IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2017-11-10
Kumamoto Hotel Greenpia Minamiaso Evaluation of DDoS Mitigation Method based on Diffusion Flow Control
Kuya Taira, Chisa Takano, Kaori Maeda (HCU) IA2017-23
In recent years, a DDoS attack that intentionally sends a large amount of data from multiple computers to a specific org... [more] IA2017-23
Hiroshima Hiroshima city university Generation of Dropping Request Message by Identifying Source Addresses and Attributes of Attacking Packets
Mamoru Yogosawa, Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Tsuyoshi Ishikawa, Teruaki Tsutsumi, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno, Hiroyuki Kimiyama, Naoki Yonezaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) IA2016-69
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. It naturally lead us to switching ... [more] IA2016-69
ICSS, IA 2016-06-07
Saga Saga University An Experiment to Shut off DDoS Attacks on Testbed Simulating Autonomous Internet Security Infrastructure
Kishi Yuya, Eguchi Ken, Ishikawa Tsuyoshi, Suzuki Ryusei, Miyaguchi Yuki, Ohsawa Kazuo, Yogosawa Mamoru, Sano Kaoru, Yamaki Hiroshi, Ueno Yoichirou, Sasaki Ryoichi, Kobayashi Hiroshi (Tokyo Denki Univ) IA2016-9 ICSS2016-9
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. A shift in thinking is required fr... [more] IA2016-9 ICSS2016-9
IA 2016-01-29
Tokyo Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room Neutralization of malware-polluted IoT by limiting communications partners using MLB router
Yuto Yamamoto, Soushu Kawashita, Shingo Tanaka, Hiroshi Yamaki, Hiroshi kobayashi (Tokyo Denki Univ) IA2015-86
Security measures of IoT devices and social infrastructure have become urgent issues. A bidirectional white list to limi... [more] IA2015-86
LOIS, ISEC, SITE 2015-11-06
Kanagawa Kanagawa Univ. A Feasibility Study of Autonomous Security Infrastructure in the Internet
Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] ISEC2015-46 SITE2015-33 LOIS2015-40
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan