|
|
All Technical Committee Conferences (Searched in: Recent 10 Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-06 14:45 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
A Large-Scale Investigation of Security Risks in Medical IoT Devices Kosuke Tanizaki (Kobe Univ./NICT), Keisuke Furumoto, Kohei Masumi, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2020-03-03 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
ICSS2019-92 |
(To be available after the conference date) [more] |
ICSS2019-92 pp.151-155 |
ICSS, IPSJ-SPT |
2020-03-03 10:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
ICSS2019-100 |
(To be available after the conference date) [more] |
ICSS2019-100 pp.283-288 |
ICSS, IPSJ-SPT |
2019-03-08 10:00 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center (Okinawa) |
ICSS2018-78 |
[more] |
ICSS2018-78 pp.89-94 |
ICSS, IPSJ-SPT |
2019-03-08 10:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center (Okinawa) |
ICSS2018-79 |
[more] |
ICSS2018-79 pp.95-100 |
ICSS, IPSJ-SPT |
2019-03-08 10:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center (Okinawa) |
ICSS2018-80 |
(To be available after the conference date) [more] |
ICSS2018-80 pp.101-104 |
ICSS, IPSJ-SPT |
2019-03-08 11:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center (Okinawa) |
Threat Information Analysis Using Conditional Generative Adversarial Network Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT) ICSS2018-81 |
[more] |
ICSS2018-81 pp.105-110 |
ICSS |
2018-11-21 15:15 |
Kagoshima |
(Kagoshima) |
Malware Analysis Method Using Conditional Generative Adversarial Network Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) ICSS2018-57 |
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] |
ICSS2018-57 pp.25-30 |
ICSS |
2018-11-21 15:40 |
Kagoshima |
(Kagoshima) |
ICSS2018-58 |
(To be available after the conference date) [more] |
ICSS2018-58 pp.31-36 |
ICSS |
2018-11-22 13:30 |
Kagoshima |
(Kagoshima) |
ICSS2018-64 |
(To be available after the conference date) [more] |
ICSS2018-64 pp.61-66 |
ICSS, IA |
2018-06-26 11:40 |
Ehime |
Ehime University (Ehime) |
A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13 |
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] |
IA2018-13 ICSS2018-13 pp.77-82 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
ICSS2017-64 |
[more] |
ICSS2017-64 pp.79-84 |
ICSS, IPSJ-SPT |
2018-03-08 11:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
ICSS2017-75 |
[more] |
ICSS2017-75 pp.145-150 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
ICSS2017-76 |
[more] |
ICSS2017-76 pp.151-156 |
ICSS |
2017-11-21 10:55 |
Oita |
Beppu International Convention Center (Oita) |
Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.) ICSS2017-45 |
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] |
ICSS2017-45 pp.41-45 |
ICSS |
2017-11-21 14:00 |
Oita |
Beppu International Convention Center (Oita) |
ICSS2017-50 |
[more] |
ICSS2017-50 pp.71-76 |
IA, ICSS |
2015-06-11 16:05 |
Fukuoka |
Kyushu Institute of Technology Univ. (Fukuoka) |
Traffic Data Analysis for Multiple Darknet and its Applications Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7 |
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] |
IA2015-7 ICSS2015-7 pp.33-38 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|