Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
CS2007-16
[Tutorial Invited Lecture]
What's technology needed for Information Security?
Suguru Yamaguchi (Nara Institute of Science and Technology)
p. 1
CS2007-17
Development of a home gateway management system based on TR-069
Naoki Matsuoka, Tomohiro Ishihara (Fujitsu Labs.)
pp. 3 - 8
CS2007-18
Detector Selection Method for Detecting Malicious Nodes in Wireless Sensor Networks
Hiroshi Tsunoda (Tohoku Univ.), Ake Olbert, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.)
pp. 9 - 14
CS2007-19
A Network Application Identification Method Using Similarity of Packet Payloads
Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.)
pp. 15 - 20
CS2007-20
An Enhancement of Network Anomaly Detection Method Using Occurence Probability Matrices of Correlation Coefficients
Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.)
pp. 21 - 26
CS2007-21
A study on Remote Power-Monitoring system using PLC
Tomotake Hiraoka, Masahiro Fujii, Yu Watanabe (Utsunomiya Univ.)
pp. 27 - 32
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.