|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-02-29 09:20 |
Okinawa |
Okinawa Convention Center |
Cross organizational data distribution and federation method considering data governance Masataka Mizukoshi, Kei Omura, Yoshihito Oshima (NTT) IN2023-65 |
Efforts to utilize data beyond the boundaries of companies and organizations, as exemplified by initiatives such as smar... [more] |
IN2023-65 pp.1-6 |
IBISML |
2019-03-05 17:00 |
Tokyo |
RIKEN AIP |
A Study on Automatic Generation of False Data Injection Attack against Connected Car Service Based on Reinforcement Learning Yuichiro Dan, Keita Hasegawa, Takafumi Harada, Tomoaki Washio, Yoshihito Oshima (NTT) IBISML2018-109 |
While the connected car is predicted to prevail by 2025, the appearance of novel cyber attacks is concerned. In this pap... [more] |
IBISML2018-109 pp.31-38 |
ICSS, IPSJ-SPT |
2016-03-03 13:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Actual Survey on Web Scanning by URI Co-occurrence Detection Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51 |
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more] |
ICSS2015-51 pp.25-30 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2015-09-15 15:00 |
Ehime |
|
Proposal of selection of training data using misdetected goodware for preventing misdetection of a static detector of malware Yasushi Okano, Atsutoshi Kumagai, Masaki Tanikawa, Yoshihito Oshima (NTT), Kenji Aiko, Kazumi Umehashi, Junichi Murakami (FFRI) PRMU2015-90 IBISML2015-50 |
A lot of variant and new malware is produced day by day, it is therefore the urgent need to countermeasure such as "unkn... [more] |
PRMU2015-90 IBISML2015-50 pp.163-170 |
IN |
2014-10-16 15:20 |
Osaka |
Osaka Univ. |
A Method to Extract Security-related Tweets Atsutoshi Kumagai, Shingo Orihara, Tetsuya Abe, Susumu Kakuta, Yasushi Okano, Yoshihito Oshima (NTT) IN2014-76 |
Recently, Twitter is becoming a place where security-related information is posted, such as a warning of cyber attacks w... [more] |
IN2014-76 pp.13-18 |
NC, IPSJ-BIO, IBISML, IPSJ-MPS [detail] |
2014-06-25 16:10 |
Okinawa |
Okinawa Institute of Science and Technology |
A Discriminative Model resistant to Malicious Annotators Atsutoshi Kumagai, Shingo Orihara, Yasushi Okano, Tomoharu Iwata, Yoshihito Oshima (NTT) NC2014-1 IBISML2014-1 |
Recently, there have been a lot of studies on learning a classifier from a large amount of labeled data collected from c... [more] |
NC2014-1 IBISML2014-1 pp.17-23 |
MoNA, IN (Joint) |
2007-11-16 10:00 |
Fukuoka |
Fukuoka Institute of Technology |
An authentication method for an early deployment of nomadic IMS services Hirokazu Kitami, Yoshihito Oshima, Masahisa Kawashima, Jun-ya Kato, Hiroyuki Kurita (NTT) MoMuC2007-57 |
[more] |
MoMuC2007-57 pp.7-12 |
NS |
2007-05-18 09:55 |
Osaka |
Osaka Univ. |
An extension of IMS Early Deployment for WiFi device Hirokazu Kitami, Yoshihito Oshima, Masahisa Kawashima, Jun-ya Kato (NTT) NS2007-25 |
(To be available after the conference date) [more] |
NS2007-25 pp.57-62 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|