IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, IA
(Joint)
2023-12-21
10:40
Hiroshima Satellite Campus Hiroshima A Study of Temporal Network Analysis for Evaluating Worm Spreading in Vehicle-to-Vehicle Network
Yuji Watanabe, Yukio Ogawa, Kaoru Ota, Mianxiong Dong (Muroran-IT) IN2023-42
Vehicle-to-vehicle (V2V) communication is expected to revolutionize the driving experience by improving bothsafety and c... [more] IN2023-42
pp.13-18
IA, SITE, IPSJ-IOT [detail] 2018-03-06
11:15
Tochigi Kinugawa Onsen Hotel Study on Effect Testing of Persuasive Message Stimulating Computer Virus Measures based on Collective Protection Motivation Theory
Kana Shimbo, Komagome Tasuku, Takahashi Momomi, Harada Akane, Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.) SITE2017-74 IA2017-85
Numerous Internet users not recovering their infected PCs are reported. In order to have them recover their PCs, the pro... [more] SITE2017-74 IA2017-85
pp.205-208
RCS, RCC, ASN, NS, SR
(Joint)
2016-07-21
13:20
Aichi   [Encouragement Talk] The Effect of Network Topology on the Spread of Self-Evolving Botnets
Takanori Kudo (Setsunan Univ.), Tomotaka Kimura (Tokyo Univ. of Science), Yoshiaki Inoue (Osaka Univ.), Hirohisa Aman (Ehime Univ.), Kouji Hirata (Kansai Univ.) NS2016-63
As the previous work, we have proposed an epidemic model of new botnets
named self-evolving botnets that autonomously ... [more]
NS2016-63
pp.69-74
DC, CPSY 2015-04-17
14:50
Tokyo   [Special Invited Talk] On Hardware for high-speed pattern matching
Tsutomu Sasao (Meiji Univ.) CPSY2015-11 DC2015-11
High-speed pattern matching is implemented with conventional memories.
Using the concept of index generation function, ... [more]
CPSY2015-11 DC2015-11
pp.59-66
ISEC, LOIS, SITE 2014-11-22
09:25
Hyogo   Proposal of the measure behavior intention model in measure against a computer virus.
Sho Hamatsu, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.) ISEC2014-61 SITE2014-52 LOIS2014-31
In the field of information security, even though an individual might intend to take protective action under the virus i... [more] ISEC2014-61 SITE2014-52 LOIS2014-31
pp.33-37
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
09:50
Hokkaido   Proposal of Virtual Experimental System for Computer Virus Infection Situation
Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.), Toshio Takahshi (JEED) ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34
We have been researching individual behavior and consciousness under
computer virus infection. The situation under viru... [more]
ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34
pp.229-235
SITE, IPSJ-CE 2011-12-17
16:15
Shimane   Study on Consciousness and Behavior under Computer Virus Infection
Shun-ichi Kurino, Kazumi Ito, Yuki Ikeda, Noriaki Yoshikai (Nihon Univ.) SITE2011-30
We have been researching individual behavior and consciousness under computer virus infection. The situation under virus... [more] SITE2011-30
pp.29-34
ISEC 2007-12-19
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. Classification and feature extraction by using computer virus static analysis
Kazuki Iwamoto (JCSR), Katsumi Wasaki (Shinshu Univ.) ISEC2007-127
About the variant judgment of the computer virus, we consider the method of classification and feature extraction based ... [more] ISEC2007-127
pp.107-113
SAT 2007-04-20
16:00
Mie Mie University [Special Talk] Network Security between "an-zen" and "an-shin"
Masakatu Morii (Kobe Univ.) SAT2007-7
The author has been working in the field of Network Security and Cryptography. Recently it is in malware, computer virus... [more] SAT2007-7
pp.37-42
ISEC, SITE, IPSJ-CSEC 2006-07-20
15:20
Okayama Okayama Univ. A Proposal of Response Delay Method for Spam Mail from BOTNET
Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU)
Recently, increasing spam mails have been becoming causes of many problems. About 80 % of spam mails have been sent from... [more] ISEC2006-35 SITE2006-32
pp.191-197
ISEC, SITE, IPSJ-CSEC 2006-07-21
10:20
Okayama Okayama Univ. Proposal and Evaluation on Epidemiological Approach to Computer Virus
Ryoichi Sasaki (Dendai)
Because computer virus has evolved every moment, the range which encounters computer virus is expanded or damage has tur... [more] ISEC2006-48
pp.61-67
IN, ICM, LOIS
(Joint)
2006-01-20
09:50
Kyoto Kyoto Univ. A method for describing the data of computer virus and its behavior
Hideo Ichimiya, Atsuko Imose, Ryoichi Isawa, Sachihiro Ichikawa (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masami Mohri (The Univ. of Tokushima), Masakatu Morii (Kobe Univ.)
Each analysis result about computer virus output by various virus analysis systems, e.g. behavior analysis system and si... [more] OIS2005-81
pp.11-16
RECONF 2005-12-01
11:25
Fukuoka Kitakyushu International Conference Center Proposal of a virus check system using FPGA
Kei Shimane (Toho Univ.), Yosuke Iijima (Univ. Of Tsukuba), Eiichi Takahashi (AIST), Tatsumi Furuya (Toho Univ.), Tetsuya Higuchi (AIST)
As regular broadband connections to the Internet are now common in homes, private users need to take measures against va... [more] RECONF2005-63
pp.25-30
ICM, NS, CQ
(Joint)
2005-11-18
12:05
Shimane Kunibiki-messe (Matsue city) On the number of insecure users in protection against computer virus
Masaki Aida (Tokyo Metropolitan Univ.), Toru Sasaki (Tokyo Inst. Tech.), Chisa Takano (NTT-AT)
Today, most of users care to protect against computer virus. However, some risks of contemporary computer viruses may a... [more] TM2005-41
pp.77-81
LOIS 2005-05-13
09:00
Kagawa Sunport Hall Takamatsu Design and implementation of the system for supporting computer virus analysis
Sachihiro Ichikawa (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.)
This paper presents a design and implementation of automatic virus analysis support system. Shortening of virus analysis... [more] OIS2005-7
pp.1-6
LOIS 2005-05-13
09:30
Kagawa Sunport Hall Takamatsu On constructing the virtual virus simulation system to analyze spreading and infection on wide network
Ryoichi Isawa, Masami Mohri (The Univ. of Tokushima), Naoto Sone (Naruto Univ. of Edu.), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.)
This paper presents a simulator to analyze behavior of virus, such as spreading and infection, on wide network. Network ... [more] OIS2005-8
pp.7-11
LOIS 2005-05-13
10:00
Kagawa Sunport Hall Takamatsu Definition and its description method of virtual virus for P2P type simulation system
Atsuko Imose (The Univ. of Tokushima), Naoto Sone (Naruto Univ, of Edu.), Ryoichi Isawa, Masami Mohri (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.)
It is important to know the behavior of computer virus on network from the point of view of Anti-Virus in order to keep ... [more] OIS2005-9
pp.13-18
IN 2005-02-17
14:15
Aichi Aichi University of Technology An Analysis of Computer Viruses Diffusion in Corporate Intranets
Daisuke Uete, Takashi Okuda, Tetsuo Ideguchi (Aichi Prefectural Univ)
In these years, information systems are widely used in modern society from education to business fields. So, computer vi... [more] IN2004-177
pp.19-24
ISEC, LOIS 2004-11-09
13:25
Osaka Osaka Univ. Virtual Transmission Monitoring System for Behavior Analysis of Virus
Toshihiko Hirooka (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima), Yuji Hoshizawa (Secure Brain), Koji Nakao (KDDI)
The resarch of virus such as detection of virus, or behavior analysis of virus is active. It is difficult to know the be... [more] ISEC2004-92 OIS2004-59
pp.51-56
ISEC, IPSJ-CSEC 2004-07-21
09:40
Tokushima Tokushima Univ. An E-mail Virus Diffusion Model
Daisuke Satoh, Masato Uchida, Keisuke Ishibashi (NTT), Makoto Kobayashi (NSP)
We propose a model of computer viruses that infect other computers by using e-mail. We assume that infection-ratio is co... [more] ISEC2004-42
pp.7-12
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan