IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 41  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2021-06-22
09:00
Online Online Feature analysis of phishing website and phishing detection based on machine learning algorithms
Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9
(To be available after the conference date) [more] IA2021-9 ICSS2021-9
pp.44-49
IN, NS
(Joint)
2021-03-05
10:10
Online Online A Convolutional Autoencoder Based Method for Cyber Intrusion Detection
Xinyi She, Yuji Sekiya (Tokyo Univ.) IN2020-77
Cyber intrusion detection systems are increasingly crucial due to the monumental growth of internet applications. Howeve... [more] IN2020-77
pp.138-143
IN, NS
(Joint)
2021-03-05
11:20
Online Online Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it
Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] NS2020-153
pp.179-184
IA, IN
(Joint)
2020-12-15
10:50
Online Online Development of an Intrusion Detection System Utilizing Social Network Analysis Principles
James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] IA2020-29
pp.18-21
IN, CCS
(Joint)
2020-08-03
13:50
Online Online A study on Mobility-Aware task offloading in edge computing for task failure minimization
Ryo Nakajima, Yuji Sekiya (UT) IN2020-15
In recent years, with the development of the Internet of Things (IoT) and other factors, the demand for networks has inc... [more] IN2020-15
pp.37-42
CQ, CBE
(Joint)
2019-01-18
10:45
Tokyo Tokyo Metropolitan Univ. Clustering Protocol in Wireless Sensor Networks Using Cuckoo Search and Fuzzy Algorithm
Chiharu Ido, Yuji Sekiya (Tokyo Univ.) CQ2018-84
Wireless Sensor Networks (WSNs) is a network formed by a large number of sensor nodes where each node is equipped with a... [more] CQ2018-84
pp.47-52
NS 2018-01-18
16:40
Okinawa Ishigakishi-Shoko-Kaikan Resource Allocation in Wireless D2D Caching Networks as Multi-Armed Bandits
Maoki Hikosaka, Yuji Sekiya (UTokyo) NS2017-153
 [more] NS2017-153
pp.53-58
IA, IN
(Joint)
2017-12-15
13:30
Hiroshima Hiroshima City Univ. Investigation of Campus-wide SD-WAN with Open Source Software
Ryo Nakamura, Yuji Sekiya, Tomohiro Kudo (Univ of Tokyo) IA2017-64
This paper reports an investigation of Software Defined WAN (SD-WAN) techniques for a campus network. Today's universiti... [more] IA2017-64
pp.67-72
ICSS 2017-11-21
11:45
Oita Beppu International Convention Center A Study of Detecting Infected Hosts by Graph Analysis of DNS Server Logs
Kazunori Kamiya, Ayako Hasegawa (SC-Lab.), Yuji Sekiya, Kazuya Okada (Univ. of Tokyo) ICSS2017-47
 [more] ICSS2017-47
pp.53-58
NS 2017-04-20
16:15
Toyama Toyama Shoko Kaigisyo Resource Allocation in Software-Defined Device-to-Device Communications as Multi-Armed Bandits
Maoki Hikosaka, Yuji Sekiya (Tokyo Univ.) NS2017-7
 [more] NS2017-7
pp.37-42
ICSS, IPSJ-SPT 2017-03-13
15:40
Nagasaki University of Nagasaki Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic
Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] ICSS2016-52
pp.49-54
IA, IN
(Joint)
2016-12-16
13:20
Hiroshima Hiroshima city university A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures
Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] IN2016-82
pp.91-96
IA 2016-11-04
11:15
Overseas Taipei (Taiwan) Case-based study and Discussion of threat analysis on DNS traffic using MATATABI platform
Tomohiro Ishihara, Yuji Sekiya (UTokyo) IA2016-48
 [more] IA2016-48
pp.99-102
IA 2016-08-29
12:30
Tokyo IIJ Seminar Room The current status and the future directions of the PTP interoperability testing (Phase2) -- The Consideration based on Interop Tokyo 2016 ShowNet --
Mikito Hasegawa (SSOL), Hiroshi Abe (IIJ-II), Yuji Sekiya (Univ. of Tokyo) IA2016-13
This paper shows the report of PTP experiment phase 2 in the Interop Tokyo 2016's ShowNet. This experiment focused on mu... [more] IA2016-13
pp.1-6
NS, IN
(Joint)
2016-03-04
13:10
Miyazaki Phoenix Seagaia Resort A Study of Data Leak Prevention Mechanism by Network Monitoring using SDN
Kosa Sato, Yuji Sekiya (The Univ. of Tokyo) IN2015-139
Data leakage due to cyber attacks called targeted attacks and e-mail wrong transmission has become a major problem in re... [more] IN2015-139
pp.183-188
IA 2015-08-25
17:30
Tokyo IIJ Seminar Room (Iidabashi Grand Bloom 13F) The current status and the future directions of the PTP interoperability testing -- The Consideration based on Interop Tokyo 2015 ShowNet --
Mikito Hasegawa (SSOL), Yuji Sekiya (Univ. of Tokyo) IA2015-28
In the future, Japan will increase the number of high-precision time is needed base station (e.g. Nano Cell, Pico Cell) ... [more] IA2015-28
pp.53-57
IN, NV
(Joint)
2015-07-16
13:25
Hokkaido Hokkaido University SDN-based Mobility Management
Xiaozhou Jia (Todai), Panagiotis Georgopoulos, Laurent Vanbever, Karin Anna Hummel (ETH), Yuji Sekiya, Hajime Tazaki (Todai) IN2015-24
The proliferation of mobile devices has created an extraordinary mobile data growth, which stimulated interest in delive... [more] IN2015-24
pp.7-12
IA 2014-10-07
16:30
Osaka Grand Front OSAKA Tower-B 10F The current state and the future direction of the data center facility -- The experience from the construction of "ShowNet" at Interop Tokyo 2014 --
Koichi Ito (Japan Telegaertner), Yuji Sekiya (Univ. of Tokyo), Satoshi Uda (JAIST), Hiroaki Hazeyama (NAIST) IA2014-32
The importance of data center as inter-exchange point of Cloud and Big-data is growing up. And the equipment for Cloud a... [more] IA2014-32
pp.47-49
IA 2014-10-07
16:55
Osaka Grand Front OSAKA Tower-B 10F Recent cyber attack methodology and protection -- The Consideration based on Interop Tokyo 2014 ShowNet Security --
Ken Hashimoto (FireEye), Takashi Tomine (NICT), Yuji Sekiya (Univ. of Tokyo) IA2014-33
In social activities and daily life, a share of activities from the Internet has been gotten higher. Due to that changes... [more] IA2014-33
pp.51-56
ICSS, IPSJ-SPT 2014-03-28
10:15
Okinawa Meio Univiersity MATATABI: Multi-layer Threat Analysis Platform with Hadoop
Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] ICSS2013-77
pp.113-118
 Results 1 - 20 of 41  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan