IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2021-03-01
11:55
Online Online Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] ICSS2020-32
pp.37-42
ICSS 2020-11-26
15:25
Online Online Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more]
ICSS2020-23
pp.21-25
NS, ICM, CQ, NV
(Joint)
2019-11-21
16:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Trends and Countermeasures of Cyber Attacks -- Introduction to Cyber Security for Network Engineers --
Yukiko Yano (NEC) CQ2019-93
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] CQ2019-93
p.27
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
10:20
Kochi Kochi University of Technology An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
pp.7-14
NS, IN
(Joint)
2018-03-01
09:20
Miyazaki Phoenix Seagaia Resort A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] IN2017-90
pp.5-10
IA 2017-11-16
11:05
Overseas KMITL, Bangkok, Thailand A Proposal of Dynamic Access Control with SDN for Practical Network Separation
Satoki Nakamura (NIT), Hirokazu Hasegawa (Nagoya Univ.), Yuichiro Tateiwa (NIT), Hiroki Takakura (NII), Yonghwan KIM, Yoshiaki Katayama (NIT) IA2017-45
As one of effective countermeasures against recent sophisticated cyber attacks, many researches have paid attention to n... [more] IA2017-45
pp.65-69
IA, IN
(Joint)
2016-12-16
13:20
Hiroshima Hiroshima city university A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures
Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] IN2016-82
pp.91-96
ICSS, IPSJ-SPT 2016-03-03
13:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents
Natsuko Kawakami, Ryota kikkawa, Ying Tie, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
In recent targeted cyberattacks, targeted malware display embedded or downloaded decoy documents upon their execution as... [more]
ICSS, IPSJ-SPT 2016-03-04
11:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention
Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) ICSS2015-61
Recently, there are many malware measures such as targeted attacks, communicate with C&C servers, file creation, executi... [more] ICSS2015-61
pp.83-88
NS, IN
(Joint)
2016-03-04
13:10
Miyazaki Phoenix Seagaia Resort A Study of Data Leak Prevention Mechanism by Network Monitoring using SDN
Kosa Sato, Yuji Sekiya (The Univ. of Tokyo) IN2015-139
Data leakage due to cyber attacks called targeted attacks and e-mail wrong transmission has become a major problem in re... [more] IN2015-139
pp.183-188
ICSS, IA 2014-06-05
15:15
Hyogo Takikawa Memorial Hall, Kobe University [Invited Talk] Threat and Countermeasure Against the Targeted Attack
Satoru Torii (Fujitsu Labs.) IA2014-2 ICSS2014-2
A lot of incidents by crafty cyber-attacks such as a targeted attack are made public. To confront such novel cyber-attac... [more] IA2014-2 ICSS2014-2
pp.7-8
SSS 2012-03-16
15:40
Tokyo Meiji Univ. Targeted Email Attack
Takehiko Nakayama (National Police Agency) SSS2011-29
Targeted e-mail attack is a form of attacks sending malicious e-mail to specific individual or company and it is very hu... [more] SSS2011-29
pp.17-18
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan