|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-81 pp.87-92 |
ICSS, IPSJ-SPT |
2023-03-14 10:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74 |
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] |
ICSS2022-74 pp.157-162 |
IA |
2021-09-08 15:15 |
Online |
Online |
Detection and blocking system for suspicious DNS outbound query using RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24 |
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] |
IA2021-24 pp.59-64 |
IN, ICTSSL, NWS (Joint) |
2016-10-20 13:55 |
Osaka |
Osaka Uinv. |
Malicious Wifi AP Detection Using Similarity of Relay Traffic Toshiaki Harada, Tatsuya Mori (Waseda Univ.) IN2016-52 |
The spread of public WiFi service causes the threat of malicious wireless access points (APs). Malicious APs pretends to... [more] |
IN2016-52 pp.19-24 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 10:50 |
Fukushima |
|
Analysis of direct outbound queries in DNS and consideration of malicious traffic detection method Hikaru Ichise, Yong Jin, Katsuyoshi Iida (Tokyo Inst. of Tech) SITE2014-74 IA2014-106 |
Direct outbound DNS queries from inside PCs to outside computers without any authority information are not considered as... [more] |
SITE2014-74 IA2014-106 pp.173-178 |
ICSS |
2013-03-25 13:00 |
Kanagawa |
Yokohama National University |
Finding Malicious Authoritative DNS Servers Yin Minn Pa Pa, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-61 |
This study proposes an approach to find authoritative DNS servers that are heavily involved with
malicious online activ... [more] |
ICSS2012-61 pp.25-30 |
NS, IN (Joint) |
2012-03-09 09:30 |
Miyazaki |
Miyazaki Seagia |
Discriminating malcious packets using TTL in the IP header Ryo Yamada, Kazuhiro Tobe, Shigeki Goto (Waseda University) IN2011-176 |
It is known that an IP packet passes through less than 30 routers before it reaches the destination host. According to o... [more] |
IN2011-176 pp.235-240 |
NS |
2006-10-25 15:45 |
Gunma |
Kiryu City Performing Arts Center |
[Encouragement Talk]
Analysis of Malicious Traffic in the mobile network Masashi Yamashita, Yuji Chikahiro, Kazuo Sugiyama (NTT DoCoMo) NS2006-111 |
As the mobile network evolutes to be “ubiquitous”, we have faced a paradigm shift: the interfaces of the mobile terminal... [more] |
NS2006-111 pp.69-72 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|