IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 48  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2024-03-01
14:15
Okinawa Okinawa Convention Center Ransomware Detection using Traffic Features in SDN
Ken Tanase, Kunio Akashi, Yuji Sekiya, Hiroshi Nakamura (Tokyo Univ.) NS2023-237
In recent years, ransomware has emerged as a significant threat to information security in organizations.
A particular... [more]
NS2023-237
pp.385-390
NS 2023-10-05
10:35
Hokkaido Hokkaidou University + Online
(Primary: On-site, Secondary: Online)
[Encouragement Talk] A Design of stateless 5G core network with procedural processing
Hiroki Watanabe, Atsuki Takata, Keiichi Shima (Softbank), Kunio Akashi, Yuji Sekiya (Univ. of Tokyo), Katsuhiro Horiba (Softbank) NS2023-87
In a standard 5G core network (CN; 5GC), a large number of User Equipments (UEs) are accommodated by a single Network Fu... [more] NS2023-87
pp.89-94
IN, NS
(Joint)
2023-03-02
15:00
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
per-UE-type Monolithic 5GC - Implementation and evaluation of per-UE SMNF
Tatsuro Murata, Tomoaki Kanaya, Hiroki Watanabe, Keiichi shima, Tomoya Hasegawa, Ryoji Hirai, Hirotaka Nishino (Softbank Corp.), Kunio Akashi, Yuji Sekiya (The Univ. of Tokyo), Katsuhiro Horiba (Softbank Corp.) NS2022-193
The standard 5G Core Network (5GC) is designed as a distributed microservice architecture and consists of multiple Netwo... [more] NS2022-193
pp.151-156
IN, NS
(Joint)
2023-03-02
15:10
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
A design of data structures for stateless 5G core network
Kunio Akashi (The Univ. of Tokyo), Hiroki Watanabe, Keiichi Shima, Tomoya Hasegawa, Tatsuro Murata, Tomoaki Kanaya, Ryoji Hirai, Takahiro Hirotaka (SoftBank), Seiichi Yamamoto, Takuji Iimura (The Univ. of Tokyo), Katsuhiro Horiba (SoftBank), Yuji Sekiya (The Univ. of Tokyo) IN2022-86
In 5G Core Network (5GC) deployment services, network functions maintain UE context information. This adds complexity to... [more] IN2022-86
pp.121-126
IN, NS
(Joint)
2023-03-03
13:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
An implementation of a stateless procedural 5G core network using Network Function based 5G core network software
Hiroki Watanabe, Keiichi Shima, Tomoya Hasegawa, Tatsuro Murata, Tomoaki Kanaya, Ryoji Hirai, Takahiro Hirotaka (SoftBank), Kunio Akashi, Seiichi Yamamoto, Takuji Iimura, Yuji Sekiya (The Univ. of Tokyo), Katsuhiro Horiba (SoftBank) NS2022-242
In a standard 5G core network (CN;5GC), a single Network Function (NF) accommodates a large number of User Equipment (UE... [more] NS2022-242
pp.430-435
RCS, NS
(Joint)
2022-12-15
16:10
Aichi Nagoya Institute of Technology, and Online
(Primary: On-site, Secondary: Online)
A Design of stateless 5G core network with procedural processing
Hiroki Watanabe, Keiichi Shima, Tomoya Hasegawa, Tatsuro Murata, Tomoaki Kanaya, Ryoji Hirai, Takahiro Hirotaka (SoftBank), Kunio Akashi, Seiichi Yamamoto, Takuji Iimura, Yuji Sekiya (The Univ. of Tokyo), Katsuhiro Horiba (SoftBank) NS2022-139
In standard 5GC, a single Network Function (NF) serves a large number of User Equipments (UEs), and the context of a UE ... [more] NS2022-139
pp.54-59
IA, ICSS 2021-06-22
09:00
Online Online Feature analysis of phishing website and phishing detection based on machine learning algorithms
Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] IA2021-9 ICSS2021-9
pp.44-49
IN, NS
(Joint)
2021-03-05
10:10
Online Online A Convolutional Autoencoder Based Method for Cyber Intrusion Detection
Xinyi She, Yuji Sekiya (Tokyo Univ.) IN2020-77
Cyber intrusion detection systems are increasingly crucial due to the monumental growth of internet applications. Howeve... [more] IN2020-77
pp.138-143
IN, NS
(Joint)
2021-03-05
11:20
Online Online Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it
Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] NS2020-153
pp.179-184
IN, CCS
(Joint)
2020-08-03
13:50
Online Online A study on Mobility-Aware task offloading in edge computing for task failure minimization
Ryo Nakajima, Yuji Sekiya (UT) IN2020-15
In recent years, with the development of the Internet of Things (IoT) and other factors, the demand for networks has inc... [more] IN2020-15
pp.37-42
CQ, CBE
(Joint)
2019-01-18
10:45
Tokyo Tokyo Metropolitan Univ. Clustering Protocol in Wireless Sensor Networks Using Cuckoo Search and Fuzzy Algorithm
Chiharu Ido, Yuji Sekiya (Tokyo Univ.) CQ2018-84
Wireless Sensor Networks (WSNs) is a network formed by a large number of sensor nodes where each node is equipped with a... [more] CQ2018-84
pp.47-52
NS 2018-01-18
16:40
Okinawa Ishigakishi-Shoko-Kaikan Resource Allocation in Wireless D2D Caching Networks as Multi-Armed Bandits
Maoki Hikosaka, Yuji Sekiya (UTokyo) NS2017-153
 [more] NS2017-153
pp.53-58
IA, IN
(Joint)
2017-12-15
13:30
Hiroshima Hiroshima City Univ. Investigation of Campus-wide SD-WAN with Open Source Software
Ryo Nakamura, Yuji Sekiya, Tomohiro Kudo (Univ of Tokyo) IA2017-64
This paper reports an investigation of Software Defined WAN (SD-WAN) techniques for a campus network. Today's universiti... [more] IA2017-64
pp.67-72
ICSS 2017-11-21
11:45
Oita Beppu International Convention Center A Study of Detecting Infected Hosts by Graph Analysis of DNS Server Logs
Kazunori Kamiya, Ayako Hasegawa (SC-Lab.), Yuji Sekiya, Kazuya Okada (Univ. of Tokyo) ICSS2017-47
 [more] ICSS2017-47
pp.53-58
MI, MICT 2017-11-06
09:20
Kagawa Sunport Hall Takamatsu MICT2017-25 MI2017-47 (To be available after the conference date) [more] MICT2017-25 MI2017-47
pp.1-2
NS 2017-04-20
16:15
Toyama Toyama Shoko Kaigisyo Resource Allocation in Software-Defined Device-to-Device Communications as Multi-Armed Bandits
Maoki Hikosaka, Yuji Sekiya (Tokyo Univ.) NS2017-7
 [more] NS2017-7
pp.37-42
ICSS, IPSJ-SPT 2017-03-13
15:40
Nagasaki University of Nagasaki Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic
Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] ICSS2016-52
pp.49-54
IA, IN
(Joint)
2016-12-16
13:20
Hiroshima Hiroshima city university A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures
Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] IN2016-82
pp.91-96
IA 2016-11-04
11:15
Overseas Taipei (Taiwan) Case-based study and Discussion of threat analysis on DNS traffic using MATATABI platform
Tomohiro Ishihara, Yuji Sekiya (UTokyo) IA2016-48
 [more] IA2016-48
pp.99-102
IA 2016-08-29
12:30
Tokyo IIJ Seminar Room The current status and the future directions of the PTP interoperability testing (Phase2) -- The Consideration based on Interop Tokyo 2016 ShowNet --
Mikito Hasegawa (SSOL), Hiroshi Abe (IIJ-II), Yuji Sekiya (Univ. of Tokyo) IA2016-13
This paper shows the report of PTP experiment phase 2 in the Interop Tokyo 2016's ShowNet. This experiment focused on mu... [more] IA2016-13
pp.1-6
 Results 1 - 20 of 48  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan