Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN, CS, NV (Joint) |
2019-09-06 13:55 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
On availability of a multi-layered and widely-distributed network monitoring system Hiroshi Tsunoda (Tohoku Inst. Tech.), Glenn Mansfield Keeni (Cyber Solutions) CS2019-58 |
[more] |
CS2019-58 pp.61-64 |
CS, NS, IN, NV (Joint) |
2017-09-07 09:00 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
Study on Connectivity Testing over Wireless Links in a Redistribution System of Early Warning Information Masahiro Matsuda, Eri Zeniya, Hiroshi Tsunoda (Tohtech) CS2017-42 |
As increasing the awareness of disaster prevention and mitigation, various early warning systems have been developed and... [more] |
CS2017-42 pp.1-5 |
NS, CS, IN, NV (Joint) |
2016-09-30 10:50 |
Miyagi |
Tohoku Univ. |
Societal model for Internet of Things: the requirements Hiroshi Tsunoda (Tohoku Inst. Tech.), Glenn Mansfield Keeni (Cyber Solutions) CS2016-39 |
From transportation to home and health care,
Internet of Things (IoT) has penetrated almost every sphere of society.
I... [more] |
CS2016-39 pp.51-55 |
CS, NS, IN (Joint) |
2014-09-12 09:20 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Monitoring syslog Hiroshi Tsunoda (Tohoku Inst. of Tech.), Glenn Mansfield Keeni (Cyber Solutions) CS2014-49 |
Log messages are generated by operating systems and applications. These messages contain important information about th... [more] |
CS2014-49 pp.51-54 |
IN, IA (Joint) |
2013-12-19 14:25 |
Hiroshima |
Hiroshima City Univ. |
Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems (1)
-- Project Vision and Overview -- Norio Shiratori, Naoki Nakamura, Satoru Izumi (Tohoku Univ.), Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Masahiro Ishigaki (Tohoku Univ.), Tsutomu Inaba, Takashi Ogasawara (NTT EAST), Takuo Suganuma (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.) IN2013-102 |
We have been promoted research and development under the support of the Green ICT Innovation Promotion (PREDICT) of Mini... [more] |
IN2013-102 pp.19-24 |
IN, IA (Joint) |
2013-12-19 14:50 |
Hiroshima |
Hiroshima City Univ. |
Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems (2)
-- Estimation of Power Consumption based on Network Information and International Standardization of G-MIB -- Satoru Izumi, Naoki Nakamura (Tohoku Univ.), Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Takuo Suganuma (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Norio Shiratori (Tohoku Univ.) IN2013-103 |
In this paper, we propose an estimation method of power consumptions based on network information to realize energy-savi... [more] |
IN2013-103 pp.25-30 |
NS, CS, IN (Joint) |
2013-09-13 11:10 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
A method for estimating active period of networked devices using connection management techniques and its evaluation Yuusuke Syouji, Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst.of Tech.) CS2013-39 |
[more] |
CS2013-39 pp.55-60 |
NS, IN (Joint) |
2012-03-08 09:50 |
Miyazaki |
Miyazaki Seagia |
Analyzing terminal operation status based on the connection history Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta, Glenn Mansfield Keeni (Cyber Solutions Inc.) IN2011-153 |
For a long time, global warming has become an international concern and reducing power consumption is strongly required ... [more] |
IN2011-153 pp.97-102 |
CS, CQ (Joint) |
2010-04-27 09:55 |
Aomori |
Oirase Keiryu Hotel |
An Image Transfer System using Multiple Cellular Phone Line Yuji Waizumi (Tohoku Univ.), Kouichi Abe (MagickWorX), Kaoru Miyauchi (K&C), Hiroki Nishiyama (Tohoku Univ.), Hiroshi Tsunoda, Hidehisa Nakayama (Tohoku Inst. of Tech.), Takuya Kitamura (Fudoki), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2010-8 |
[more] |
CS2010-8 pp.41-46 |
IN, NS, CS (Joint) |
2009-09-10 13:50 |
Miyagi |
Tohoku University (Miyagi) |
Network Application Identification based on Characteristics of Message Transmission Yuji Waizumi, Yuya Tsukabe (Tohoku Univ.), Hiroshi Tsunoda (Tohoku Inst. of Tech.), Yoshiaki Nemoto (Tohoku Univ.) CS2009-35 |
A person-to-person imformation sharing is easily realized by P2P networks that serves are unnecessary
to do so. Leakage... [more] |
CS2009-35 pp.13-18 |
IN, NS, CS (Joint) |
2009-09-10 14:15 |
Miyagi |
Tohoku University (Miyagi) |
Efficient Log Transfer based on Priority Queuing and Message Aggregation for Logging over Wireless Networks Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Mashimo, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2009-36 |
[more] |
CS2009-36 pp.19-24 |
CQ, CS (Joint) |
2009-04-16 10:50 |
Okinawa |
Okinawaken Seinen Kaikan |
Experiments of WLAN based Activity Monitoring System for Real-time Simultaneous Utilization Hidehisa Nakayama, Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Akihiro Suzuki (I.T.Research Co.,Ltd), Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2009-1 |
[more] |
CS2009-1 pp.1-6 |
CS, SIP, CAS |
2008-03-06 14:45 |
Yamaguchi |
Yamaguchi University |
Priority-based Adaptive Transmission Control for Efficient Log Transfer Hiroshi Tsunoda, Takafumi Maruyama, Satoru Abe (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto (Tohoku Univ.) CAS2007-113 SIP2007-188 CS2007-78 |
Logs generated by operating systems and application programs provide important information to a network administrator. L... [more] |
CAS2007-113 SIP2007-188 CS2007-78 pp.27-32 |
CS, SIP, CAS |
2008-03-06 15:35 |
Yamaguchi |
Yamaguchi University |
Generating Appropriate Templates for Efficient Application Identification Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CAS2007-115 SIP2007-190 CS2007-80 |
Recently, damages of information leakage caused by
illegal use of network applications have been reported.
To prevent ... [more] |
CAS2007-115 SIP2007-190 CS2007-80 pp.39-44 |
IN |
2007-12-14 13:30 |
Hiroshima |
Hiroshima City University |
A Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-114 |
Internet worms are one of the most serious threats in the Internet. For accurately detecting newly created worms, we hav... [more] |
IN2007-114 pp.91-96 |
IN |
2007-12-14 13:55 |
Hiroshima |
Hiroshima City University |
Classifying Network Anomaly Events Using the Occurence Probability of Correlation Coefficients Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-115 |
For taking effective countermeasures against network anomaly events,the classification of detected anomaly events is req... [more] |
IN2007-115 pp.97-102 |
NS, ICM, CQ (Joint) |
2007-11-15 16:25 |
Fukuoka |
Institute of System LSI Design Industry, Fukuoka |
[Encouragement Talk]
An evaluation of transition pattern of payload legnth for network application identification Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) TM2007-34 |
Recently, increasing of information leakages caused by illegal use of network applications have been reported. To preven... [more] |
TM2007-34 pp.1-6 |
NS, CS, IN (Joint) |
2007-09-21 13:20 |
Miyagi |
Tohoku University |
Detector Selection Method for Detecting Malicious Nodes in Wireless Sensor Networks Hiroshi Tsunoda (Tohoku Univ.), Ake Olbert, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2007-18 |
[more] |
CS2007-18 pp.9-14 |
NS, CS, IN (Joint) |
2007-09-21 13:40 |
Miyagi |
Tohoku University |
A Network Application Identification Method Using Similarity of Packet Payloads Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-19 |
[more] |
CS2007-19 pp.15-20 |
NS, CS, IN (Joint) |
2007-09-21 14:00 |
Miyagi |
Tohoku University |
An Enhancement of Network Anomaly Detection Method Using Occurence Probability Matrices of Correlation Coefficients Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-20 |
Recently, a network anomaly detection method focusing
correlation coefficients between traffic features has been pro... [more] |
CS2007-20 pp.21-26 |
|