Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-09-21 17:30 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Implementation of Congestion-Avoiding Communication Method for HTTP/3 Applications Using OTA Updates in Vehicle Communication Devices Ryota Ogami, Yuichiro Hei, Takeshi Kitahara (KDDI) IA2023-19 |
In recent years, software-defined vehicle (SDV), meaning vehicles that can update functions via over-the-air (OTA), like... [more] |
IA2023-19 pp.49-53 |
NS |
2023-05-11 15:45 |
Tokyo |
Shinjuku Campus, Kogakuin University + Online (Primary: On-site, Secondary: Online) |
HTTP/3 Performance Evaluation Considering TLS Ryuichi Niitsu, Shintaro Kawai, Saneyasu Yamaguchi (Kogakuin Univ.) NS2023-12 |
HTTP/3 was released in 2022 and has been growing in importance. However, HTTP/3 is an evolving system and its performanc... [more] |
NS2023-12 pp.8-13 |
IN, NS (Joint) |
2023-03-03 09:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Detection Method of DoH Communications from Non-Encrypted Information at a Middlebox Yuya Takanashi, Shigetomo Kimura (Univ. of Tsukuba) IN2022-99 |
DNS over HTTPS (DoH) enhances users' privacy by encripting DNS
communications over HTTPS instead of plaintext. However... [more] |
IN2022-99 pp.199-204 |
IA, CQ, MIKA (Joint) |
2022-09-16 10:00 |
Hokkaido |
Hokkaido Citizens Actives Center (Primary: On-site, Secondary: Online) |
A Proposal of Congestion Avoidance Communication Method using Explicit Congestion Notification in HTTP/3 Applications Yuichiro Hei, Takeshi Kitahara (KDDI) IA2022-26 |
In recent years, a wide variety of devices, including smartphones and connected cars, have been equipped with communicat... [more] |
IA2022-26 pp.61-66 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 14:20 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
A proposal of detection system for malicious DoH communication generated by DGA-based malware Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) SITE2021-59 IA2021-72 |
(To be available after the conference date) [more] |
SITE2021-59 IA2021-72 pp.79-82 |
ICSS, IPSJ-SPT |
2022-03-07 15:00 |
Online |
Online |
Identification of website users using browser fingerprinting and network packet Takashi Tsukazaki, Yuichi Futa (TUT), Taku Yazawa (Dotexp) ICSS2021-66 |
Browser fingerprinting is gaining attention as a means of identifying website users. Browser fingerprinting is to identi... [more] |
ICSS2021-66 pp.44-48 |
CQ, CBE (Joint) |
2022-01-28 16:40 |
Ishikawa |
Kanazawa(Ishikawa Pref.) (Primary: On-site, Secondary: Online) |
Subjective experimental evaluation of the impact of choice-supportive bias on video viewing QoE Daichi Kominami (Osaka Univ.), Sayaka Nishide, Satoshi Nishimura (NHK), Tatsuya Otoshi, Masayuki Murata (Osaka Univ.), Masaaki Kurozumi, Daiki Fukudome, Masao Yamamoto (NHK) CQ2021-98 |
The demand for communication quality of service (QoS) from users and service providers has become even higher. However, ... [more] |
CQ2021-98 pp.120-125 |
ICSS |
2021-11-30 09:30 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Real-time detection of Distributed Slow HTTP DoS attacks using communication analysis Koki Tamura, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp) ICSS2021-54 |
At ICSS in this March, we proposed a detection method of Slow HTTP DoS Attacks with
distinguishment between communicat... [more] |
ICSS2021-54 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-02 11:30 |
Online |
Online |
Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes Koki Tamura, Yuichi Futa (TUT) ICSS2020-46 |
In this paper, We propose an attack detection system using multiple thresholds in order to increase the detection rate o... [more] |
ICSS2020-46 pp.120-125 |
CQ, CBE (Joint) |
2021-01-22 10:10 |
Online |
Online |
Improvement Using White List and QoS Control for SYN Cookie Method Riku Iwasaki, Shigetomo Kimura (Univ. of Tsukuba) CQ2020-93 |
In the SYN cookie method, when a system receives a TCP SYN packet, to protect against TCP SYN flood attacks in a statele... [more] |
CQ2020-93 pp.116-121 |
LOIS, EMM, IE, IEE-CMN, ITE-ME, IPSJ-AVM [detail] |
2020-09-01 16:55 |
Online |
Online |
Design of e-learining oriented video streaming system Kenichi Shimizu, Yasuhiko Higaki, Shigeo Fujimoto, Yasuo Sugai (Chiba Univ.) LOIS2020-7 IE2020-19 EMM2020-31 |
A practical on-demand video delivery system on Moodle was designed and developed for e-learning system for Chiba Univers... [more] |
LOIS2020-7 IE2020-19 EMM2020-31 pp.13-18 |
CS |
2017-07-27 09:30 |
Nagasaki |
Fukue Bunka Kaikan |
Problems and performance evaluation of application of MQTT to IoT Yuya Sasaki, Tetsuya Yokotani, Hiroaki Mukai (KIT) CS2017-12 |
In order to deploy IoT communication, active discussions have been performed between the industry, academia, and governm... [more] |
CS2017-12 pp.1-4 |
NS, IN (Joint) |
2017-03-03 09:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
A Study on Throughput Improvement of Communication using HTTP/2 on Network with High Latency and High Packet Loss Rate Naoki Oda, Saneyasu Yamaguchi (Kogakuin Univ.) NS2016-213 |
which is a new hypertext transfer protocol, has been proposed and documented. The protocol aims to solve HoL blocking pr... [more] |
NS2016-213 pp.319-324 |
CQ |
2017-01-20 13:15 |
Osaka |
Osaka University Nakanoshima Center |
A study for improving a goodput estimation method in video streaming services Takafumi Okuyama, Takuto Kimura, Arifumi Matsumoto (NTT) CQ2016-103 |
In the video distribution service using HTTP based Adaptive bitrate streaming technology, we have studied a method that ... [more] |
CQ2016-103 pp.75-80 |
ET |
2016-11-18 15:45 |
Shizuoka |
Plaza Verde |
Semi-Automated Attendance Checking System Using GPS, E-mailing, and Click Operation Kentaro Kato, Kazuma Obiya, Soma Sato (NIT) ET2016-64 |
This paper proposes the semi-automated attendance checking system using GPS, E-mailing, and click operation. This system... [more] |
ET2016-64 pp.53-56 |
NS, IN (Joint) |
2016-03-03 10:40 |
Miyazaki |
Phoenix Seagaia Resort |
Application Identification by Packet Inspection based on N-gram Masaki Hara, Shinnosuke Nirasawa (Kogakuin Univ.), Akihiro Nakao (Univ.Tokyo), Masato Oguchi (Ochanomizu Univ.), Shu Yamamoto (Univ.Tokyo), Saneyasu Yamaguchi (Kogakuin Univ.) NS2015-192 |
Application Identification is important for controlling quality of services in extremely crowded networks, such as a net... [more] |
NS2015-192 pp.139-144 |
IN, NS, CS, NV (Joint) |
2015-09-04 16:05 |
Iwate |
Iwate-ken Kokaido |
A Study on Network Architecture based on Architecture Evolution of the Internet Tetsuya Hishiki, Hiroshi Waki, Takumi Ohba, Arata Koike (NTT) IN2015-52 |
We focus on “middle entity”, which provides values to applications at the middle of end-to-end communication. We discuss... [more] |
IN2015-52 pp.69-74 |
ICSS |
2015-03-03 16:15 |
Okinawa |
Meio Univiersity |
Link Structural Analysis of Drive-by-Download Attacks Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70 |
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] |
ICSS2014-70 pp.43-48 |
NS |
2015-01-23 12:50 |
Tokyo |
Hachijo-cho-City-Hall |
An energy saving method for mobile devices by utilizing flash storage and a TCP/IP offload wireless LAN interface Hiroshi Nishimoto, Yuichiro Oyama, Takaomi Murakami, Takeshi Ishihara, Kotaro Ise (Toshiba) NS2014-170 |
Energy consumption during wireless communication has been a significant issue for mobile devices such as smart phones an... [more] |
NS2014-170 pp.45-50 |
ICSS, IPSJ-SPT |
2014-03-28 14:20 |
Okinawa |
Meio Univiersity |
Design of HTTP Communication Profiling for Infected Hosts Detection Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84 |
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] |
ICSS2013-84 pp.155-160 |