IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 26  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2015-03-03
13:00
Okinawa Meio Univiersity A detection system which uses DNS traffic features to detect domains which are related to botnets
Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST) ICSS2014-63
 [more] ICSS2014-63
pp.1-6
ICSS 2015-03-03
14:50
Okinawa Meio Univiersity A trial of network security tests over federated testbeds
Masatoshi Enomoto, Hiroaki Hazeyama (NAIST), Kazumasa Kobayashi (KUSA), Suguru Yamaguchi (NAIST) ICSS2014-67
In network security test environment constructed in wide area, we can test independent of site or scale of test suite or... [more] ICSS2014-67
pp.25-29
ICSS 2015-03-03
16:40
Okinawa Meio Univiersity Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] ICSS2014-71
pp.49-54
ICSS 2014-11-28
10:45
Miyagi Tohoku Gakuin University (Tagajo Campus) A Study of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] ICSS2014-60
pp.55-60
IA 2014-10-07
16:30
Osaka Grand Front OSAKA Tower-B 10F The current state and the future direction of the data center facility -- The experience from the construction of "ShowNet" at Interop Tokyo 2014 --
Koichi Ito (Japan Telegaertner), Yuji Sekiya (Univ. of Tokyo), Satoshi Uda (JAIST), Hiroaki Hazeyama (NAIST) IA2014-32
The importance of data center as inter-exchange point of Cloud and Big-data is growing up. And the equipment for Cloud a... [more] IA2014-32
pp.47-49
IA 2013-09-06
13:30
Tokyo IIJ Current status of IPv4/IPv6 co-existent technologies and interoperability test in ShowNet
Shuichi Ohkubo (SAKURA Internet), Hiroaki Hazeyama (NAIST), Kiriro Mano (A10 Networks), Shigeru Watanabe IA2013-21
Applicability of IPv4/IPv6 co-existent technologies and report the result of interoperability test in Interop2013 ShowNe... [more] IA2013-21
pp.25-28
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:30
Nara Todaiji Total Cultural Center Proposal of DDoS attack mitigation using two-step map table lookup on LISP
Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-51 IA2012-89
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed and practiced, most ... [more] SITE2012-51 IA2012-89
pp.37-42
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:55
Nara Todaiji Total Cultural Center A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] SITE2012-52 IA2012-90
pp.43-48
IA 2013-02-15
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Toward flexible network tester with FPGA
Yohei Kuga, Takeshi Matsuya (Keio Univ.), Hiroaki Hazeyama (NAIST), Osamu Nakamura (Keio Univ.) IA2012-85
To measure performances of network hardware, there are methods of using the software and specialized hardware.
Software... [more]
IA2012-85
pp.89-94
IA 2013-02-15
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Formal approach for verification of routing protocols
Tomoki Murota (Univ. of Tokyo), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) IA2012-86
 [more] IA2012-86
pp.95-100
IA 2012-11-19
17:10
Fukushima Kanponoyado Iwaki (Fukushima) Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] IA2012-56
pp.23-28
IA 2012-11-19
18:00
Fukushima Kanponoyado Iwaki (Fukushima) Proposal of DDoS mitigation using decoy servers to limit attacks to a localized region
Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-58
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed
and practiced, most... [more]
IA2012-58
pp.35-40
IA, SITE, IPSJ-IOT [detail] 2012-03-16
09:20
Hokkaido Hokkaido Univ. Design and Implementation of Network Covert Channel Validation Framework
Takashi Tomine (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) SITE2011-47 IA2011-97
Network covert channels are communication channels or information transfer methods in networks which are not intended fo... [more] SITE2011-47 IA2011-97
pp.185-190
ICSS 2011-11-18
15:30
Tokushima Naruto University of Education Multitenant Cloud Computing: Security Challenges and Approaches
Takeshi Takahashi (NICT), Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama (NAIST), Shin'ichiro Matsuo (NICT) ICSS2011-36
This paper presents challenges and approaches of techniques enabling multitenancy in cloud computing, especially resourc... [more] ICSS2011-36
pp.25-32
ICSS 2011-03-25
13:25
Tokyo Suspended Consideration on hidden-communication channel in the Internet communication device.
Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) ICSS2010-60
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more]
ICSS2010-60
pp.23-28
IA 2010-12-17
16:15
Tokyo Room1, B3F, Kikai-Shinko-Kaikan Bldg A Proposal of a Virtual Router Migration Control System Using Multilayer NDL in Virtual Network Environments
Tsukasa Yoneda, Kazuya Okada, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2010-68
Along with the developments of network virtualization technologies, techniques to migrate a virtual router from a physic... [more] IA2010-68
pp.61-66
IA 2010-08-06
15:45
Tokyo IIJ Kanda Jinbocho Bldg. An implemetation of a rapid graph drawing toolset for large scale network topologies
Hiroaki Hazeyama (NAIST), Hiroyuki Fujiwara (SCW) IA2010-26
Generally, it is difficult to draw a graph of large scale network such as the Internet according to the change of the ne... [more] IA2010-26
pp.55-60
IA, SITE, IPSJ-IOT [detail] 2010-03-01
15:50
Miyagi   A consideration of resource allocation problems on network emulation testbed with virtual machine
Masatoshi Enomoto, Hiroaki Hazeyama (NAIST), Shinsuke Miwa (NICT), Youki Kadobayashi (NAIST) SITE2009-47 IA2009-99
 [more] SITE2009-47 IA2009-99
pp.43-48
IA, SITE, IPSJ-IOT [detail] 2010-03-02
13:45
Miyagi   Stability Verification of Miniture Internet Using Live Traffic
Satoshi Ohta, Toshiyuki Miyachi, Shinsuke Miwa (NICT), Hiroaki Hazeyama, Masatoshi Enomoto (NAIST), Yoichi Shinoda (JAIST) SITE2009-66 IA2009-118
We have been developing a method to construct a realistic environment
that simulates the Internet on a testbed.

To ... [more]
SITE2009-66 IA2009-118
pp.259-264
IA 2009-09-25
14:25
Tokyo Kikai-Shinko-Kaikan Bldg. Design of Resource Allocation Meta-System for JGN2plu IaaS
Hiroaki Hazeyama (NAIST/NICT), Yoshihiko Kanaumi (Univ. of Tokyo/NICT), Takashi Miyake (NICT), Seiichi Yamamoto (Univ. of Tokyo/NICT), Katsuyuki Hasebe (NTT/NICT), Eiji Kawai (NICT), Kazumasa Kobayashi (Kurashiki Univ. of Sci and The Arts/NICT) IA2009-38
JGN2plus Project of NICT Advanced Testbed Network for R\&D group plans to start operating ``Infrastructure as a Service... [more] IA2009-38
pp.29-36
 Results 1 - 20 of 26  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan