IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 46  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SS, DC 2017-10-20
10:30
Kochi Kochi City Culture-plaza CUL-PORT Wormhole Attacks on Duty-Cycling Wireless Sensor Networks and Their Countermeasures
Wang Wen Yang, Takashi Minohara (Takushoku Univ.) SS2017-32 DC2017-31
Wireless sensor networks(WSN) which employ a large number of wireless
sensor nodes to monitor physical or environmenta... [more]
SS2017-32 DC2017-31
pp.67-72
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2017-03-10
10:40
Okinawa Kumejima Island Wormhole attack prevention in MANET using multipath routing protocol
Chika Onodera, Takashi Minohara (Takushoku Univ.) CPSY2016-147 DC2016-93
In recent years, mobile ad hoc networks(MANET) are becoming more and more important when it is hard to use normal networ... [more] CPSY2016-147 DC2016-93
pp.309-314
DC, SS 2015-10-13
15:30
Nara Todaiji Culture Center (Nara) Detection of Wormhole Attack on Wireless Sensor Network in Low Power Operation
Takashi Minohara, Kyosuke Nishiyama (Takushoku Univ.) SS2015-39 DC2015-29
Wireless sensor networks(WSN) which employ a large number of wireless
sensor nodes to monitor physical or environmenta... [more]
SS2015-39 DC2015-29
pp.23-28
CPSY, DC 2014-04-25
13:00
Tokyo   [Fellow Memorial Lecture] Synchronous Circuit Design vs. Asynchronous Circuit Design -- Trials to compare them from various aspects --
Tomohiro Yoneda (NII) CPSY2014-1 DC2014-1
In this talk, the asynchronous design, where execution is controlled in an event driven manner based on handshaking with... [more] CPSY2014-1 DC2014-1
p.1
DC 2014-02-10
17:05
Tokyo Kikai-Shinko-Kaikan Bldg. Detection of Wormhole Attack in Wireless Sensor Network with XMesh Protocol
Takashi Minohara, Aoi Yoshii (Takushoku Univ.) DC2013-91
In recent years, wireless sensor networks become an important technique
to monitor physical or environmental conditions... [more]
DC2013-91
pp.73-78
OME 2013-03-05
16:45
Saga AIST Kyushu Center Analsis of Local Physical Properties of Soft Materials by Temperature-controlled Optical Tweezers
Atsuomi Shundo, Koichiro Hori, David P. Penaloza, Keiji Tanaka (Kyushu Univ.) OME2012-102
Optical tweezers have been widely used in biological applications such as cell sorting, cell fusion, intracellular surge... [more] OME2012-102
pp.51-54
MBE, NC
(Joint)
2012-03-16
09:50
Tokyo Tamagawa University Construction of standard brain map based on a confocal laser microscope image for silkworm moth brain
Naoya Momota (Univ. of Hyogo), Tomoki Kazawa, Stephan Shuichi Haupt, Shigehiro Namiki, Daisuke Miyamoto, Ryohei Kanzaki (The Univ. of Tokyo), Ikuko Nishikawa (Ritsumeikan Univ.), Hidetoshi Ikeno (Univ. of Hyogo) NC2011-179
The neural mechanism about a unique behavior of male silkworm moth caused by pheromone stimuli is used as a model system... [more] NC2011-179
pp.341-346
NS, IN
(Joint)
2012-03-08
10:30
Miyazaki Miyazaki Seagia A Wormhole Attack Mitigation Strategy Based on Mobile Agent
Bo Yang, Ryo Yamamoto, Yoshiaki Tanaka (Waseda Univ.) NS2011-206
A Mobile Ad Hoc Network (MANET) is a self-organized, infrastructure less, multi-hop network, which is highly vulnerable ... [more] NS2011-206
pp.149-154
DC 2011-12-16
16:40
Hyogo   Wormhole Detection in Ad Hoc Sensor Networks by using Location Information
Jianhua Xiao, Takashi Minohara (Takushoku Univ.) DC2011-74
In recent years, ad hoc sensor networks become an important technique
where it is hard to deploy normal network infrast... [more]
DC2011-74
pp.33-38
DC 2011-12-16
17:10
Hyogo   Fault-tolerant Wormhole Switching with Partial Backtrack Capability
Hiroki Kanai, Masato Kitakami (Chiba Univ.) DC2011-75
Since a parallel computer and Network-on-Chip (NoC) have many elements, their failure rate is high. Fault-tolerance is i... [more] DC2011-75
pp.39-44
NS, RCS
(Joint)
2011-12-16
15:05
Yamaguchi Yamaguchi University Wormhole Attack Detection Method Using Abnormal Signal Strength Notification with Hop Count for Sensor Networks
Yuki Ishizaka, Shigetomo Kimura, Yoshihiko Ebihara (Univ of Tsukuba) NS2011-143
The authors have proposed the wormhole attack detection method using the abnormal signal strength notification for senso... [more] NS2011-143
pp.143-148
IN, NS
(Joint)
2011-03-04
09:30
Okinawa Okinawa Convention Center Wormhole Attack Detection and Avoidance Method Using Observation Report from Neighbour Nodes
Qi Wang, Ryo Yamamoto, Yoshiaki Tanaka (Waseda Univ.) NS2010-245
Wormhole attack is becoming a serious problem in ad hoc networks. In the attack, a pair of malicious nodes establishes ... [more] NS2010-245
pp.455-460
NS 2009-12-11
15:05
Ehime Ehime University (Ehime) A Study of Malware Spreading Detection in Mobile P2P Networks.
Masashi Yamashita, Keisuke Nakano, Masakazu Sengoku (Niigata Univ.) NS2009-141
Since the evolution of mobile devices, the risk of malware spreading in mobile peer to peer (P2P) networks increased. It... [more] NS2009-141
pp.115-118
US 2009-10-23
11:50
Tokyo Institute of Industrial Science, the University of Tokyo Measurement of Viscoelastic Spectrum by Quadrupole-type Electro-Magnetically Spinning Viscometer
Yuta Yamazaki, Keiji Sakai (Univ. of Tokyo) US2009-70
We introduce a new experimental technique to give the fundamental visco-elasticity of complex fluids, which requires qui... [more] US2009-70
pp.71-75
IN, NS, CS
(Joint)
2009-09-10
16:10
Miyagi Tohoku University (Miyagi) An Approach to Suppress Malware Spreading in Mobile Ad Hoc Networks.
Masashi Yamashita, Keisuke Nakano, Masakazu Sengoku (Niigata Univ.) NS2009-67
Since the evolution of mobile devices, the risk of malware spreading in mobile ad hoc networks increased. Mobile Ad Hoc ... [more] NS2009-67
pp.43-46
IN 2007-12-14
13:05
Hiroshima Hiroshima City University Entropy-based Analysis of User IP Space
Zhenxing Lu, Marat Zhanikeev, Yoshiaki Tanaka (Waseda Univ.) IN2007-113
Although the concept of entropy was originally a thermodynamic construct, it has been adapted in other fields of study, ... [more] IN2007-113
pp.85-90
IN 2007-12-14
13:30
Hiroshima Hiroshima City University A Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads
Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-114
Internet worms are one of the most serious threats in the Internet. For accurately detecting newly created worms, we hav... [more] IN2007-114
pp.91-96
IN 2007-07-19
15:35
Hyogo Kobe University Optimum Parameter Setting in Identifying and Quarantining Worm-Infected Hosts
Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada (NTT) IN2007-29
Abusive traffic caused by worm is a serious problem in the Internet because it consumes a large portion of network resou... [more] IN2007-29
pp.13-18
ISEC, SITE, IPSJ-CSEC 2007-07-20
09:55
Hokkaido Future University-Hakodate Proposal for the quantitative method of searching characteristics of node
Hirofumi Nakakoji, Masato Terada, Seiichi Susaki (Hitachi)
Information about the network worms, such as how they exploit vulnerabilities, infection symptoms, how to remove them, i... [more] ISEC2007-50
pp.37-42
IN 2007-06-22
14:35
Hokkaido Future University-Hakodate Identifying Worm-Infected Hosts Using White List
Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino (NTT) IN2007-24
In the Internet, a rapid spread of worm is a serious problem. In many cases, worm-infected hosts generate huge amount of... [more] IN2007-24
pp.79-84
 Results 1 - 20 of 46  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan