Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS, CQ (Joint) |
2010-04-27 09:55 |
Aomori |
Oirase Keiryu Hotel |
An Image Transfer System using Multiple Cellular Phone Line Yuji Waizumi (Tohoku Univ.), Kouichi Abe (MagickWorX), Kaoru Miyauchi (K&C), Hiroki Nishiyama (Tohoku Univ.), Hiroshi Tsunoda, Hidehisa Nakayama (Tohoku Inst. of Tech.), Takuya Kitamura (Fudoki), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2010-8 |
[more] |
CS2010-8 pp.41-46 |
IN, NS, CS (Joint) |
2009-09-10 13:50 |
Miyagi |
Tohoku University (Miyagi) |
Network Application Identification based on Characteristics of Message Transmission Yuji Waizumi, Yuya Tsukabe (Tohoku Univ.), Hiroshi Tsunoda (Tohoku Inst. of Tech.), Yoshiaki Nemoto (Tohoku Univ.) CS2009-35 |
A person-to-person imformation sharing is easily realized by P2P networks that serves are unnecessary
to do so. Leakage... [more] |
CS2009-35 pp.13-18 |
IN, NS, CS (Joint) |
2009-09-10 14:15 |
Miyagi |
Tohoku University (Miyagi) |
Efficient Log Transfer based on Priority Queuing and Message Aggregation for Logging over Wireless Networks Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Mashimo, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2009-36 |
[more] |
CS2009-36 pp.19-24 |
CQ, CS (Joint) |
2009-04-16 10:50 |
Okinawa |
Okinawaken Seinen Kaikan |
Experiments of WLAN based Activity Monitoring System for Real-time Simultaneous Utilization Hidehisa Nakayama, Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Akihiro Suzuki (I.T.Research Co.,Ltd), Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2009-1 |
[more] |
CS2009-1 pp.1-6 |
CS, SIP, CAS |
2008-03-06 14:45 |
Yamaguchi |
Yamaguchi University |
Priority-based Adaptive Transmission Control for Efficient Log Transfer Hiroshi Tsunoda, Takafumi Maruyama, Satoru Abe (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto (Tohoku Univ.) CAS2007-113 SIP2007-188 CS2007-78 |
Logs generated by operating systems and application programs provide important information to a network administrator. L... [more] |
CAS2007-113 SIP2007-188 CS2007-78 pp.27-32 |
CS, SIP, CAS |
2008-03-06 15:35 |
Yamaguchi |
Yamaguchi University |
Generating Appropriate Templates for Efficient Application Identification Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CAS2007-115 SIP2007-190 CS2007-80 |
Recently, damages of information leakage caused by
illegal use of network applications have been reported.
To prevent ... [more] |
CAS2007-115 SIP2007-190 CS2007-80 pp.39-44 |
IN |
2007-12-14 13:30 |
Hiroshima |
Hiroshima City University |
A Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-114 |
Internet worms are one of the most serious threats in the Internet. For accurately detecting newly created worms, we hav... [more] |
IN2007-114 pp.91-96 |
IN |
2007-12-14 13:55 |
Hiroshima |
Hiroshima City University |
Classifying Network Anomaly Events Using the Occurence Probability of Correlation Coefficients Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-115 |
For taking effective countermeasures against network anomaly events,the classification of detected anomaly events is req... [more] |
IN2007-115 pp.97-102 |
NS, ICM, CQ (Joint) |
2007-11-15 16:25 |
Fukuoka |
Institute of System LSI Design Industry, Fukuoka |
[Encouragement Talk]
An evaluation of transition pattern of payload legnth for network application identification Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) TM2007-34 |
Recently, increasing of information leakages caused by illegal use of network applications have been reported. To preven... [more] |
TM2007-34 pp.1-6 |
NS, CS, IN (Joint) |
2007-09-21 13:20 |
Miyagi |
Tohoku University |
Detector Selection Method for Detecting Malicious Nodes in Wireless Sensor Networks Hiroshi Tsunoda (Tohoku Univ.), Ake Olbert, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2007-18 |
[more] |
CS2007-18 pp.9-14 |
NS, CS, IN (Joint) |
2007-09-21 13:40 |
Miyagi |
Tohoku University |
A Network Application Identification Method Using Similarity of Packet Payloads Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-19 |
[more] |
CS2007-19 pp.15-20 |
NS, CS, IN (Joint) |
2007-09-21 14:00 |
Miyagi |
Tohoku University |
An Enhancement of Network Anomaly Detection Method Using Occurence Probability Matrices of Correlation Coefficients Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-20 |
Recently, a network anomaly detection method focusing
correlation coefficients between traffic features has been pro... [more] |
CS2007-20 pp.21-26 |
ICM |
2007-05-11 09:40 |
Kochi |
Kochi Uni. of Technology |
Classifying Network Applications Using Transition Pattern of Payload-length Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) |
Recently, information leakage caused by illegal use of network applications (e.g. P2P application) has become a new soci... [more] |
|
CQ, CS (Joint) |
2007-04-24 09:25 |
Kagoshima |
Kagoshima University |
Detecting Causal Hosts of Anomalous Traffic using Difference of Anomaly Score Yuji Waizumi, Hideki Saga, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-7 |
e propose a method to specify hosts which
send anomalous pakects when a notwork anomaly is detected.
Our proposed met... [more] |
CS2007-7 pp.37-42 |
CQ, CS (Joint) |
2007-04-24 09:50 |
Kagoshima |
Kagoshima University |
Transmission Control in Transport Protocols for Mitigating Effects of Pulsing Denial of Service Attacks Hiroshi Tsunoda, Kenjiro Arai, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2007-8 |
Pulsing Denial-of-Service (DoS) attacks, which can significantly
degrade the communication quality (e.g. throughput) of... [more] |
CS2007-8 pp.43-48 |
CS, IE, ITE-BCT, IPSJ-AVM |
2006-12-15 10:55 |
Aichi |
Nagoya Univ. |
Discriminating Network Applications by using Changes in the Compositon of Communication Data Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-61 IE2006-129 |
A person-to-person imformation sharing is easily realized
by P2P networks that serves are unnecessary to do so.
Leakag... [more] |
CS2006-61 IE2006-129 pp.19-24 |
CS, IE, ITE-BCT, IPSJ-AVM |
2006-12-15 11:20 |
Aichi |
Nagoya Univ. |
Reducing False Positive and Observation Cost in Bandwidth Usage-based Pulsing DoS Detection Schemes Kenjiro Arai, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-62 IE2006-130 |
Pulsing Denial-of-Service (PDoS) attacks seriously degrade the
throughput of TCP flow and consequently pose a grave con... [more] |
CS2006-62 IE2006-130 pp.25-30 |
SAT |
2006-10-19 13:00 |
Overseas |
KAL Hotel (Jeju-Do, Korea) |
ELB in IP/NGEO Satellite Constellations: Issues and Solutions Daisuke Mashimo, Tarik Taleb, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) |
[more] |
|
IN, NS, CS (Joint) |
2006-09-15 15:00 |
Miyagi |
|
Using Multiple Normal states for Network Anomaly Detection Naotoshi Hiramatsu, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) CS2006-32 |
Network anomaly detection requires modeling the normal state of the
network. When the observation quantities of network... [more] |
CS2006-32 pp.61-66 |
IN, NS, CS (Joint) |
2006-09-15 15:20 |
Miyagi |
|
A Low Cost Worm Detection Technique based on Flow Payload Clustering Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) CS2006-33 |
Recently, damages of information systems by worms have been reported at the global level. To control these damages, some... [more] |
CS2006-33 pp.67-72 |