Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS, DC |
2017-10-20 10:30 |
Kochi |
Kochi City Culture-plaza CUL-PORT |
Wormhole Attacks on Duty-Cycling Wireless Sensor Networks and Their Countermeasures Wang Wen Yang, Takashi Minohara (Takushoku Univ.) SS2017-32 DC2017-31 |
Wireless sensor networks(WSN) which employ a large number of wireless
sensor nodes to monitor physical or environmenta... [more] |
SS2017-32 DC2017-31 pp.67-72 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-10 10:40 |
Okinawa |
Kumejima Island |
Wormhole attack prevention in MANET using multipath routing protocol Chika Onodera, Takashi Minohara (Takushoku Univ.) CPSY2016-147 DC2016-93 |
In recent years, mobile ad hoc networks(MANET) are becoming more and more important when it is hard to use normal networ... [more] |
CPSY2016-147 DC2016-93 pp.309-314 |
DC, SS |
2015-10-13 15:30 |
Nara |
Todaiji Culture Center (Nara) |
Detection of Wormhole Attack on Wireless Sensor Network in Low Power Operation Takashi Minohara, Kyosuke Nishiyama (Takushoku Univ.) SS2015-39 DC2015-29 |
Wireless sensor networks(WSN) which employ a large number of wireless
sensor nodes to monitor physical or environmenta... [more] |
SS2015-39 DC2015-29 pp.23-28 |
CPSY, DC |
2014-04-25 13:00 |
Tokyo |
|
[Fellow Memorial Lecture]
Synchronous Circuit Design vs. Asynchronous Circuit Design
-- Trials to compare them from various aspects -- Tomohiro Yoneda (NII) CPSY2014-1 DC2014-1 |
In this talk, the asynchronous design, where execution is controlled in an event driven manner based on handshaking with... [more] |
CPSY2014-1 DC2014-1 p.1 |
DC |
2014-02-10 17:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Detection of Wormhole Attack in Wireless Sensor Network with XMesh Protocol Takashi Minohara, Aoi Yoshii (Takushoku Univ.) DC2013-91 |
In recent years, wireless sensor networks become an important technique
to monitor physical or environmental conditions... [more] |
DC2013-91 pp.73-78 |
OME |
2013-03-05 16:45 |
Saga |
AIST Kyushu Center |
Analsis of Local Physical Properties of Soft Materials by Temperature-controlled Optical Tweezers Atsuomi Shundo, Koichiro Hori, David P. Penaloza, Keiji Tanaka (Kyushu Univ.) OME2012-102 |
Optical tweezers have been widely used in biological applications such as cell sorting, cell fusion, intracellular surge... [more] |
OME2012-102 pp.51-54 |
MBE, NC (Joint) |
2012-03-16 09:50 |
Tokyo |
Tamagawa University |
Construction of standard brain map based on a confocal laser microscope image for silkworm moth brain Naoya Momota (Univ. of Hyogo), Tomoki Kazawa, Stephan Shuichi Haupt, Shigehiro Namiki, Daisuke Miyamoto, Ryohei Kanzaki (The Univ. of Tokyo), Ikuko Nishikawa (Ritsumeikan Univ.), Hidetoshi Ikeno (Univ. of Hyogo) NC2011-179 |
The neural mechanism about a unique behavior of male silkworm moth caused by pheromone stimuli is used as a model system... [more] |
NC2011-179 pp.341-346 |
NS, IN (Joint) |
2012-03-08 10:30 |
Miyazaki |
Miyazaki Seagia |
A Wormhole Attack Mitigation Strategy Based on Mobile Agent Bo Yang, Ryo Yamamoto, Yoshiaki Tanaka (Waseda Univ.) NS2011-206 |
A Mobile Ad Hoc Network (MANET) is a self-organized, infrastructure less, multi-hop network, which is highly vulnerable ... [more] |
NS2011-206 pp.149-154 |
DC |
2011-12-16 16:40 |
Hyogo |
|
Wormhole Detection in Ad Hoc Sensor Networks by using Location Information Jianhua Xiao, Takashi Minohara (Takushoku Univ.) DC2011-74 |
In recent years, ad hoc sensor networks become an important technique
where it is hard to deploy normal network infrast... [more] |
DC2011-74 pp.33-38 |
DC |
2011-12-16 17:10 |
Hyogo |
|
Fault-tolerant Wormhole Switching with Partial Backtrack Capability Hiroki Kanai, Masato Kitakami (Chiba Univ.) DC2011-75 |
Since a parallel computer and Network-on-Chip (NoC) have many elements, their failure rate is high. Fault-tolerance is i... [more] |
DC2011-75 pp.39-44 |
NS, RCS (Joint) |
2011-12-16 15:05 |
Yamaguchi |
Yamaguchi University |
Wormhole Attack Detection Method Using Abnormal Signal Strength Notification with Hop Count for Sensor Networks Yuki Ishizaka, Shigetomo Kimura, Yoshihiko Ebihara (Univ of Tsukuba) NS2011-143 |
The authors have proposed the wormhole attack detection method using the abnormal signal strength notification for senso... [more] |
NS2011-143 pp.143-148 |
IN, NS (Joint) |
2011-03-04 09:30 |
Okinawa |
Okinawa Convention Center |
Wormhole Attack Detection and Avoidance Method Using Observation Report from Neighbour Nodes Qi Wang, Ryo Yamamoto, Yoshiaki Tanaka (Waseda Univ.) NS2010-245 |
Wormhole attack is becoming a serious problem in ad hoc networks. In the attack, a pair of malicious nodes establishes ... [more] |
NS2010-245 pp.455-460 |
NS |
2009-12-11 15:05 |
Ehime |
Ehime University (Ehime) |
A Study of Malware Spreading Detection in Mobile P2P Networks. Masashi Yamashita, Keisuke Nakano, Masakazu Sengoku (Niigata Univ.) NS2009-141 |
Since the evolution of mobile devices, the risk of malware spreading in mobile peer to peer (P2P) networks increased. It... [more] |
NS2009-141 pp.115-118 |
US |
2009-10-23 11:50 |
Tokyo |
Institute of Industrial Science, the University of Tokyo |
Measurement of Viscoelastic Spectrum by Quadrupole-type Electro-Magnetically Spinning Viscometer Yuta Yamazaki, Keiji Sakai (Univ. of Tokyo) US2009-70 |
We introduce a new experimental technique to give the fundamental visco-elasticity of complex fluids, which requires qui... [more] |
US2009-70 pp.71-75 |
IN, NS, CS (Joint) |
2009-09-10 16:10 |
Miyagi |
Tohoku University (Miyagi) |
An Approach to Suppress Malware Spreading in Mobile Ad Hoc Networks. Masashi Yamashita, Keisuke Nakano, Masakazu Sengoku (Niigata Univ.) NS2009-67 |
Since the evolution of mobile devices, the risk of malware spreading in mobile ad hoc networks increased. Mobile Ad Hoc ... [more] |
NS2009-67 pp.43-46 |
IN |
2007-12-14 13:05 |
Hiroshima |
Hiroshima City University |
Entropy-based Analysis of User IP Space Zhenxing Lu, Marat Zhanikeev, Yoshiaki Tanaka (Waseda Univ.) IN2007-113 |
Although the concept of entropy was originally a thermodynamic construct, it has been adapted in other fields of study, ... [more] |
IN2007-113 pp.85-90 |
IN |
2007-12-14 13:30 |
Hiroshima |
Hiroshima City University |
A Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-114 |
Internet worms are one of the most serious threats in the Internet. For accurately detecting newly created worms, we hav... [more] |
IN2007-114 pp.91-96 |
IN |
2007-07-19 15:35 |
Hyogo |
Kobe University |
Optimum Parameter Setting in Identifying and Quarantining Worm-Infected Hosts Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada (NTT) IN2007-29 |
Abusive traffic caused by worm is a serious problem in the Internet because it consumes a large portion of network resou... [more] |
IN2007-29 pp.13-18 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 09:55 |
Hokkaido |
Future University-Hakodate |
Proposal for the quantitative method of searching characteristics of node Hirofumi Nakakoji, Masato Terada, Seiichi Susaki (Hitachi) |
Information about the network worms, such as how they exploit vulnerabilities, infection symptoms, how to remove them, i... [more] |
ISEC2007-50 pp.37-42 |
IN |
2007-06-22 14:35 |
Hokkaido |
Future University-Hakodate |
Identifying Worm-Infected Hosts Using White List Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino (NTT) IN2007-24 |
In the Internet, a rapid spread of worm is a serious problem. In many cases, worm-infected hosts generate huge amount of... [more] |
IN2007-24 pp.79-84 |