Mon, Nov 21 PM Opening 13:00 - |
|
13:00-13:05 |
Opening Address ( 5 min. ) |
Mon, Nov 21 PM Measuring, Controlling 13:05 - 14:20 |
(1) |
13:05-13:30 |
Investigation of the Impact of Beacons by Unused Access Points on Wireless LAN Communication |
Sayaka Ono, Hitomi Tamura (FIT), Kazuya Tsukamoto (KIT) |
(2) |
13:30-13:55 |
Complementary Data Transmission Control Method for Large Spatio-Temporal Data Retention |
Hotaka Kaneyasu, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga (KIT) |
(3) |
13:55-14:20 |
Massive & Passive RTT Estimation |
Kaito Sawada (Keio), Ryo Nakamura (UTokyo), Keisuke Uehara (Keio) |
|
14:20-14:30 |
Break ( 10 min. ) |
Mon, Nov 21 PM SR-TE 14:30 - 15:20 |
(4) |
14:30-14:55 |
A Study of Application Identification Schemes and Impact on Video Transmission Quality in The Customer and Application-Aware SR-TE Framework |
Ryunosuke Saito, Harunobu Yoshida, Shintaro Ishihara, Toyokazu Akiyama, Kazumasa Kobayashi (Kyoto Sangyo Univ.), Wataru Mishima (NTT Com) |
(5) |
14:55-15:20 |
Proposal of SR-TE framework controllable by customer and application unit, and a discussion on an implementation method of Per-Flow Steering |
Harunobu Yoshida, Ryunosuke Saito, Shintaro Ishihara, Toyokazu Akiyama, Kazumasa Kobayashi (Kyoto Sangyo Univ.), Wataru Mishima (NTT Com) |
|
15:20-15:30 |
Break ( 10 min. ) |
Mon, Nov 21 PM Information Security 15:30 - 16:45 |
(6) |
15:30-15:55 |
An investigation of attack cases in robot arm control using ROS |
Risa Tanaka, Shintaro Ishihara, Toyokazu Akiyama, Kazumasa Kobayashi (Kyoto Sangyo Univ.) |
(7) |
15:55-16:20 |
The visibility of port scan traffic analysis in many small-scale darknets |
Kodai Mizutani, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) |
(8) |
16:20-16:45 |
Outsourcing Malware Dynamic Analysis without Disclosing File Contents |
Keisuke Hamajima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) |
Mon, Nov 21 PM Closing 16:45 - 16:45 |
|
16:45-16:55 |
( 10 min. ) |
|
16:55-17:00 |
Closing Address ( 5 min. ) |