|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, SR, SRW (Joint) |
2020-03-05 13:55 |
Tokyo |
Tokyo Institute of Technology (Cancelled but technical report was issued) |
Performance of MIMO transmission using a spatial-temporal subspace-based compressive channel estimation technique Yasuhiro Takano (Kobe Univ.) RCS2019-367 |
Channel estimation accuracy in massive multiple-input multiple-output (MIMO) systems can suffer from deterioration since... [more] |
RCS2019-367 pp.239-244 |
ICSS, IPSJ-SPT |
2020-03-03 10:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-100 |
(To be available after the conference date) [more] |
ICSS2019-100 pp.283-288 |
ICSS, IPSJ-SPT |
2019-03-08 10:00 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-78 |
[more] |
ICSS2018-78 pp.89-94 |
ICSS, IPSJ-SPT |
2019-03-08 10:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-79 |
[more] |
ICSS2018-79 pp.95-100 |
ICSS, IPSJ-SPT |
2019-03-08 10:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-80 |
(To be available after the conference date) [more] |
ICSS2018-80 pp.101-104 |
ICSS, IPSJ-SPT |
2019-03-08 13:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-85 |
(To be available after the conference date) [more] |
ICSS2018-85 pp.155-160 |
ICSS, IPSJ-SPT |
2019-03-08 13:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-86 |
[more] |
ICSS2018-86 pp.161-166 |
ICSS |
2018-11-21 15:40 |
Kagoshima |
|
ICSS2018-58 |
(To be available after the conference date) [more] |
ICSS2018-58 pp.31-36 |
ICSS |
2018-11-22 10:00 |
Kagoshima |
|
ICSS2018-60 |
[more] |
ICSS2018-60 pp.39-44 |
ICSS |
2018-11-22 10:25 |
Kagoshima |
|
ICSS2018-61 |
(To be available after the conference date) [more] |
ICSS2018-61 pp.45-48 |
ICSS |
2018-11-22 13:30 |
Kagoshima |
|
ICSS2018-64 |
(To be available after the conference date) [more] |
ICSS2018-64 pp.61-66 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-64 |
[more] |
ICSS2017-64 pp.79-84 |
ICSS, IPSJ-SPT |
2018-03-08 11:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-75 |
[more] |
ICSS2017-75 pp.145-150 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-76 |
[more] |
ICSS2017-76 pp.151-156 |
ICSS |
2017-11-21 14:00 |
Oita |
Beppu International Convention Center |
ICSS2017-50 |
[more] |
ICSS2017-50 pp.71-76 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 14:15 |
Tokyo |
|
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 |
[more] |
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 pp.93-98 |
ICSS, IPSJ-SPT |
2017-03-13 13:25 |
Nagasaki |
University of Nagasaki |
Modeling of Attack Activity for Integrated Analysis of Threat Information Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47 |
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] |
ICSS2016-47 pp.7-12 |
ICSS, IPSJ-SPT |
2017-03-14 11:45 |
Nagasaki |
University of Nagasaki |
Representation for Attack Activity to Associate Threat Information Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64 |
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] |
ICSS2016-64 pp.147-152 |
ICSS, IPSJ-SPT |
2017-03-14 10:55 |
Nagasaki |
University of Nagasaki |
A Vulnerability Analysis of Android Applications from the View of Framework Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
[more] |
|
ICSS |
2016-11-25 16:10 |
Kanagawa |
Institute of Information Security |
Performance of link-mining techniques to detect malicious websites Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44 |
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] |
ICSS2016-44 pp.31-35 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|