|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2022-03-11 14:50 |
Online |
Online |
Enhancing Resilience of an MQTT Broker Using Immunity-Based Attack Detection
-- Detection and Prevention of DoS Attacks against Use-After-Free Vulnerabilities -- Takeshi Okamoto (KAIT) NS2021-158 |
Smartification of public services is being promoted, but smart public services are at risk of cyberattacks. One of cyber... [more] |
NS2021-158 pp.212-217 |
NS, IN (Joint) |
2018-03-02 15:20 |
Miyazaki |
Phoenix Seagaia Resort |
Method for Generating a Data Set to Detect Cyber Attacks for Autonomous and Distributed Internet Security Infrastructure Yusei Katsura, Hiroyuki Kimiyama (Tokyo Denki Univ.), Akihiro Nakao (Tokyo Univ.), Naoki Yonezaki, Tomoaki Tsutsumi, Kaoru Sano (Tokyo Denki Univ.), Takeshi Okamoto, Mitsuru Maruyama (Kanagawa Institutes of Technology), Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-238 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to protect our resources on... [more] |
NS2017-238 pp.397-401 |
MBE, BioX |
2017-07-29 17:25 |
Tokushima |
Tokushima University |
Security Evaluation of USB-Based Fingerprint Authentication Products under Spoofing Attacks using a Forged Fingerprint with Conductive Ink Takeshi Okamoto, Kaito Tanimoto (Kanagawa Inst. of Tech.) BioX2017-23 MBE2017-32 |
This paper presents tolerance and security evaluations of 22 USB-based fingerprint authentication products using a finge... [more] |
BioX2017-23 MBE2017-32 pp.73-76 |
BioX, ITE-ME, ITE-IST |
2015-06-29 14:00 |
Ishikawa |
Kanazawa University, Kakuma Campus |
Security Evaluation for Leakage of a Fingerprint Image from USB-Based Fingerprint Authentication Systems Daigo Sato, Takeshi Okamoto, Naoto Umehara (KAIT) BioX2015-6 |
The growing availability of fingerprint authentication systems has resulted in a drop in their price, and their increase... [more] |
BioX2015-6 pp.39-44 |
NLP |
2005-05-17 16:25 |
Yamagata |
Yamagata Univ (Yonezawa) |
Two-layer neural field model for working memory task with intervening stimulus Shigeru Kubota (Yamagata Univ.), Tsuyoshi Okamoto (ERATO), Kosuke Hamaguchi (RIKEN), Kazuyuki Aihara (Tokyo Univ.), Tatsuo Kitajima (Yamgata Univ.) |
Electrophysiological experiments of working memory task in the presence of intervening stimuli has shown that the delay ... [more] |
NLP2005-8 pp.41-46 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|