Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, IA (Joint) |
2023-12-21 10:40 |
Hiroshima |
Satellite Campus Hiroshima |
A Study of Temporal Network Analysis for Evaluating Worm Spreading in Vehicle-to-Vehicle Network Yuji Watanabe, Yukio Ogawa, Kaoru Ota, Mianxiong Dong (Muroran-IT) IN2023-42 |
Vehicle-to-vehicle (V2V) communication is expected to revolutionize the driving experience by improving bothsafety and c... [more] |
IN2023-42 pp.13-18 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-06 11:15 |
Tochigi |
Kinugawa Onsen Hotel |
Study on Effect Testing of Persuasive Message Stimulating Computer Virus Measures based on Collective Protection Motivation Theory Kana Shimbo, Komagome Tasuku, Takahashi Momomi, Harada Akane, Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.) SITE2017-74 IA2017-85 |
Numerous Internet users not recovering their infected PCs are reported. In order to have them recover their PCs, the pro... [more] |
SITE2017-74 IA2017-85 pp.205-208 |
RCS, RCC, ASN, NS, SR (Joint) |
2016-07-21 13:20 |
Aichi |
|
[Encouragement Talk]
The Effect of Network Topology on the Spread of Self-Evolving Botnets Takanori Kudo (Setsunan Univ.), Tomotaka Kimura (Tokyo Univ. of Science), Yoshiaki Inoue (Osaka Univ.), Hirohisa Aman (Ehime Univ.), Kouji Hirata (Kansai Univ.) NS2016-63 |
As the previous work, we have proposed an epidemic model of new botnets
named self-evolving botnets that autonomously ... [more] |
NS2016-63 pp.69-74 |
DC, CPSY |
2015-04-17 14:50 |
Tokyo |
|
[Special Invited Talk]
On Hardware for high-speed pattern matching Tsutomu Sasao (Meiji Univ.) CPSY2015-11 DC2015-11 |
High-speed pattern matching is implemented with conventional memories.
Using the concept of index generation function, ... [more] |
CPSY2015-11 DC2015-11 pp.59-66 |
ISEC, LOIS, SITE |
2014-11-22 09:25 |
Hyogo |
|
Proposal of the measure behavior intention model in measure against a computer virus. Sho Hamatsu, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.) ISEC2014-61 SITE2014-52 LOIS2014-31 |
In the field of information security, even though an individual might intend to take protective action under the virus i... [more] |
ISEC2014-61 SITE2014-52 LOIS2014-31 pp.33-37 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 09:50 |
Hokkaido |
|
Proposal of Virtual Experimental System for Computer Virus Infection Situation Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.), Toshio Takahshi (JEED) ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34 |
We have been researching individual behavior and consciousness under
computer virus infection. The situation under viru... [more] |
ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34 pp.229-235 |
SITE, IPSJ-CE |
2011-12-17 16:15 |
Shimane |
|
Study on Consciousness and Behavior under Computer Virus Infection Shun-ichi Kurino, Kazumi Ito, Yuki Ikeda, Noriaki Yoshikai (Nihon Univ.) SITE2011-30 |
We have been researching individual behavior and consciousness under computer virus infection. The situation under virus... [more] |
SITE2011-30 pp.29-34 |
ISEC |
2007-12-19 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Classification and feature extraction by using computer virus static analysis Kazuki Iwamoto (JCSR), Katsumi Wasaki (Shinshu Univ.) ISEC2007-127 |
About the variant judgment of the computer virus, we consider the method of classification and feature extraction based ... [more] |
ISEC2007-127 pp.107-113 |
SAT |
2007-04-20 16:00 |
Mie |
Mie University |
[Special Talk]
Network Security between "an-zen" and "an-shin" Masakatu Morii (Kobe Univ.) SAT2007-7 |
The author has been working in the field of Network Security and Cryptography. Recently it is in malware, computer virus... [more] |
SAT2007-7 pp.37-42 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 15:20 |
Okayama |
Okayama Univ. |
A Proposal of Response Delay Method for Spam Mail from BOTNET Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU) |
Recently, increasing spam mails have been becoming causes of many problems. About 80 % of spam mails have been sent from... [more] |
ISEC2006-35 SITE2006-32 pp.191-197 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:20 |
Okayama |
Okayama Univ. |
Proposal and Evaluation on Epidemiological Approach to Computer Virus Ryoichi Sasaki (Dendai) |
Because computer virus has evolved every moment, the range which encounters computer virus is expanded or damage has tur... [more] |
ISEC2006-48 pp.61-67 |
IN, ICM, LOIS (Joint) |
2006-01-20 09:50 |
Kyoto |
Kyoto Univ. |
A method for describing the data of computer virus and its behavior Hideo Ichimiya, Atsuko Imose, Ryoichi Isawa, Sachihiro Ichikawa (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masami Mohri (The Univ. of Tokushima), Masakatu Morii (Kobe Univ.) |
Each analysis result about computer virus output by various virus analysis systems, e.g. behavior analysis system and si... [more] |
OIS2005-81 pp.11-16 |
RECONF |
2005-12-01 11:25 |
Fukuoka |
Kitakyushu International Conference Center |
Proposal of a virus check system using FPGA Kei Shimane (Toho Univ.), Yosuke Iijima (Univ. Of Tsukuba), Eiichi Takahashi (AIST), Tatsumi Furuya (Toho Univ.), Tetsuya Higuchi (AIST) |
As regular broadband connections to the Internet are now common in homes, private users need to take measures against va... [more] |
RECONF2005-63 pp.25-30 |
ICM, NS, CQ (Joint) |
2005-11-18 12:05 |
Shimane |
Kunibiki-messe (Matsue city) |
On the number of insecure users in protection against computer virus Masaki Aida (Tokyo Metropolitan Univ.), Toru Sasaki (Tokyo Inst. Tech.), Chisa Takano (NTT-AT) |
Today, most of users care to protect against computer virus. However, some risks of contemporary computer viruses may a... [more] |
TM2005-41 pp.77-81 |
LOIS |
2005-05-13 09:00 |
Kagawa |
Sunport Hall Takamatsu |
Design and implementation of the system for supporting computer virus analysis Sachihiro Ichikawa (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.) |
This paper presents a design and implementation of automatic virus analysis support system. Shortening of virus analysis... [more] |
OIS2005-7 pp.1-6 |
LOIS |
2005-05-13 09:30 |
Kagawa |
Sunport Hall Takamatsu |
On constructing the virtual virus simulation system to analyze spreading and infection on wide network Ryoichi Isawa, Masami Mohri (The Univ. of Tokushima), Naoto Sone (Naruto Univ. of Edu.), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.) |
This paper presents a simulator to analyze behavior of virus, such as spreading and infection, on wide network. Network ... [more] |
OIS2005-8 pp.7-11 |
LOIS |
2005-05-13 10:00 |
Kagawa |
Sunport Hall Takamatsu |
Definition and its description method of virtual virus for P2P type simulation system Atsuko Imose (The Univ. of Tokushima), Naoto Sone (Naruto Univ, of Edu.), Ryoichi Isawa, Masami Mohri (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.) |
It is important to know the behavior of computer virus on network from the point of view of Anti-Virus in order to keep ... [more] |
OIS2005-9 pp.13-18 |
IN |
2005-02-17 14:15 |
Aichi |
Aichi University of Technology |
An Analysis of Computer Viruses Diffusion in Corporate Intranets Daisuke Uete, Takashi Okuda, Tetsuo Ideguchi (Aichi Prefectural Univ) |
In these years, information systems are widely used in modern society from education to business fields. So, computer vi... [more] |
IN2004-177 pp.19-24 |
ISEC, LOIS |
2004-11-09 13:25 |
Osaka |
Osaka Univ. |
Virtual Transmission Monitoring System for Behavior Analysis of Virus Toshihiko Hirooka (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima), Yuji Hoshizawa (Secure Brain), Koji Nakao (KDDI) |
The resarch of virus such as detection of virus, or behavior analysis of virus is active. It is difficult to know the be... [more] |
ISEC2004-92 OIS2004-59 pp.51-56 |
ISEC, IPSJ-CSEC |
2004-07-21 09:40 |
Tokushima |
Tokushima Univ. |
An E-mail Virus Diffusion Model Daisuke Satoh, Masato Uchida, Keisuke Ishibashi (NTT), Makoto Kobayashi (NSP) |
We propose a model of computer viruses that infect other computers by using e-mail. We assume that infection-ratio is co... [more] |
ISEC2004-42 pp.7-12 |