IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN, CS, NV
(Joint)
2022-09-02
14:10
Iwate MALIOS (Iwate Prefecture) + Online Meeting
(Primary: On-site, Secondary: Online)
A Proposal of Selecting Computing Nodes for End Cloud Networking Environments
Tatsuya Ueda, Daishi Kondo, Yosuke Tanigawa, Hideki Tode (Osaka Metropolitan Univ.) NS2022-73
Technology such as volunteer computing, which uses computing resources of nodes in the neighborhood of people, has been ... [more] NS2022-73
pp.70-75
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-13
14:00
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
A Proposal of Prioritized Transmission of Urgent Data Composed of Multiple Frames in Wireless Sensor Networks
Keita Yoshitomi, Yosuke Tanigawa, Daishi Kondo, Hideki Tode (OMU) NS2022-31
Recently, wireless sensor networks and their applications are becoming more diverse. In wireless sensor networks, high-p... [more] NS2022-31
pp.24-29
NS 2021-05-13
14:25
Online Online A Study on Privacy Concerns by Single-Word Search Query Leakage from Web Browsers through Domain Name System
Katsuki Isobe, Daishi Kondo, Hideki Tode (OPU) NS2021-18
Some web browsers used in some specific computers have a specification that a single-word search query (a word that cont... [more] NS2021-18
pp.20-25
NS, NWS
(Joint)
2021-01-22
13:30
Online Online [Encouragement Talk] A Study on Detection and Prevention of Stealthy DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] NS2020-116
pp.31-36
NS, ICM, CQ, NV
(Joint)
2020-11-27
14:25
Online Online A Study on Resource Discovery for Edge Computing in Named Data Networking
Daishi Kondo, Yosuke Tanigawa, Hideki Tode (Osaka Prefecture Univ.) NS2020-85
Edge computing over Named Data Networking (NDN) has been expected as a promising approach to deploy applications such as... [more] NS2020-85
pp.56-61
NS 2020-04-16
13:50
Online Online A Proposal of FQDN-based Whitelist Filter on DNS Cache Server against DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (OPU) NS2020-2
A Distributed Denial of Service (DDoS) attack is a major social issue, and as one of the DDoS incidents, a Domain Name S... [more] NS2020-2
pp.7-12
NS, IN
(Joint)
2020-03-06
10:40
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
Taxonomy of Attack and Prevention Methods for DNS Tunneling
Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Prefecture Univ.) NS2019-225
 [more] NS2019-225
pp.265-270
NS, IN, CS, NV
(Joint)
2019-09-06
11:15
Miyagi Research Institute of Electrical Communication, Tohoku Univ. A Study on Features Derived from Cache Property for DNS Tunneling Detection
Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] NS2019-93
pp.25-30
NS 2018-01-18
15:40
Okinawa Ishigakishi-Shoko-Kaikan [Encouragement Talk] Generation of NDN Flow Dataset from Waikato HTTP Flow Dataset and its Statistics
Daishi Kondo (UL), Hideki Tode (Osaka Prefecture Univ.), Tohru Asami (ATR) NS2017-150
Since NDN (Named Data Networking) has not been deployed yet for commercial purposes, it is difficult to discuss, from an... [more] NS2017-150
pp.35-40
NS 2017-05-19
10:50
Tokyo Kikai Shinko Kaikan Per-Packet Throughput of Information-Leakage Through Content Names in NDN Interest Packets
Daishi Kondo (UL), Thomas Silverston (NICT), Hideki Tode (Osaka Prefecture Univ.), Tohru Asami (Univ. of Tokyo), Olivier Perrin (UL) NS2017-20
Information-leakage is one of the most important security issues in the current Internet. In Named-Data Networking (NDN)... [more] NS2017-20
pp.35-40
NS, IN
(Joint)
2017-03-02
09:30
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL User-Driven Privacy Management Framework for Content Access
Daishi Kondo (UL), Thomas Silverston (NICT), Hideki Tode (Osaka Prefecture Univ.), Tohru Asami (Univ. of Tokyo), Olivier Perrin (UL) NS2016-158
The current Internet has a social problem that content providers collect the large scale of personal information and use... [more] NS2016-158
pp.7-12
NS, IN
(Joint)
2016-03-04
10:40
Miyazaki Phoenix Seagaia Resort Design of Interest Packet Filtering for Information Leakage Prevention based on URL Data Sampled from the Internet
Daishi Kondo (Univ. of Lorraine), Thomas Silverston (The Univ. of Tokyo), Hideki Tode (Osaka Prefecture Univ.), Tohru Asami (The Univ. of Tokyo) IN2015-135
One of the challenges in Information Centric Networking (ICN) is to prevent information leakages utilizing content names... [more] IN2015-135
pp.159-164
NS 2015-04-16
14:20
Gifu Hida-jibasan [Encouragement Talk] Caching Algorithm using Information of Rare Pieces for BitTorrent
Daishi Kondo, Akihiro Nakao (UT) NS2015-4
BitTorrent produces the redundant traffic between ASes, which has impact on the transit cost because BitTorrent construc... [more] NS2015-4
pp.17-22
CS, NS, IN
(Joint)
2014-09-12
09:20
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan In-network Detection of Rare Content Pieces for BitTorrent Swarm
Daishi Kondo, Akihiro Nakao (Univ. of Tokyo) NS2014-91
BitTorrent constructs an overlay network without considering the structure of the underlay network and the redundant tra... [more] NS2014-91
pp.73-78
NS, IN
(Joint)
2013-03-07
10:50
Okinawa Okinawa Zanpamisaki Royal Hotel P2P Live Streaming System for Multi-View Video with Fast Switching
Daishi Kondo, Akihiro Fujimoto, Yusuke Hirota (Osaka Univ.), Hideki Tode (Osaka Prefecture Univ.), Koso Murakami (Osaka Univ.) NS2012-205
P2P live streaming distribution systems, which have high scalability, configure one P2P overlay network to distribute on... [more] NS2012-205
pp.231-236
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan