|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, NWS (Joint) |
2021-01-22 13:30 |
Online |
Online |
[Encouragement Talk]
A Study on Detection and Prevention of Stealthy DNS Water Torture Attack Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116 |
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] |
NS2020-116 pp.31-36 |
NS |
2020-04-16 13:50 |
Online |
Online |
A Proposal of FQDN-based Whitelist Filter on DNS Cache Server against DNS Water Torture Attack Keita Hasegawa, Daishi Kondo, Hideki Tode (OPU) NS2020-2 |
A Distributed Denial of Service (DDoS) attack is a major social issue, and as one of the DDoS incidents, a Domain Name S... [more] |
NS2020-2 pp.7-12 |
SSS |
2018-06-20 13:00 |
Tokyo |
|
Application of Rationality diagnosis to Railway Signalling system
-- Application to Closing Signal machine -- Yusuke Takano, Takashi Kawano (JRE) SSS2018-7 |
The railway signal system is a system to prevent train collision and derailment and to support safe and stable transport... [more] |
SSS2018-7 pp.1-4 |
ICM |
2018-03-09 11:50 |
Okinawa |
|
[Encouragement Talk]
Evaluation of the improvement method on the regular expressions generator for the log monitoring Shinichiro Goto, Toyonori Fujiura, Masafumi Higuchi (NTT) ICM2017-72 |
We proposed the efficient generating method of whitelists for log monitoring, and showed its effectiveness. However, in... [more] |
ICM2017-72 pp.97-101 |
ICSS, IPSJ-SPT |
2017-03-13 16:15 |
Nagasaki |
University of Nagasaki |
A Study on Parameter Adjustment of Whitelist Detection Rule Takeshi Ueda (Mitsubishi Electric Corp.), Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ) ICSS2016-56 |
Recently, the whitelist detection rule has been used as security measures for various system such control systems.
Only... [more] |
ICSS2016-56 pp.97-102 |
ICM, LOIS |
2017-01-20 11:10 |
Nagasaki |
The Nagasaki Chamber of Commerce & Industry |
A Study on Improving the Operationality and the Performance of the Whitelist Generator Shinichiro Goto, Hiroki Miura, Tetsuaki Kamata, Toyonori Fujiura, Masayoshi Nose (NTT) ICM2016-51 LOIS2016-60 |
We have proposed a log filtering method using whitelists with numeric character regular expression, and validated it thr... [more] |
ICM2016-51 LOIS2016-60 pp.69-74 |
CQ, ICM, NS (Joint) |
2015-11-27 09:00 |
Niigata |
Niigata University |
An Automated Whitelist Generator for Log Monitoring Atsushi Sasaki, Toyonori Fujiura, Tetsuaki Kamata, Yuzuru Mori (NTT) ICM2015-22 |
We have traditionally monitored log messages in system managements mainly with a blacklist, whether the log messages coi... [more] |
ICM2015-22 pp.27-32 |
IA |
2006-07-20 16:50 |
Kanagawa |
Kanagawa University (Minatomirai, KU Port-Square) |
An automatic generator of static whitelists in the milter-greylist system Yoshitsugu Matsubara, Shin-ichi Tadaki (Saga Univ.) IA2006-18 |
The milter-greylist, an anti-spam, system has a mechanism which allows mails to bypass the greylisting if their senders,... [more] |
IA2006-18 pp.43-45 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|