IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 26  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
17:30
Hokkaido Sapporo Convention Center DoS Attack Evaluation Experiment Using De-authentication Frames Against WPA2/WPA3-Enterprise Authentication Procedures
Daisei Tsuchiyama, Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII)
 [more]
ICSS 2023-11-16
13:50
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Device identification and attribute values consideration with browser fingerprint
Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-53
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprinting is us... [more] ICSS2023-53
pp.15-21
ICSS 2023-11-17
13:30
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Simulation of DNS cache poisoning attack detection method using DNS logs
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyui Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-64
DNS cache poisoning attacks exist as an attack that exploits the DNS cache function. Takahashi et al. proposed a method ... [more] ICSS2023-64
pp.93-100
ICSS 2023-11-17
13:55
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Analysis of the influence of DDoS attacks on Snort and legitimate users
Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65
(To be available after the conference date) [more] ICSS2023-65
pp.101-107
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:00
Hokkaido Hokkaido Jichiro Kaikan Analysis of effective attribute values on risk-based authentication with browser fingerprint
Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprint is used ... [more] ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19
pp.30-36
NS, ICM, CQ, NV
(Joint)
2022-11-24
18:05
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] NS2022-116
pp.91-96
ICSS, IPSJ-SPT 2022-03-07
15:20
Online Online Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] ICSS2021-65
pp.38-43
NS 2021-04-16
13:50
Online Online A Metamodel for Network Configuration Information
Nagi Arai, Hikofumi Suzuki, Shinpei Ogata, Kozo Okano (Shinshu Univ) NS2021-14
In terms of communication protocols and network device configuration information used at the Layer 3 level and above, it... [more] NS2021-14
pp.77-82
KBSE, SC 2020-11-13
15:18
Online Online + Kikai-Shinko-Kaikan Bldg.
(Primary: Online, Secondary: On-site)
[Poster Presentation] A Study of Method to Model Network Configuration in Static Routing for Real Network
Nagi Arai, Hikofumi Suzuki, Shinpei Ogata, Kozo Okano (Shinshu Univ) KBSE2020-20 SC2020-24
To operate the network, it is necessary to document and properly manage the configuration information of a real
network... [more]
KBSE2020-20 SC2020-24
p.38
ICM 2020-03-03
11:50
Okinawa Ohama Nobumoto Memorial Hall
(Cancelled but technical report was issued)
DDoS detection method based on appending graph centrality feature values to network flow monitoring data
Yuhei Hayashi (NTT), Aoshi Fujioka, Hikofumi Suzuki (Shinshu Univ.) ICM2019-55
 [more] ICM2019-55
pp.79-84
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:20
Hyogo Rokkodai 2nd Campus, Kobe Univ. Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree
Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] NS2019-123
pp.19-25
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:45
Hyogo Rokkodai 2nd Campus, Kobe Univ. Analysis of UTM traffic log using LLL algorithm
Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] NS2019-124
pp.27-30
ISEC, SITE, LOIS 2019-11-02
10:50
Osaka Osaka Univ. Detection System of DNS Cache Poisoning Using Blockchain Technology
Tomohiro Takahashi, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) ISEC2019-78 SITE2019-72 LOIS2019-37
Recently we enjoy the benefits of the Internet.
Internet is working by various network services.
The Domain Name Syst... [more]
ISEC2019-78 SITE2019-72 LOIS2019-37
pp.107-112
IA, ICSS 2019-06-07
11:20
Miyagi Research Institute for Electrical Communication, Tohoku University Development of System to Analyze Aggressive Communication Using Self-Organizing Map and Convolutional Neural Network
Akifumi Iwasa, Hikofumi Suzuki, Takumi Uchiyama (Shinshu Univ.), Tetsuya ui (NEC) IA2019-8 ICSS2019-8
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] IA2019-8 ICSS2019-8
pp.37-41
ICM, IPSJ-CSEC, IPSJ-IOT 2019-05-24
09:25
Osaka   Feature Value for Low-Bandwidth L3, L4 DDoS Detection based on Number of 5-tuple Flows in 3-tuple Flow
Yuhei Hayashi (NTT), Hikofumi Suzuki (Shindai), Takeaki Nishioka (NTT) ICM2019-5
Recently, new sophisticated attacks such as pulse-wave DDoS has been observed. The DDoS attack repeats short duration at... [more] ICM2019-5
pp.65-70
ICTSSL 2016-06-15
14:55
Miyagi Tohoku University Development of The Rapid Deployment of The Sensor Network for Disaster Information Collection -- Deployment Case of the Tonami City Toyama and Hatsukai City Hiroshima in Japan --
Hikofumi Suzuki (Shinshu Univ.), Masato Futagawa (Shizuoka Univ.), Mitsuru Komatsu (Okayama Univ.), David Asano, Yasushi Fuwa (Shinshu Univ.) ICTSSL2016-18
 [more] ICTSSL2016-18
pp.103-108
SRW 2016-06-13
15:25
Kanagawa NICT Wireless Network Research Institute (NICT) Protocol Interference Model within Proximal Transponders for Reducing Packet Loss Rate in Wireless Mesh Networks
Eiki Motoyama (NJRC), Hikofumi Suzuki, Yasushi Fuwa (Shinshu Univ.) SRW2016-31
In the regional protection system currently operating in the city of Shiojiri, data packets from transmitters carried by... [more] SRW2016-31
pp.33-38
NS, RCS
(Joint)
2015-12-18
13:05
Ehime Matsuyama Community Center A transponder location advisory system for improving fault tolerance of wireless networks
Yuya Kuriyama, David Asano, Hikofumi Suzuki, Yasushi Fuwa (Shinshu Univ) NS2015-143
Since 2008, we have been operating an ad-hoc sensor network system in Shiojiri City, Nagano, Japan. This system sends se... [more] NS2015-143
pp.95-100
NS, RCS
(Joint)
2015-12-18
13:30
Ehime Matsuyama Community Center A routing algorithm based on the traffic load in wireless networks
Seiya Sakamoto, Asano David, Hikofumi Suzuki, Yasushi Fuwa (Shinshu Univ.) NS2015-144
We build and operate communication infrastructure from wireless transponders in excess of 600 , for sending data from th... [more] NS2015-144
pp.101-106
MICT, ASN, MoNA
(Joint)
2015-01-26
10:15
Wakayama Nanki Shirahama Realization of a Safe and Secure Society using ICT in Shiojiri-City, Nagano Prefecture -- Towards the Creation of a Smart Citie --
Yasushi Fuwa, Hikofumi Suzuki, David K. Asano (Shinshu Univ.), Yuji Takeshita, Mitsuru Komatsu (Okayama Univ.), Masato Futagawa (Shizuoka Univ.), Eiki Motoyama (NJRC), So Seriu (ISID), Haruo Kaneko (Shiojiri-City) ASN2014-110
For some time, we have been working toward the “Realization of a Safe and Secure Society using ICT in Shiojiri-City, Nag... [more] ASN2014-110
pp.19-24
 Results 1 - 20 of 26  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan