IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
Online Online Application Identification Method with Meta-Learning
Shun Tobiyama, Bo Hu, Kazunori Kamiya (NTT), Kenji Takahashi (NTT Ltd.) IN2020-40
With the continuous evolution of the Internet, a variety of web applications, such as video streaming, social network se... [more] IN2020-40
ICM 2020-03-03
Okinawa Ohama Nobumoto Memorial Hall
(Cancelled but technical report was issued)
Large-Scale NW Traffic Identification Technique with Domain Adaptation
Shun Tobiyama, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Ltd.) ICM2019-51
 [more] ICM2019-51
ICSS, IPSJ-SPT 2019-03-07
Okinawa NICT Okinawa Electromagnetic Technology Center Period Analysis for Visualization of Industrial Network
Hiroki Nagayama, Hu Bo, Kazunori Kamiya, Shingo Kashima, Masaki Tanikawa (NTT) ICSS2018-88
Since communications of the industrial network have strong periodicity, profiling the period of communications between d... [more] ICSS2018-88
ICSS, IPSJ-SPT 2019-03-07
Okinawa NICT Okinawa Electromagnetic Technology Center Regulatory Compliance Monitoring on the Web Using Paragraph Vector
Mitsuharu Sasaki (NTT EAST), Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya (NTT) ICSS2018-71
There are a certain number of employees who violate regulatory compliance by non-malicious acts. Since their violation m... [more] ICSS2018-71
ICSS, IPSJ-SPT 2019-03-07
Okinawa NICT Okinawa Electromagnetic Technology Center Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data
Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security) ICSS2018-77
 [more] ICSS2018-77
ICSS, IPSJ-SPT 2018-03-07
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN
Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-52
In recent years, the increase of unknown malware is remarkable and it is difficult to prevent malware infiltration by 10... [more] ICSS2017-52
ICSS, IPSJ-SPT 2018-03-08
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Response Signature Generation method for Detecting Malicious Destinations
Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-77
Blacklist is frequently deployed for detecting malware-infected hosts. However, even when request traffic from one host ... [more] ICSS2017-77
ICSS, IPSJ-SPT 2018-03-08
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification
Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-79
 [more] ICSS2017-79
ICSS 2017-11-21
Oita Beppu International Convention Center A Study of Detecting Infected Hosts by Graph Analysis of DNS Server Logs
Kazunori Kamiya, Ayako Hasegawa (SC-Lab.), Yuji Sekiya, Kazuya Okada (Univ. of Tokyo) ICSS2017-47
 [more] ICSS2017-47
ICSS, IPSJ-SPT 2017-03-13
Nagasaki University of Nagasaki Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data
Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] ICSS2016-51
ICSS, IPSJ-SPT 2017-03-13
Nagasaki University of Nagasaki Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic
Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] ICSS2016-52
ICSS, IPSJ-SPT 2016-03-03
Kyoto Academic Center for Computing and Media Studies, Kyoto University Evaluation of the attack detection method based on duration of continuous packet arrival
Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) ICSS2015-56
Application layer DDoS attacks occur frequently. In order to detect the attacks in network, a security appliance with De... [more] ICSS2015-56
ICSS 2015-11-26
Fukushima AIST, Fukushima Renewable Energy Institute TCP Behavior-based Slow DoS Attack Detection
Hiroyuki Nooka, Kazunori Kamiya, Hiroshi Kurakami, Takeshi Yada (NTT) ICSS2015-37
In this paper, we discuss the detection of a form of DoS/DDoS attack known as Slow DoS.
Currently, countermeasures agai... [more]
ICSS, IPSJ-SPT 2014-03-28
Okinawa Meio Univiersity Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis
Kensuke Nakata, Kazunori Kamiya, Hiroshi Kurakami, Kazufumi Aoki, Takeshi Yagi (NTT) ICSS2013-74
Recent cyber-attacks rapidly get advanced to infect terminals via invalid network access and could damage enterprise act... [more] ICSS2013-74
ICSS, IPSJ-SPT 2014-03-28
Okinawa Meio Univiersity Design of HTTP Communication Profiling for Infected Hosts Detection
Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] ICSS2013-84
Okinawa Ishigakijima Visualizing Traffic on Routing Topology
Kazunori Kamiya, Shu Sugimoto, Takanori Mizuguchi (NTT-COM) CS2012-3
 [more] CS2012-3
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan