN
(Joint)
2007-09-21
13:40
Miyagi Tohoku University A Network Application Identification Method Using Similarity of Packet Payloads
Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-19
 [more] CS2007-19
pp.15-20
NS, CS, IN
(Joint)
2007-09-21
14:00
Miyagi Tohoku University An Enhancement of Network Anomaly Detection Method Using Occurence Probability Matrices of Correlation Coefficients
Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-20
Recently, a network anomaly detection method focusing
correlation coefficients between traffic features has been pro... [more]
CS2007-20
pp.21-26
ICM 2007-05-11
09:40
Kochi Kochi Uni. of Technology Classifying Network Applications Using Transition Pattern of Payload-length
Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.)
Recently, information leakage caused by illegal use of network applications (e.g. P2P application) has become a new soci... [more]
CQ, CS
(Joint)
2007-04-24
09:25
Kagoshima Kagoshima University Detecting Causal Hosts of Anomalous Traffic using Difference of Anomaly Score
Yuji Waizumi, Hideki Saga, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-7
e propose a method to specify hosts which
send anomalous pakects when a notwork anomaly is detected.
Our proposed met... [more]
CS2007-7
pp.37-42
CQ, CS
(Joint)
2007-04-24
09:50
Kagoshima Kagoshima University Transmission Control in Transport Protocols for Mitigating Effects of Pulsing Denial of Service Attacks
Hiroshi Tsunoda, Kenjiro Arai, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2007-8
Pulsing Denial-of-Service (DoS) attacks, which can significantly
degrade the communication quality (e.g. throughput) of... [more]
CS2007-8
pp.43-48
CS, IE, ITE-BCT, IPSJ-AVM 2006-12-15
10:55
Aichi Nagoya Univ. Discriminating Network Applications by using Changes in the Compositon of Communication Data
Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-61 IE2006-129
A person-to-person imformation sharing is easily realized
by P2P networks that serves are unnecessary to do so.
Leakag... [more]
CS2006-61 IE2006-129
pp.19-24
CS, IE, ITE-BCT, IPSJ-AVM 2006-12-15
11:20
Aichi Nagoya Univ. Reducing False Positive and Observation Cost in Bandwidth Usage-based Pulsing DoS Detection Schemes
Kenjiro Arai, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-62 IE2006-130
Pulsing Denial-of-Service (PDoS) attacks seriously degrade the
throughput of TCP flow and consequently pose a grave con... [more]
CS2006-62 IE2006-130
pp.25-30
SAT 2006-10-19
13:00
Overseas KAL Hotel (Jeju-Do, Korea) ELB in IP/NGEO Satellite Constellations: Issues and Solutions
Daisuke Mashimo, Tarik Taleb, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato (Tohoku Univ.)
 [more]
IN, NS, CS
(Joint)
2006-09-15
15:00
Miyagi   Using Multiple Normal states for Network Anomaly Detection
Naotoshi Hiramatsu, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) CS2006-32
Network anomaly detection requires modeling the normal state of the
network. When the observation quantities of network... [more]
CS2006-32
pp.61-66
IN, NS, CS
(Joint)
2006-09-15
15:20
Miyagi   A Low Cost Worm Detection Technique based on Flow Payload Clustering
Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) CS2006-33
Recently, damages of information systems by worms have been reported at the global level. To control these damages, some... [more] CS2006-33
pp.67-72
 Results 1 - 20 of 38  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan