Communication-Information and Communication Management(Date:2013/05/02)

Presentation
表紙

,  

[Date]2013/5/2
[Paper #]
目次

,  

[Date]2013/5/2
[Paper #]
A Study of Electricity Consumption Metering System in the Place where Holding Events

,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.1,Vol.2013-IOT-21 No.1
An Implementation of SABA, an Underlying Technology of Pocket Switched Network, toward Achieving Resilient City

,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.2,Vol.2013-IOT-21 No.2
A Study of Analysis of Social Networking Data Stored by Pocket Switched Network for Making City Resilience

,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.3,Vol.2013-IOT-21 No.3
A Proposal of Communication Interface for Improvement of Reachability in Flood Disaster Situations

,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.4,Vol.2013-IOT-21 No.4
Detection Method for Android Malware by comparing Control Flow Graphs

KAZUKI IWAMOTO,  KATSUMI WASAKI,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.5,Vol.2013-IOT-21 No.5
A Dynamic Countermeasure Method to Android Malware by User Approval

MAKOTO KATO,  SAEKO MATSUURA,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.6,Vol.2013-IOT-21 No.6
How to Visualize DNS Traffic to Detect Malware-Infected Hosts

DAISUKE MAKITA,  KATSUNARI YOSHIOKA,  TSUTOMU MATSUMOTO,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.7,Vol.2013-IOT-21 No.7
A Safe Sandbox Analysis Method for Malware that Attempt Man-in-the-Browser Attacks

TATSUYA SEGAWA,  MASAKI KAMIZONO,  YUJI HOSHIZAWA,  KATSUNARI YOSHIOKA,  TSUTOMU MATSUMOTO,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.8,Vol.2013-IOT-21 No.8
IP Performance Monitoring System for ISPs

Atsuo TACHIBANA,  Masafumi WATARI,  Teruyuki HASEGAWA,  Shigehiro ANO,  

[Date]2013/5/2
[Paper #]ICM2013-1
Network analysis and Visualization of IP network

Takanori MIZUGUCHI,  

[Date]2013/5/2
[Paper #]ICM2013-2
The Operation and Management Architecture of Cisco Virtual Overlay Solution

Yoshihiko NAKAOKU,  

[Date]2013/5/2
[Paper #]ICM2013-3
ITシステムにおける障害対処迅速化を実現する障害原因解析技術(招待講演,サービス管理,運用管理技術,セキュリティ管理,及び一般)

,  

[Date]2013/5/2
[Paper #]ICM2013-4
Log management solution for Big Data Era

Masanori Yamaguchi,  

[Date]2013/5/2
[Paper #]ICM2013-5
Evaluation of sensor network simulation on shared key

RYO KANEKO,  KEIICHI IWAMURA,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.14,Vol.2013-IOT-21 No.14
Design and Evaluation of a Network Node for Traffic Reduction

SHUNSUKE FURUTA,  YUKI OTAKA,  AKIKO NARITA,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.15,Vol.2013-IOT-21 No.15
The new LEACH protocol balancing low power consumption and high security

SOMA SAITO,  KEIICHI IWAMURA,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.16,Vol.2013-IOT-21 No.16
正誤表

,  

[Date]2013/5/2
[Paper #]
Improvement and Evaluation of Certificates Collection process for Certificates management node

SYUNSUKE TSUNABUCHI,  NORIHITO YOSAKA,  TOMOYUKI NAGASE,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.17,Vol.2013-IOT-21 No.17
12>> 1-20hit(40hit)