IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 31  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Analyzing Cybersecurity Datasets -- Enhancing Security throughout the Data Life Cycle --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] IA2023-63
pp.37-39
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:40
Hokkaido Hokkaido Jichiro Kaikan A Multiple Vantage Point-based Concept for Open-Source Information Space Awareness
Blumbergs Bernhards (NAIST) ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34
The proposed concept bolsters visibility and provides context to cyber incident response teams countering malicious acti... [more] ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34
pp.133-140
WPT, AP
(Joint)
2021-01-21
13:30
Online Online [Invited Lecture] [Invited Lecture]Proposal of a simple outdoor to indoor penetration propagation loss model considering horizontal and vertical incident angles in the 0.9/2.3/5.1GHz band
Yuta Mizuno, Kentaro Nishimori, Ryotaro Taniguchi, Yuki Igarashi (Niigata Univ.) AP2020-104
Recently, the next generation (5-th generation: 5G) mobile communication systems have been actively investigated all ove... [more] AP2020-104
pp.7-12
ICSS 2020-11-26
15:00
Online Online Initial Study of Incident Response Support System for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] ICSS2020-22
pp.17-20
US 2019-08-28
15:20
Tokyo   Study on the estimation of seismic wave velocity of seafloor surface and the localization of low frequency sound source on sea surface around Japan Trench -- Analysis of the received waveform of airgun by accelerometer at S-net station --
Ryoichi Iwase (JAMSTEC) US2019-42
A submarine cabled observatory "S-net" (Seafloor observation network for earthquakes and tsunamis along the Japan Trench... [more] US2019-42
pp.27-31
SITE, ISEC, LOIS 2018-11-04
11:00
Fukuoka   Development of named entity recognition and polarity analysis function for security incidents.
Shinta Nakano, Daisuke Uto, Yuichiro Kurosawa, Masaki Hanada, Yoichi Murakami, Eiji Nunohiro (TUIS) ISEC2018-74 SITE2018-52 LOIS2018-34
The authors focused on analyzing the information related to security incidents from articles on news sites published on ... [more] ISEC2018-74 SITE2018-52 LOIS2018-34
pp.57-62
ICTSSL 2018-07-17
13:25
Tokyo NTT Musashino R&D Center Study on Estimating Risk in Incident Response by Analyzing Flows of Communication logs
Naoko Kosaka, Akira Koyama, Tsuneko Kura, Yoshihiro Yoshida, Koji Kishi (NTT) ICTSSL2018-17
The emergency management handled by the staffs in decision making and planning layers of the organization can be broadly... [more] ICTSSL2018-17
pp.7-12
KBSE 2018-03-02
16:30
Okinawa   Analysis of “Hiyari-Hatto” Incidents Reported by Maintenance Service Engineers
Nobuhiko Mizusawa (Fujitsu Fsas), Takako Nakatani (OUJ) KBSE2017-63
The purpose of the research is to reduce “Hiyari-Hatto” incidents of hardware maintenance service engineers (hereinafter... [more] KBSE2017-63
pp.145-150
IN 2018-01-23
14:50
Aichi WINC AICHI BPM Estimation of Anime Incidental Music by Multiple Regression Analysis of Spoken Lines
Yuta Ito, Komei Arasawa, Shun Hattori (Muroran Inst. of Tech.) IN2017-88
Incidental music is background music of TV drama, anime, films, Plays, and so forth, and it is an important element to d... [more] IN2017-88
pp.97-102
MoNA, LOIS, IPSJ-DC 2017-07-06
14:30
Tokyo   Information sharing and interorganizational collaboration on management of large-scale international sports tournaments and incident response
Naoko Kosaka, Akira Koyama, Tsuneko Kura, Koji Kishi (NTT), Tadayoshi Maruyama, Koichi Takamatsu (Organising Committee) MoNA2017-11 LOIS2017-9
Various risks are assumed at large international sporting events depending on the environment of the venue. The main tas... [more] MoNA2017-11 LOIS2017-9
pp.21-26
ICSS, IPSJ-SPT 2017-03-13
13:25
Nagasaki University of Nagasaki Modeling of Attack Activity for Integrated Analysis of Threat Information
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] ICSS2016-47
pp.7-12
KBSE 2017-03-04
13:20
Ishikawa   Analysis and Consideration on Human Errors Using Text-Mining Techniques Based on Reported Incidents
Nobuhiko Mizusawa (Fujitsu Fsas/OUJ), Takeo Tatsumi (OUJ), Yuko Murakami (Tohoku Univ.), Takako Nakatani (OUJ) KBSE2016-48
Recently, information systems as part of important social infrastructure used to support human lives are highly complexe... [more] KBSE2016-48
pp.55-60
ICSS, IPSJ-SPT 2016-03-03
16:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling
Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) ICSS2015-53
Organization introducing ICT systems needs to properly respond to the information security incidents. In contrast, recen... [more] ICSS2015-53
pp.35-40
ICSS 2015-11-26
14:10
Fukushima AIST, Fukushima Renewable Energy Institute A Traffic Analysis to Identify Unintended Impact on Business Caused by an Incident Response
Minori Shiota, Yukiko Yamaguchi, Hajime Shiimada (Nagoya Univ), Hiroki Takakura (NII) ICSS2015-36
To confront recent sophisticated targeted attacks, we have to prevent the theft of information and the destruction of th... [more] ICSS2015-36
pp.7-12
MW
(2nd)
2014-11-26
- 2014-11-28
Overseas King Mongkut's Institute of Technology Ladkrabang (KMITL), Bangkok Analysis of Electromagnetic Diffraction from Planar Material Junction by Using an Approximate UTD Ray Solution
Montree Saowadee, Titipong Lertwiriyaprapa, Suramate Chalermwisutkul (KMUTNB)
An approximate UTD ray solution of an oblique incident wave for analyzing an electromagnetic (EM) wave diffracted by a p... [more]
ICSS 2011-03-25
10:45
Tokyo Suspended Proposal of an Order Preserving Encryption for Anonymity
Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) ICSS2010-57
The study of Order Preserving Encryption (OPE) is focusing much attention by researchers. OPE is able to anonymize the n... [more] ICSS2010-57
pp.5-10
ICSS 2010-11-05
11:20
Hiroshima Hiroshima City University Proposal of Time-limited Key Management Scheme Using One-way Functions
Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] ICSS2010-46
pp.11-15
IA, ICSS 2010-06-17
15:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II)
Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] IA2010-6 ICSS2010-6
pp.31-36
ICSS 2010-03-26
16:20
Fukuoka The University of Kitakyushu Relative Analysis of Malware Behavior based on Function Calls in Parallel Threads
Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-68
The Internet has been surrounded by various security threats. Malwares, such as computer virus, worm and bot, always pla... [more] ICSS2009-68
pp.35-39
NLC 2010-01-26
11:15
Hiroshima Machizukuri Shimin Kouryu Plaza, Hiroshima City Analytical system of incident reports by concept lattice
Takahiro Baba, ChunLing Liu, Sachio Hirokawa (Kyushu Univ) NLC2009-46
It is known that a lot of incidents has happened ahead of a serious
accident. Such experiences have been collected in m... [more]
NLC2009-46
pp.79-83
 Results 1 - 20 of 31  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan