IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 27  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
pp.332-336
NS, IN
(Joint)
2024-03-01
10:45
Okinawa Okinawa Convention Center A Comprehensive Analysis of Handshake as a Blockchain-based DNS
Katsuki Isobe, Daishi Kondo, Hideki Tode (OMU) NS2023-199
There are concerns about the risk of domain squatting on the alternative technologies to the domain name system (DNS) us... [more] NS2023-199
pp.160-165
ICM, NS, CQ, NV
(Joint)
2023-11-21
10:20
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
Let's ENScrypt
Yuji Suga (IIJ) NS2023-111
We considered a service that issues X.509 certificates for ENS-based domains. When deploying a key to a Web server, it i... [more] NS2023-111
p.13
IA 2023-09-21
14:15
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis
Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] IA2023-12
pp.6-10
AP, SANE, SAT
(Joint)
2022-07-27
15:30
Hokkaido Asahikawa Taisetsu Crystal Hall
(Primary: On-site, Secondary: Online)
Time Reversal Algorithm Position Estimation of Cylindrical Target/s Using Direct Path and Multipath Cross-correlation
Hanns Christian Jaurigue Chua, Keizo Cho, Hiroaki Nakabayashi, Koji Suizu (Chiba Inst. of Tech) AP2022-43
This research proposes the usage of the time-reversal algorithm to estimate one and two passive thin cylindrical targets... [more] AP2022-43
pp.50-55
NS 2021-05-13
14:25
Online Online A Study on Privacy Concerns by Single-Word Search Query Leakage from Web Browsers through Domain Name System
Katsuki Isobe, Daishi Kondo, Hideki Tode (OPU) NS2021-18
Some web browsers used in some specific computers have a specification that a single-word search query (a word that cont... [more] NS2021-18
pp.20-25
KBSE 2021-01-23
15:00
Online Online Consideration of evaluation datasets for DNS tunnel detection research
Tetsuya Asakura, Takeo Tatsumi (OUJ) KBSE2020-32
In this research, we considered of evaluation datasets for dns tunnel detection research.
In this field, there are not ... [more]
KBSE2020-32
pp.19-24
ISEC, IT, WBS 2020-03-10
13:25
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Research on DNS tunnel detection by machine learning using appearance characters -- Consideration of implementation of evaluation program --
Tetsuya Asakura, Takeo Tatsumi (OUJ) IT2019-103 ISEC2019-99 WBS2019-52
In this study, we considered an implementation a detection technique of DNS tunnel.
This detection techniqe is likely t... [more]
IT2019-103 ISEC2019-99 WBS2019-52
pp.87-94
IA, SITE, IPSJ-IOT [detail] 2020-03-02
14:05
Online Online Implementation and Evaluation of Detection and Blocking System against DGA-based Bot by Focusing on NXDOMAIN Responses
Yuki Iuchi (Hokkaido Univ.), Yong Jin, Hikaru Ichise (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2019-89 IA2019-67
Recently, security attacks caused by a bot have been widely spreading. In this research, we aim to detect and block Doma... [more] SITE2019-89 IA2019-67
pp.7-12
ISEC, SITE, LOIS 2019-11-02
15:25
Osaka Osaka Univ. Research on DNS tunnel detection by machine learning using appearance characters
Tetsuya Asakura, Takeo Tatsumi (OUJ) ISEC2019-84 SITE2019-78 LOIS2019-43
In this study, as a detection technique of DNS tunnel, it was tried to detect abnormal DNS query string by machine learn... [more] ISEC2019-84 SITE2019-78 LOIS2019-43
pp.141-148
ICSS, IPSJ-SPT 2019-03-07
16:15
Okinawa NICT Okinawa Electromagnetic Technology Center Analyzing Deceptive Internationalized Domain Names
Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] ICSS2018-76
pp.47-52
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2018-12-06
11:20
Hiroshima Satellite Campus Hiroshima An FPGA-NIC Based 40-Gbit/s Automated Response Circuit for Invalid DNS Packets to Suppress CPU Utilization of DNS Content Server
Shoko Ohteru, Saki Hatta, Tomoaki Kawamura (NTT), Koji Yamazaki (NTT-AT), Takahiro Hatano, Akihiko Miyazaki, Koyo Nitta (NTT) VLD2018-55 DC2018-41
(To be available after the conference date) [more] VLD2018-55 DC2018-41
pp.113-118
DE 2017-06-23
13:40
Tokyo   Analyzing trend of foods using multidomain data
Masashi Anzawa, Sosuke Amano, Kiyoharu Aizawa (Univ. of Tokyo), Makoto Ogawa (foo.log), Shin'ichi Satou (NII) DE2017-2
People's diet is influenced variously such as social and cultural factors. the trend of meal changes by TV and SNS besid... [more] DE2017-2
pp.7-10
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
EMCJ, IEE-EMC 2014-12-19
16:40
Shizuoka Shizuoka Univ. [Special Talk] SI/PI/EMI Simulation Techniques and Their Exploitation for Chip/Package/Board/Chassis Co-design -- Multi-domain Simulation --
Hideki Asai (Shizuoka Univ.) EMCJ2014-83
With the progress of system integration technology, so-called signal/power integrity (SI/PI) and EMI
(Electromagnetic I... [more]
EMCJ2014-83
p.81
ICSS, IPSJ-SPT 2014-03-28
11:40
Okinawa Meio Univiersity DNS Traffic Analysis Platform with Hadoop Framework
Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] ICSS2013-80
pp.131-135
NS, IN
(Joint)
2013-03-07
09:20
Okinawa Okinawa Zanpamisaki Royal Hotel A proposal of a tree type ring network transporting E-mail packets by domain name of mail server and fixed telephone number address
Hideo Tatsuno, Hiroshi Yasukawa (Aichi Pref. Univ.), Tsuneo Mizuno (Mizuno International Intellectual Property Firm) NS2012-201
This paper proposes a tree type ring network transporting E-mail packets by domain name of mail server and fixed telepho... [more] NS2012-201
pp.207-212
CQ, ICM, NS
(Joint)
2012-11-15
15:45
Shiga Nagahama Inst. of Bio-Science and Tech. [Tutorial Lecture] Current issues of resource management in the Internet
Shigeki Goto (Waseda Univ.) NS2012-109 CQ2012-63 ICM2012-30
This paper describes the current issues concerning resource management in the Internet. We discuss several topics based... [more] NS2012-109 CQ2012-63 ICM2012-30
pp.33-34(NS), pp.33-34(CQ), pp.9-10(ICM)
IA, SITE, IPSJ-IOT [detail] 2012-03-15
14:45
Hokkaido Hokkaido Univ. Desired management method of the domain names from the viewpoint of the self governance in the Internet
Yuna Fujita, Yukio Hiramatsu (OIT) SITE2011-37 IA2011-87
Internet systems haves been managed and operated based on self-governance in general. Domain name system is one of such ... [more] SITE2011-37 IA2011-87
pp.89-94
SS 2012-03-14
11:40
Okinawa Tenbusu-Naha Design and Implementation of Domain-Specific Language for Mining Software Repositories
Kazuhiro Yamashita, Daisuke Yamamoto, Yasutaka Kamei, Kenji Hisazumi, Naoyasu Ubayashi (Kyushu Univ.) SS2011-81
To improve the effectiveness of the process for collecting and pre-processing data from software repositories,
we desig... [more]
SS2011-81
pp.145-150
 Results 1 - 20 of 27  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan