IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 4 of 4  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM, LOIS 2016-01-21
16:45
Fukuoka Fukuoka Institute of Technology [Invited Talk] Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications
Yoshiyasu Nishibe, Ken Ito, Masaki Onishi (NTT Com) ICM2015-33 LOIS2015-55
In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations... [more] ICM2015-33 LOIS2015-55
pp.41-46
LOIS, ISEC, SITE 2015-11-06
16:20
Kanagawa Kanagawa Univ. A Feasibility Study of Autonomous Security Infrastructure in the Internet
Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] ISEC2015-46 SITE2015-33 LOIS2015-40
pp.67-74
ICSS 2015-03-03
13:50
Okinawa Meio Univiersity Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router -- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow --
Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) ICSS2014-65
There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems, and ... [more] ICSS2014-65
pp.13-18
ICSS, IPSJ-SPT 2014-03-28
10:15
Okinawa Meio Univiersity MATATABI: Multi-layer Threat Analysis Platform with Hadoop
Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] ICSS2013-77
pp.113-118
 Results 1 - 4 of 4  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan