IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 27  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SS 2023-03-14
16:30
Okinawa
(Primary: On-site, Secondary: Online)
Toward improving code execution speed using micro benchmark dataset
Fuki Omori, Akinori Ihara, Kazuya Saiki (Wakayama Univ.), Yutaro Kashiwa (NAIST) SS2022-56
There are some implementation approach with same functionality, but their execution speeds are different. It is difficul... [more] SS2022-56
pp.55-60
ET 2020-03-07
10:35
Kagawa National Institute of Technology, Kagawa Collage
(Cancelled but technical report was issued)
Development of a visual learning tool for compiler behavior
Hiroaki Hiranishi, Yoshiro Imai, Yoichi Sugimoto (Kagawa Univ.) ET2019-97
This paper proposes an educational tool, which can visualize the internal processing of the compiler. One of the purpose... [more] ET2019-97
pp.121-126
ICM 2020-03-03
13:30
Okinawa Ohama Nobumoto Memorial Hall
(Cancelled but technical report was issued)
Network Design Visualization to Describe Topology Overview and Routing Details
Tomohiro Kojo (SoftBank Corp.), Shintaro Kojima (Codeance, Inc.) ICM2019-57
In carrier-grade network design documents, hundreds of network diagrams are usually drawn to focus and elaborate on a sp... [more] ICM2019-57
pp.91-94
ICSS, IPSJ-SPT 2020-03-02
15:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript
Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.) ICSS2019-79
(To be available after the conference date) [more] ICSS2019-79
pp.67-71
IA 2019-11-15
13:15
Tokyo Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) Malicious URL Classification using Machine Learning Techniques
Yu-Chen Chen, Li-Dong Chen, Yan-Ju Chen, Jiann-Liang Chen (NTUST) IA2019-41
The Website security is an important research topic that must be pursued to protect internet users. Traditionally, black... [more] IA2019-41
pp.79-83
MSS, SS 2019-01-16
15:55
Okinawa   MSS2018-79 SS2018-50 (To be available after the conference date) [more] MSS2018-79 SS2018-50
pp.139-144
SITE, ISEC, LOIS 2018-11-04
11:30
Fukuoka   A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] ISEC2018-75 SITE2018-53 LOIS2018-35
pp.63-68
CS 2017-07-27
09:39
Nagasaki Fukue Bunka Kaikan Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL
Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] CS2017-15
pp.13-18
EMM, IT 2017-05-22
13:00
Yamagata Yamagata University(Yonezawa Campus) A Data Embedding Method based on the JavaScript Encoder jjencode
Hirohisa Hioki, Takayuki Matsushita (Kyoto Univ.) IT2017-1 EMM2017-1
We have been implemented a data hiding method for JavaScript programs based on an obfuscator called jjencode. We can emb... [more] IT2017-1 EMM2017-1
pp.1-6
ICSS, IPSJ-SPT 2017-03-13
16:40
Nagasaki University of Nagasaki Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ICSS2016-54
Detecting malicious PDFs (Portable Document Format) is imperative. In several malicious PDF detection schemes, the schem... [more] ICSS2016-54
pp.85-90
ET 2017-03-10
13:10
Ehime National Institute of Technology, Niihama College Development and Trial Evaluation of CPU Simulator with Register-transfer level Micro-Operation
Shinya Hara, Yoshiro Imai (Kagawa Univ.) ET2016-113
This paper proposes a new educational tool for Computer Architecture, which can provide simulation of assembly program c... [more] ET2016-113
pp.111-116
ET 2016-06-11
13:25
Aichi Nagoya Institute of Technology Development of teaching materials for computer programming in the class of economic data analysis
Katsumi Yoshine (Nanzan Univ.) ET2016-13
Computer programming education is overheated. In programming education, there is a variety of goals. For use with the cl... [more] ET2016-13
pp.31-36
ICSS, IPSJ-SPT 2016-03-04
10:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (YNU) ICSS2015-58
The malicious JavaScript is a common springboard for attackers to launch several types of network attacks, such as Drive... [more] ICSS2015-58
pp.65-70
ET 2015-06-06
11:20
Mie Faculty of Engineering, Mie Univ. A web-based programming environment for learning economic data analysis
Katsumi Yoshine (Nanzan Univ.) ET2015-14
In the class of data analysis for the students of the faculty of economics, we have introduced a programming education i... [more] ET2015-14
pp.19-24
ICSS 2015-03-03
16:40
Okinawa Meio Univiersity Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] ICSS2014-71
pp.49-54
ICSS 2014-11-28
10:45
Miyagi Tohoku Gakuin University (Tagajo Campus) A Study of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] ICSS2014-60
pp.55-60
ICSS, IPSJ-SPT 2014-03-27
13:55
Okinawa Meio Univiersity An Investigation of Malicious JavaScript Code used in Drive-by Download
Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] ICSS2013-72
pp.59-64
IA, IPSJ-IOT, SITE [detail] 2014-02-28
15:10
Ishikawa Hotel Rurikoh The impact of JavaScript to the increasing complexity in the Web traffic
Megumi Ninomiya, Kenjiro Cho (IIJ-II) SITE2013-73 IA2013-98
Recently, traffic volume of JavaScript tends to increase in Web applications. In this paper, we focused on JavaScript, a... [more] SITE2013-73 IA2013-98
pp.183-188
ET 2013-03-29
16:00
Ehime   Implementation of Common Lisp for e-Learning in JavaScript -- Special variable and Lexical scope --
Hiroshi Mitani, Keiichi Shiraishi (Kagawa N.C.T.) ET2012-97
To display and calculate formulas on a client-side of e-Learning, an implementation a computer algebra system on a web b... [more] ET2012-97
pp.91-94
ET 2013-03-29
14:00
Ehime   Development of the editing system of English teaching materials for tablets -- JSON format and CSV format --
Katsuya Azuma, Keiichi Shiraishi (Kagawa N.C.T.) ET2012-109
To help students enjoy learning English, developing an editing system of English teaching materials for tablets is tried... [more] ET2012-109
pp.157-159
 Results 1 - 20 of 27  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan