IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 60  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
TL 2022-03-13
Online Online Semiotic and Cognitive Interactions in Cyberspace/Heterotopia -- Cultural Appropriation, Cultural Aggression and Cultural Wars --
Yasunari Harada (Waseda U.)
Ignorance and negligence of linguistic, cultural and behavioral differences may lead to misunderstandings and unwanted c... [more] TL2021-46
ICSS, IPSJ-SPT 2022-03-07
Online Online am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities
Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] ICSS2021-58
IPSJ-AVM, CS, IE, ITE-BCT [detail] 2021-11-25
Online Online [Special Invited Talk] Beyond 5G Architecture and Technologies for Beyond 5G to Support Future Society in 2035 -- A White Paper on Beyond 5G Published from NICT and its Background --
Kentaro Ishizu (NICT) CS2021-64 IE2021-23
Beyond 5G is expected to be a system composed of variety of functions where dynamic system reconfiguration of the functi... [more] CS2021-64 IE2021-23
Online Online Angular-Frequency Wideband Spectrum Sensing based on Multi-Coset Sampling
Azril Haniz, Takeshi Matsumura, Fumihide Kojima (NICT) SR2021-21
For future 5G and Beyond 5G (B5G) networks employed in mmWave spectrum that use beamforming with massive MIMO arrays, it... [more] SR2021-21
IA, ICSS 2021-06-22
Online Online Etherpot: A honeypot for observing cyberattacks on Ethereum client
Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] IA2021-11 ICSS2021-11
ICSS, IPSJ-SPT 2021-03-01
Online Online Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] ICSS2020-32
ICSS 2020-11-26
Online Online Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more]
SR 2020-11-20
Online Online Advanced Radio Emulation System toward B5G Network Based on Cyber Physical Fusion -- Large-scale Virtual Radio Evaluation Testbed with Cyber and Physical Radio Nodes --
Takeshi Matsumura, Hirokazu Sawada, Fumihide Kojima, Toshiyuki Miyachi, Hiroaki Harai, Iwao Hosako (NICT), Jun-ichi Takada (Tokyo Tech), Hiroshi Harada (Kyoto Univ) SR2020-41
In the Society5.0 era, spectrum shortage and spectrum efficiency degradation will become more serious. To solve these pr... [more] SR2020-41
SANE 2020-04-22
Online Online Technical Trends -- MILCOM2019 Report etc. --
Haruko Kawahigashi (Mitsubishi Electric Corp.) SANE2020-1
We present oversea technical trends concerning the Electronic Warfare and the defense communication, based on the outlin... [more] SANE2020-1
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
Kochi Kochi University of Technology An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
AI 2019-07-22
Hokkaido   Modeling of Cyber Attack Based on POMDP
Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] AI2019-15
Osaka Osaka Univ. Library Dynamic Redundancy Switching Method of Network Paths for Tamper-Tolerant Networked Control
Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CS2019-1
According to the growing of information and communication technology (ICT), various kinds of things are connected to the... [more] CS2019-1
SANE 2019-04-16
Kanagawa Defense Academy; Defense Training Institute 55th Annual AOC International Symposium and Convention Report
Haruko Kawahigashi (Mitsubishi Electric Corp.) SANE2019-1
We present the outline of the 55th Annual AOC International Symposium and Convention held at Washington, DC, U.S.A. in N... [more] SANE2019-1
SITE, ISEC, LOIS 2018-11-04
Fukuoka   Introduction of PKI Electronic Authentication for Important IoT Devices -- For Establishment of Secure IoT Platform --
Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] ISEC2018-72 SITE2018-50 LOIS2018-32
CS 2018-07-12
Okinawa Eef Information Plaza (Kumejima Is.) [Special Invited Talk] Cyber Security: Lessons Learned from Actual Cases -- Recent Trends of Cyber Attacks and Effective Approaches --
Hiroo Suzuki, Tetsushi Morita (NTT) CS2018-34
In 5G/IoT era, cyber security is an indispensable element for the sound development of digital economy utilizing informa... [more] CS2018-34
SANE 2018-05-14
Tokyo Kikai-Shinko-Kaikan Bldg. 54th Annual AOC International Symposium and Convention Report
Haruko Kawahigashi (Mitsubishi Electric Corp.) SANE2018-1
We present the outline of the 54th Annual AOC International Symposium and Convention held at Washington, DC, U.S.A. in N... [more] SANE2018-1
Miyazaki Phoenix Seagaia Resort Development of an Emulation System for Autonomous and Distributed Internet Security Infrastructure
Masaya Shimode, Tomohiro Akasaki, Hiroyuki Kimiyama, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-236
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" for protecting our resources on the Inte... [more] NS2017-236
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
Tokyo   A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments
Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
SANE 2017-05-22
Tokyo Kikai-Shinko-Kaikan Bldg. [Special Talk] Recent Trends of EW -- EMS Domain and the Third Offset Strategy --
Kinya Sasaki (TSL) SANE2017-10
In this manuscript, we took a major modern warfare ,CSBA papers, the Third Offset Strategy paper, and highlight the sign... [more] SANE2017-10
Hiroshima Hiroshima city university Generation of Dropping Request Message by Identifying Source Addresses and Attributes of Attacking Packets
Mamoru Yogosawa, Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Tsuyoshi Ishikawa, Teruaki Tsutsumi, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno, Hiroyuki Kimiyama, Naoki Yonezaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) IA2016-69
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. It naturally lead us to switching ... [more] IA2016-69
 Results 1 - 20 of 60  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan