IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2017)

Search Results: Keywords 'from:2017-06-08 to:2017-06-08'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 13 of 13  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2017-06-08
13:00
Kochi Kochi University of Technolo, Eikokuji Campus Study of a Load Equalization Method Using Phase Shift for Distributed Sensor Data Stream Delivery
Tomoya Kawakami (NAIST), Yoshimasa Ishi, Tomoki Yoshihisa (Osaka Univ.), Yuuichi Teranishi (NICT/Osaka Univ.) IA2017-1 ICSS2017-1
(To be available after the conference date) [more] IA2017-1 ICSS2017-1
pp.1-6
IA, ICSS 2017-06-08
13:25
Kochi Kochi University of Technolo, Eikokuji Campus Development and evaluation of wild bird identification system using audio sensing and machine learning
Takemi Morimatsu (Nagoya Univ.), Hiroshi Yamamoto (Ritsumeikan Univ.) IA2017-2 ICSS2017-2
In recent years, prevention of damage to fishing or agriculture caused by wild animals becomes an important problem. Var... [more] IA2017-2 ICSS2017-2
pp.7-12
IA, ICSS 2017-06-08
13:50
Kochi Kochi University of Technolo, Eikokuji Campus Development and evaluation of victim detection system using autonomous UAV flight based on beacon radio sensing
Seiji Andon, Hiroshi Yamamoto (Ritsumeikan Univ.) IA2017-3 ICSS2017-3
 [more] IA2017-3 ICSS2017-3
pp.13-18
IA, ICSS 2017-06-08
14:25
Kochi Kochi University of Technolo, Eikokuji Campus A First Trend Review of Runtime Packers for IoT Malware
Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] IA2017-4 ICSS2017-4
pp.19-24
IA, ICSS 2017-06-08
14:50
Kochi Kochi University of Technolo, Eikokuji Campus Study on Email address harvesting by free service
Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) IA2017-5 ICSS2017-5
The cyberattack for which an e-mail was used in recent years is a big problem socially. An indefinite point keeps also h... [more] IA2017-5 ICSS2017-5
pp.25-29
IA, ICSS 2017-06-08
15:15
Kochi Kochi University of Technolo, Eikokuji Campus Digital Contract Protocols using Blockchain
Atsumu Mishima, Takashi Nishide (Tsukuba Univ.) IA2017-6 ICSS2017-6
(To be available after the conference date) [more] IA2017-6 ICSS2017-6
pp.31-35
IA, ICSS 2017-06-08
15:40
Kochi Kochi University of Technolo, Eikokuji Campus On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2017-7 ICSS2017-7
 [more] IA2017-7 ICSS2017-7
pp.37-42
IA, ICSS 2017-06-08
16:15
Kochi Kochi University of Technolo, Eikokuji Campus Training simulator for creating list of victims at the disaster medical base
Keijiro Okamura (Excite), Sato Fumiya, Fukumoto masahiro (Kochi Univ.of Tech) IA2017-8 ICSS2017-8
As one of the disaster planning, the disaster base hospital is announced as a gath-ering place for the people. As a plac... [more] IA2017-8 ICSS2017-8
pp.43-46
IA, ICSS 2017-06-08
16:40
Kochi Kochi University of Technolo, Eikokuji Campus Raspberry Guardian: Security Management for IoT Environment using Social Network Systems
Hiroyuki Ohno, Yoshiaki Kitaguchi (Kanazawa Univ), Hironobu Suzuki (Senshu Univ)
 [more]
IA, ICSS 2017-06-09
09:30
Kochi Kochi University of Technolo, Eikokuji Campus Analysis of First Meeting Time of Two Random Walkers toward Understanding Information Dissemination and Gathering with Mobile users
Yusuke Sakumoto (Tokyo Metropolitan Univ.), Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2017-9 ICSS2017-9
In this paper, we derive the the first meeting time formula of random walkers toward understanding information dissemina... [more] IA2017-9 ICSS2017-9
pp.47-52
IA, ICSS 2017-06-09
09:55
Kochi Kochi University of Technolo, Eikokuji Campus A Solution for Minimum Link Flow Problem with Sparse Modeling
Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2017-10 ICSS2017-10
In recent years, a statistical approach for estimating unobserved model parameters from a small number of measurements u... [more] IA2017-10 ICSS2017-10
pp.53-58
IA, ICSS 2017-06-09
10:30
Kochi Kochi University of Technolo, Eikokuji Campus [Invited Talk] Applying AI for Cyber Security
Jun'ichi Takeuchi (Kyushu Univ./NICT)
 [more]
IA, ICSS 2017-06-09
11:10
Kochi Kochi University of Technolo, Eikokuji Campus [Invited Talk] WarpDrive: Web-based Attack Response with Practical and Deployable Research InitiatiVE
Akira Yamada (KDDI Research) IA2017-11 ICSS2017-11
 [more] IA2017-11 ICSS2017-11
p.59
 Results 1 - 13 of 13  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan