|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2023-03-14 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Assessment Method for Persistent Malware Infection on IoT Devices Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78 |
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] |
ICSS2022-78 pp.181-186 |
RECONF |
2016-05-19 17:30 |
Kanagawa |
FUJITSU LAB. |
[Invited Talk]
Overviews on key technologies to substantialize 'IoT society' Toshihiro Matsui, Hisashi Sekine, Hideki Hayashi, Hiroaki Ohkubo, Hirotaka Sunaguchi, Naoyuki Matsuo, Yoshitatsu Sato (NEDO TSC) RECONF2016-16 |
Regarding non-volatile memories, sensors, embedded software, and cyber security as the key components in the coming IoT ... [more] |
RECONF2016-16 pp.77-82 |
CPSY, IPSJ-EMB, IPSJ-SLDM, DC [detail] |
2015-03-06 13:25 |
Kagoshima |
|
Implementation evaluation of in-vehicle encrypted CAN communication and replay attack countermeasure technique Masashi Nakano, Takaya Kubota, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPSY2014-163 DC2014-89 |
As advanced electronic in-vehicle network has recently become prevalent as can be seen in such as safety driving support... [more] |
CPSY2014-163 DC2014-89 pp.7-12 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:30 |
Hokkaido |
San-Refure Hakodate |
Experimental Platform for CAN Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17 |
Embedded systems are used for various purposes and are widely prevalent.
It turned out that embedded systems for which ... [more] |
ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17 pp.81-87 |
ISEC |
2012-12-12 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Implementation and Evaluation of a Method for Preventing Unauthorized Data Transmission Masato Hata, Masato Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2012-74 |
There is a strong demand on enhancing the security of Controller Area Network (CAN) known as a major in-vehicle network.... [more] |
ISEC2012-74 pp.15-22 |
RCS, AN, MoNA, SR (Joint) |
2010-03-04 13:30 |
Kanagawa |
YRP |
[Panel Discussion]
Cloud Service from ACCESS Perspective Toshihiko Yamakami (ACCESS) MoMuC2009-80 AN2009-75 |
Cloud computijng is a service design paradigm, which enables use-based computing through Web services using utility comp... [more] |
MoMuC2009-80 AN2009-75 pp.39-41 |
SIP, CAS, CS |
2007-03-06 09:30 |
Tottori |
Blancart Misasa (Tottori) |
[Poster Presentation]
Construction and Verification of Secure IPv6 Remote Control System with Small Embedded Devices Syuhei Kawano, Takeshi Fujino (Ritsumeikan Univ.) CAS2006-102 SIP2006-203 CS2006-119 |
LCNA(Low Cost Network Appliance) with sensors, cameras, and actuators must be connected with networks in order to realiz... [more] |
CAS2006-102 SIP2006-203 CS2006-119 pp.43-48 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|