|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2017-11-20 15:15 |
Oita |
Beppu International Convention Center |
Preliminary Evaluation on the Program Classification at the Processor Level using Machine Learning Ryotaro Kobayashi (Kogakuin Univ.), Hayate Takase, Genki Otani, Ren Ohmura (Toyohashi Univ. of Tech.), Masahiko Kato (Univ. of Nagasaki) ICSS2017-39 |
As use of IoT devices becomes widespread, a lot of things are connected to the Internet, and the convenience of everyday... [more] |
ICSS2017-39 pp.5-10 |
IA |
2017-01-27 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room |
Designing IoT Architecture for Optimization, Safety and Security
-- Network Segmentation for IoT Infrastructure by Transfer Control -- Yutaka Oiwa (AIST), Ray Atarashi (IIJ-II), Yoshifumi Atarashi (AlaxalA), Masahiko Kato (SUN) IA2016-80 |
[more] |
IA2016-80 pp.7-12 |
ICSS |
2012-11-22 14:30 |
Hiroshima |
Miyajima Mori-no-Yado |
Proposal of a network design support system for risk mitigation against inside attacks Hirokazu Hasegawa (Nagoya Univ.), Ray Atarashi (IIJ-II), Masahiko Kato (IIJ), Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura (Nagoya Univ.) ICSS2012-51 |
In sophisticated cyber attacks, even information protected by an isolated network is compromised. Although there are var... [more] |
ICSS2012-51 pp.37-42 |
IA |
2012-09-21 15:05 |
Tokyo |
|
Consideration of Service Defined Infrastructure(SvDI) for IaaS/HaaS Ray Atarashi (IIJ-II), Katsumi Kaneda, Masahiko Kato, Yuji Suga (IIJ), Yasuo Okabe (Kyoto Univ.) IA2012-18 |
[more] |
IA2012-18 pp.37-42 |
ICSS |
2010-11-05 14:30 |
Hiroshima |
Hiroshima City University |
Network Topology Analysys for Web Malware Risk Assesment Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba) ICSS2010-50 |
Risk Condition Reference Model indicated by National Information Security Center (NISC) simulated dynamics of threat beh... [more] |
ICSS2010-50 pp.35-40 |
ICSS |
2009-11-13 10:40 |
Miyazaki |
University of Miyazaki |
Identifying Potentially-Impacted Area using CVSS for Networked Systems Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.of Tsukuba), Masahiko Kato (IIJ Tech. Inc.) ICSS2009-54 |
CVSS(Common Vulnerability Scoring System) is a vulnerability scoring method. CVSS is composed of
three metrics groups: ... [more] |
ICSS2009-54 pp.1-6 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 14:15 |
Akita |
Akita University |
Risk Assessment Method for Networked Systems using CVSS Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) ISEC2009-34 SITE2009-26 ICSS2009-48 |
CVSS(Common Vulnerability Scoring System) is a common vulnerability scoring method. CVSS is composed of three metrics gr... [more] |
ISEC2009-34 SITE2009-26 ICSS2009-48 pp.189-194 |
IA |
2009-01-29 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The design of network system management and control architecture on the multi-domain environment Ray Atarashi, Megumi Ninomiya, Masahiko Kato (Internet Initiative Japan Inc.) IA2008-60 |
It is necessary to establish the technology that manages the resource of the network and the computer integrated to desi... [more] |
IA2008-60 pp.71-76 |
IA |
2008-11-05 16:15 |
Toyama |
Tateyama Kokusai Hotel |
The Topology Data Model Design for Network System Management Ray Atarashi, Megumi Ninomiya, Masahiko Kato (IIJ) IA2008-45 |
The network systems are required reliability and stability because the systems support the social infrastructure. One o... [more] |
IA2008-45 pp.25-30 |
IA |
2008-11-05 16:45 |
Toyama |
Tateyama Kokusai Hotel |
Network Management System Prototype based on the Data Model Megumi Ninomiya, Ray Atarashi, Masahiko Kato (IIJ) IA2008-46 |
When multiple network systems use particular network devices, network system configurations on the devices are very comp... [more] |
IA2008-46 pp.31-36 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|