IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 65 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2017-08-28
14:35
Tokyo IIJ Seminar Room Survey of IPv6 transition technologies for security analysis
Gabor Lencse, Youki Kadobayashi (NAIST) IA2017-15
Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, the transition ... [more] IA2017-15
pp.19-24
IA, IPSJ-IOT, SITE [detail] 2015-03-06
09:50
Fukushima   Proposal and evaluation of the circular migration method using a differential virtual disk
Naoya Sawada, Kazuya Okada, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi (NAIST) SITE2014-72 IA2014-104
In recent years, "Follow The Sun" and "Follow the Moon" type data centers have been studied. To realize both of these ty... [more] SITE2014-72 IA2014-104
pp.137-142
ICSS 2015-03-03
13:00
Okinawa Meio Univiersity A detection system which uses DNS traffic features to detect domains which are related to botnets
Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST) ICSS2014-63
 [more] ICSS2014-63
pp.1-6
ICSS 2015-03-03
16:40
Okinawa Meio Univiersity Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] ICSS2014-71
pp.49-54
ICSS 2014-11-28
10:45
Miyagi Tohoku Gakuin University (Tagajo Campus) A Study of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] ICSS2014-60
pp.55-60
ICSS 2014-11-28
11:35
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting infected hosts with machine learning analysis of DNS responses
Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] ICSS2014-62
pp.67-72
ICSS, IPSJ-SPT 2014-03-28
10:15
Okinawa Meio Univiersity MATATABI: Multi-layer Threat Analysis Platform with Hadoop
Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] ICSS2013-77
pp.113-118
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:30
Nara Todaiji Total Cultural Center Proposal of DDoS attack mitigation using two-step map table lookup on LISP
Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-51 IA2012-89
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed and practiced, most ... [more] SITE2012-51 IA2012-89
pp.37-42
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:55
Nara Todaiji Total Cultural Center A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] SITE2012-52 IA2012-90
pp.43-48
NS, IN
(Joint)
2013-03-08
10:50
Okinawa Okinawa Zanpamisaki Royal Hotel A Design of Sensor Data Storage System for Mobile Participatory Sensing
Junya Niwa, Kazuya Okada, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi (NAIST) NS2012-214
The development of wireless technologies and the rapid growth of mobile devices equipped with sensors have enabled the p... [more] NS2012-214
pp.283-288
NS, IN
(Joint)
2013-03-08
09:20
Okinawa Okinawa Zanpamisaki Royal Hotel Efficiency Analysis of Location based Multicast Address
Kazuya Okada, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi (NAIST) NS2012-242
Location aware information delivery is useful application, which automatically distribute information such as weather fo... [more] NS2012-242
pp.451-456
IA 2012-11-19
17:10
Fukushima Kanponoyado Iwaki (Fukushima) Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] IA2012-56
pp.23-28
IA 2012-11-19
18:00
Fukushima Kanponoyado Iwaki (Fukushima) Proposal of DDoS mitigation using decoy servers to limit attacks to a localized region
Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-58
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed
and practiced, most... [more]
IA2012-58
pp.35-40
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:05
Hokkaido   A Study on Cybersecurity Information Discovery Mechanisms over the Internet
Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT) ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11
This paper prposes a scheme that links assorted structured cybersecurity information over networks and discovers them in... [more] ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11
pp.71-76
ICSS 2011-11-18
15:30
Tokushima Naruto University of Education Multitenant Cloud Computing: Security Challenges and Approaches
Takeshi Takahashi (NICT), Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama (NAIST), Shin'ichiro Matsuo (NICT) ICSS2011-36
This paper presents challenges and approaches of techniques enabling multitenancy in cloud computing, especially resourc... [more] ICSS2011-36
pp.25-32
ISEC, IT, WBS 2011-03-04
13:50
Osaka Osaka University Oblivious Symmetric Key Encryption and Its Application to IP-Traceback
Ryo Nojima (NICT), Youki Kadobayashi (NAIST) IT2010-99 ISEC2010-103 WBS2010-78
In this paper, we consider the oblivious symmetric key encryption protocol
and its application to the {\em privacy-pres... [more]
IT2010-99 ISEC2010-103 WBS2010-78
pp.199-203
IA 2010-12-17
16:15
Tokyo Room1, B3F, Kikai-Shinko-Kaikan Bldg A Proposal of a Virtual Router Migration Control System Using Multilayer NDL in Virtual Network Environments
Tsukasa Yoneda, Kazuya Okada, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2010-68
Along with the developments of network virtualization technologies, techniques to migrate a virtual router from a physic... [more] IA2010-68
pp.61-66
ICSS 2010-11-05
13:50
Hiroshima Hiroshima City University Ontological Approach toward Cybersecurity in Cloud Computing
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ICSS2010-49
Following the immense development of cloud computing, various standardization activities have been taken place.
However... [more]
ICSS2010-49
pp.29-34
IPSJ-AVM, MoNA 2010-07-15
13:00
Hokkaido Hokkaido Univ. Quality Index to Detect an Area with Required Communication Quality by a Wireless LAN Access Point
Kazuaki Morihisa (NAIST), Yuzo Taenaka (Univ. of Tokyo), Shigeru Kashihara, Youki Kadobayashi, Suguru Yamaguchi (NAIST) MoMuC2010-18
Future ubiquitous wireless LANs (WLANs) provide continuous wireless connectivity by integrating cov- erage area of many ... [more] MoMuC2010-18
pp.1-6
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
14:15
Aomori Hirosaki University Building Ontology of Cybersecurity Operational Information
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ISEC2010-20 SITE2010-16 ICSS2010-26
Cyber threats come beyond the border of countries. However, most organizations are currently coping with them individual... [more] ISEC2010-20 SITE2010-16 ICSS2010-26
pp.87-91
 Results 21 - 40 of 65 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan