Communication-Information and Communication Management(Date:2014/05/15)

Presentation
Evaluation of Drive-by-Download attack prediction using Naive Bayes

TAKASHI ADACHI,  KAZUMASA OMOTE,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.19,Vol.2014-IOT-25 No.19
A Proposal for Device Functions Virtualization Framework

Yukio KOIKE,  Hiroaki KAWATA,  Yoshihisa ITO,  Takeshi MATSUMOTO,  Takuya MURAYAMA,  Toru NAKANISHI,  

[Date]2014/5/15
[Paper #]ICM2014-3
A Study of Multi-protocol Control Method for Device Functions Virtualization

Takeshi MATSUMOTO,  Yoshihisa ITO,  Takuya MURAYAMA,  Yukio KOIKE,  Hiroaki KAWATA,  Toru NAKANISHI,  

[Date]2014/5/15
[Paper #]ICM2014-4
A Study of API Delivery and Authentication Method for Device Functions Virtualization

Yoshihisa ITO,  Takeshi MATSUMOTO,  Takuya MURAYAMA,  Yukio KOIKE,  Hiroaki KAWATA,  Toru NAKANISHI,  

[Date]2014/5/15
[Paper #]ICM2014-5
A study of device identifier management method for Device Functions Virtualization

Takuya MURAYAMA,  Yoshihisa ITO,  Takeshi MATSUMOTO,  Yukio KOIKE,  Hiroaki KAWATA,  Toru NAKANISHI,  

[Date]2014/5/15
[Paper #]ICM2014-6
Discussion about multi-homing of home networks

TOMOHIRO FUJISAKI,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.24,Vol.2014-IOT-25 No.24
Disaster communications and Visual information heavesting

NAOTO MATSUMOTO,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.25,Vol.2014-IOT-25 No.25
Extension and design of a virtualization infrastracture in Osaka University

HIROKI KASHIWAZAKI,  SEIJI MIYANAGA,  ICHIROU MORIHARA,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.26,Vol.2014-IOT-25 No.26
A performance evaluation of hybrid cloud infrastructure considering user's location

Taimei Ikeda,  Tatsuhiko Iwase,  Yasuhiro Yamamoto,  Shinichi Okano,  

[Date]2014/5/15
[Paper #]ICM2014-7
A Study on Application of Model Driven Architecture in Development of Operation Support Systems

Manabu NISHIO,  Naoki TAKE,  

[Date]2014/5/15
[Paper #]ICM2014-8
A Report on International Conference NDSS2014

Hiroaki ANADA,  Koichi MOURI,  Akira YAMADA,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.29,Vol.2014-IOT-25 No.29
Winnyネットワークにおけるクラスタリングを用いたインデックスポイゾニングの検討(サービス管理,運用管理技術,セキュリティ管理及び一般)

,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.30,Vol.2014-IOT-25 No.30
SSL/TLS servers status survey about enabling forward secrecy : + Rapid survey after the Heartbleed bug

YUJI SUGA,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.31,Vol.2014-IOT-25 No.31
ICM研究専門委員会からのお知らせ

,  

[Date]2014/5/15
[Paper #]
複写される方へ

,  

[Date]2014/5/15
[Paper #]
Notice for Photocopying

,  

[Date]2014/5/15
[Paper #]
奥付

,  

[Date]2014/5/15
[Paper #]
裏表紙

,  

[Date]2014/5/15
[Paper #]
<<12 21-38hit(38hit)