IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 28  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS 2024-03-14
13:40
Okinawa Okinawa Pref Danjyo-Kyoudou-Sankaku Center
(Primary: On-site, Secondary: Online)
LOIS2023-64 Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] LOIS2023-64
pp.96-101
ICSS, IPSJ-SPT 2021-03-01
11:30
Online Online Method of Similarity Evaluation among Incidents for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] ICSS2020-31
pp.31-36
ICSS, IPSJ-SPT 2021-03-01
11:55
Online Online Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] ICSS2020-32
pp.37-42
ICSS 2020-11-26
15:00
Online Online Initial Study of Incident Response Support System for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] ICSS2020-22
pp.17-20
ICSS 2020-11-26
15:25
Online Online Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more]
ICSS2020-23
pp.21-25
CS, IN, NS, NV
(Joint)
2020-09-11
09:25
Online Online A virtual-network replacing scheme for achieving a metabolic network
Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2020-24
A future targeted attacks would infect a network with a malware program and then tampers packet-forwarding routes. As a ... [more] IN2020-24
pp.13-18
NS, IN
(Joint)
2020-03-05
11:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
An inheritance scheme of dynamic routing information for achieving successive replacing of virtual routers
Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2019-93
In future targeted attacks, malware programs infected in routers may cause various problems. Thus, we have proposed a sc... [more] IN2019-93
pp.103-108
NS, ICM, CQ, NV
(Joint)
2019-11-21
16:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Trends and Countermeasures of Cyber Attacks -- Introduction to Cyber Security for Network Engineers --
Yukiko Yano (NEC) CQ2019-93
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] CQ2019-93
p.27
NS, IN, CS, NV
(Joint)
2019-09-06
11:15
Miyagi Research Institute of Electrical Communication, Tohoku Univ. A Study on Features Derived from Cache Property for DNS Tunneling Detection
Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] NS2019-93
pp.25-30
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
10:20
Kochi Kochi University of Technology An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
pp.7-14
ICSS, IPSJ-SPT 2018-03-08
11:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Classification for Important Decoy Documents Based on Supervised Learning
Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-72
In recent targeted e-mail attacks, attackers often send their target organization an email with a malware disguised as a... [more] ICSS2017-72
pp.127-132
NS, IN
(Joint)
2018-03-01
09:20
Miyazaki Phoenix Seagaia Resort A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] IN2017-90
pp.5-10
IA 2017-11-16
11:05
Overseas KMITL, Bangkok, Thailand A Proposal of Dynamic Access Control with SDN for Practical Network Separation
Satoki Nakamura (NIT), Hirokazu Hasegawa (Nagoya Univ.), Yuichiro Tateiwa (NIT), Hiroki Takakura (NII), Yonghwan KIM, Yoshiaki Katayama (NIT) IA2017-45
As one of effective countermeasures against recent sophisticated cyber attacks, many researches have paid attention to n... [more] IA2017-45
pp.65-69
RCS, IN, NV
(Joint)
2017-05-12
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] IN2017-5
pp.21-24
IA, SITE, IPSJ-IOT [detail] 2017-03-03
15:40
Okinawa Culture Resort Festone (Okinawa) Struggling against New-Born Malwares Attached to Mails
Motoyuki Ohmori, Naoki Miyata, Kiyoyuki Nakashima, Kenichi Takahashi (Tottori Univ.) SITE2016-70 IA2016-100
We, Tottori University, have been experiencing targeted attacks using malicious mails especially since fiscal year 2016.... [more] SITE2016-70 IA2016-100
pp.51-56
IA, IN
(Joint)
2016-12-16
13:20
Hiroshima Hiroshima city university A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures
Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] IN2016-82
pp.91-96
ICSS, IPSJ-SPT 2016-03-03
13:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents
Natsuko Kawakami, Ryota kikkawa, Ying Tie, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
In recent targeted cyberattacks, targeted malware display embedded or downloaded decoy documents upon their execution as... [more]
ICSS, IPSJ-SPT 2016-03-04
11:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Suspicious Processes Detection Scheme using Process Frequency and Network State
Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-60
pp.77-82
ICSS, IPSJ-SPT 2016-03-04
11:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention
Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) ICSS2015-61
Recently, there are many malware measures such as targeted attacks, communicate with C&C servers, file creation, executi... [more] ICSS2015-61
pp.83-88
NS, IN
(Joint)
2016-03-04
13:10
Miyazaki Phoenix Seagaia Resort A Study of Data Leak Prevention Mechanism by Network Monitoring using SDN
Kosa Sato, Yuji Sekiya (The Univ. of Tokyo) IN2015-139
Data leakage due to cyber attacks called targeted attacks and e-mail wrong transmission has become a major problem in re... [more] IN2015-139
pp.183-188
 Results 1 - 20 of 28  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan