|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Information Leakage Prevention Function of host based for P2P File Exchange Environment Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.) |
Recently, there are many incidents to which the classified information of the individual or the organization flows out i... [more] |
ISEC2008-32 SITE2008-26 pp.115-122 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 16:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Study of Database for information sharing of P2P File Exchange Environment Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi) |
Recently, there are many problems regarding the P2P file exchange environment on the Internet. The need to reconsider th... [more] |
ISEC2008-33 SITE2008-27 pp.123-128 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Study on Detecting Information Leak Virus by Activity Monitoring Tetsuro Kito (Hitachi, Ltd.), Takahiro Matsuki, Masaaki Matsuoka (LAC), Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.) |
In these days, it becomes a serious problem that personal/private information are disclosed by computer viruses which ab... [more] |
ISEC2008-60 pp.183-188 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Development of publicity function of the illegitimate activity host by the IP marking Takahiro Matsuki, Masaaki Matsuoka (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.) |
Recently, there are many problems regarding the P2P file exchange environment on the Internet.
The need to reconsider t... [more] |
ISEC2008-61 pp.189-194 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 09:55 |
Hokkaido |
Future University-Hakodate |
Proposal for the quantitative method of searching characteristics of node Hirofumi Nakakoji, Masato Terada, Seiichi Susaki (Hitachi) |
Information about the network worms, such as how they exploit vulnerabilities, infection symptoms, how to remove them, i... [more] |
ISEC2007-50 pp.37-42 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:45 |
Hokkaido |
Future University-Hakodate |
Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai) |
We try to analyze access logs from multiple sensors to get information about distribution of malicious hosts. We use the... [more] |
ISEC2007-52 pp.51-56 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:00 |
Iwate |
Iwate Prefectural University |
Researches on Incident Tendency Detection Method on Frequency Analysis Hirofumi Nakakoji, Masato Terada, Kenichi Sakamoto (Hitachi) |
It may have the periodic character in the virus, worm and unauthorized access, which form a threat on a network accordin... [more] |
ISEC2005-20 SITE2005-18 pp.83-88 |
|
|
|
[Return to Top Page]
[Return to IEICE Web Page]
|