|
|
Technical Committee on Internet Architecture (IA) (Searched in: 2016)
|
|
Search Results: Keywords 'from:2016-06-06 to:2016-06-06'
|
[Go to Official IA Homepage] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IA |
2016-06-06 13:05 |
Saga |
Saga University |
Design of a flow-level monitoring middleware for automatic flow categorization Xuliang Wang, Pongsakorn U-chupala, Kohei Ichikawa, Yasuhiro Watashiba (NAIST), Chantana Chantrapornchai, Putchong Uthayopas (Kasetsart Univ.), Hajimu Iida (NAIST) IA2016-1 ICSS2016-1 |
[more] |
IA2016-1 ICSS2016-1 pp.1-6 |
ICSS, IA |
2016-06-06 13:30 |
Saga |
Saga University |
Analysis of recursive queries from the Internet to the authoritative name servers in Oita University Masashi Nakamura, Minoru Ikebe, Kazuyuki Yoshida (Oita Univ.) IA2016-2 ICSS2016-2 |
The authoritative name server will receive name resolution queries from the Internet. In this paper, we analyzed queries... [more] |
IA2016-2 ICSS2016-2 pp.7-12 |
ICSS, IA |
2016-06-06 14:10 |
Saga |
Saga University |
Method to Locate Cryptographic Functions from Malware Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) |
[more] |
|
ICSS, IA |
2016-06-06 14:35 |
Saga |
Saga University |
A Visualization system of network packets with alert function for suspicious communications Reido Horigome, Naoya Kitagawa, Nariyoshi Yamai (Tokyo Univ. of Agriculture and Technology) IA2016-3 ICSS2016-3 |
(To be available after the conference date) [more] |
IA2016-3 ICSS2016-3 pp.13-18 |
ICSS, IA |
2016-06-06 15:00 |
Saga |
Saga University |
Development of Network Forensic System Using Filter Drivers Kouki Oda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
[more] |
|
ICSS, IA |
2016-06-06 15:40 |
Saga |
Saga University |
Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN Nariaki Tamaki, Takehiro Kawata (NTT) IA2016-4 ICSS2016-4 |
We propose the countermeasure technique to prevent key decipher, and improve the key-exchange protocol of IEEE 802.11 Wi... [more] |
IA2016-4 ICSS2016-4 pp.19-24 |
ICSS, IA |
2016-06-06 16:05 |
Saga |
Saga University |
Kenta Nomura (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-5 ICSS2016-5 |
(To be available after the conference date) [more] |
IA2016-5 ICSS2016-5 pp.25-30 |
ICSS, IA |
2016-06-06 16:30 |
Saga |
Saga University |
Multidimensional Lamport-like one-time password authentication schemes Yuji Suga (IIJ) IA2016-6 ICSS2016-6 |
[more] |
IA2016-6 ICSS2016-6 p.31 |
ICSS, IA |
2016-06-07 09:30 |
Saga |
Saga University |
Daiki Ito (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-7 ICSS2016-7 |
[more] |
IA2016-7 ICSS2016-7 pp.33-38 |
ICSS, IA |
2016-06-07 09:55 |
Saga |
Saga University |
Report on the 2016 Network and Distributed System Security Symposium Shinichi Matsumoto (ISIT), Daiki Chiba (NTT), Kuniyasu Suzaki (AIST), Mirang Park (Kanagawa Institute of Technology) IA2016-8 ICSS2016-8 |
[more] |
IA2016-8 ICSS2016-8 pp.39-44 |
ICSS, IA |
2016-06-07 10:35 |
Saga |
Saga University |
An Experiment to Shut off DDoS Attacks on Testbed Simulating Autonomous Internet Security Infrastructure Kishi Yuya, Eguchi Ken, Ishikawa Tsuyoshi, Suzuki Ryusei, Miyaguchi Yuki, Ohsawa Kazuo, Yogosawa Mamoru, Sano Kaoru, Yamaki Hiroshi, Ueno Yoichirou, Sasaki Ryoichi, Kobayashi Hiroshi (Tokyo Denki Univ) IA2016-9 ICSS2016-9 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. A shift in thinking is required fr... [more] |
IA2016-9 ICSS2016-9 pp.45-50 |
ICSS, IA |
2016-06-07 11:00 |
Saga |
Saga University |
Measuring BGP Origin Validation Effect for Mis-Origination Masahito Ando (Toho Univ.), Masayuki Okada (JPNIC), Akira Kanaoka (Toho Univ.) IA2016-10 ICSS2016-10 |
Current Border Gateway Protocol (BGP) operation in the Internet has serious problem about Mis-Origination which is hijac... [more] |
IA2016-10 ICSS2016-10 pp.51-56 |
ICSS, IA |
2016-06-07 13:00 |
Saga |
Saga University |
On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11 |
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] |
IA2016-11 ICSS2016-11 pp.57-62 |
ICSS, IA |
2016-06-07 13:25 |
Saga |
Saga University |
Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services LLCPwC Cyber Services), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services LLCPwC Cyber Services), Masakatu Morii (Kobe Univ.) IA2016-12 ICSS2016-12 |
(To be available after the conference date) [more] |
IA2016-12 ICSS2016-12 pp.63-68 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|