Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS (Joint) |
2023-03-03 09:50 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Cyber-Attack Detection Method for Closed Network
-- A study of the detection technique of network-bridged equipment -- Nobuyuki Nakamura (OKI) IN2022-100 |
Cyber-Attacks in closed network occur recently. As closed network is not connected to the internet and may contain equip... [more] |
IN2022-100 pp.205-210 |
IN, NS (Joint) |
2023-03-03 11:00 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Real-Time Network Traffic Anomaly Detection in Edge Device Kota Tsuchie, Nobuyuki Nakamura, Taketsugu Yao (OKI) IN2022-107 |
For intrusion detection to closed networks, NDR (Network Detection and Response) is an expected technology that analyzes... [more] |
IN2022-107 pp.247-252 |
NS, IN (Joint) |
2022-03-10 10:20 |
Online |
Online |
Implementation and Evaluation of Real-Time Threat Detection System at the Network Edge Kota Tsuchie, Nobuyuki Nakamura, Toshihiko Matsunaga, Taketsugu Yao (OKI) IN2021-31 |
Data leakages and malware infections from the network edge have become to a social issue. NDR is an expected technology ... [more] |
IN2021-31 pp.1-6 |
IN, NS, CS, NV (Joint) |
2021-09-09 13:30 |
Online |
Online |
{Architecture for Configurable Real-time Device Identification in Campus Core Networks Kohei Hayashi (Osaka City Univ.), Kota Tuchie, Nobuyuki Nakamura, Taketsugu Yao (OKI), Shingo Ata (Osaka City Univ.) IN2021-14 |
In recent years, data traffic of IoT devices is increasing rapidly. In order to achieve a secure management of large-sca... [more] |
IN2021-14 pp.13-18 |
RISING (2nd) |
2019-11-26 10:30 |
Tokyo |
Fukutake Learning Theater, Hongo Campus, Univ. Tokyo |
[Poster Presentation]
Automatic error identification method in call control protocol Keishu Umoto, Shingo Ata (Osaka City Univ.), Yasubumi Chimura, Nobuyuki Nakamura, Taketsugu Yao (OKI) |
The number of IP phone users is increasing. Thus, the number of errors in IP phone increases, and various factors cause ... [more] |
|
RISING (2nd) |
2019-11-26 14:10 |
Tokyo |
Fukutake Learning Theater, Hongo Campus, Univ. Tokyo |
[Poster Presentation]
A method of improving device identification based on multiple identification methods Yuki Imamura (Osaka City Univ.), Nobuyuki Nakamura, Taketsugu Yao (OKI), Shingo Ata, Ikuo Oka (Osaka City Univ.) |
With recent development in communication technology, the number of devices connected to a network is increasing, and sec... [more] |
|
NS, IN, CS, NV (Joint) |
2019-09-06 13:30 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
Improvement of Device Identification by using Multiple Monitoring Methods Yuki Imamura (Osaka City Univ.), Nobuyuki Nakamura, Taketsugu Yao (OKI), Shingo Ata, Ikuo Oka (Osaka City Univ.) IN2019-28 |
With recent development in communication technology, security in communication devices especially in IoT devices becomes... [more] |
IN2019-28 pp.29-34 |
IN |
2017-06-16 10:40 |
Fukushima |
Roudou-Fukushi-Kaikan (Koriyama) |
Identification of Communication Devices from Analysis of Traffic Patterns Hiroki Kawai, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura (OKI), Oka Ikuo (Osaka City Univ.) IN2017-16 |
Recently, variety of communication devices such as printers, IP telephones, network cameras are used
widely, with the s... [more] |
IN2017-16 pp.49-54 |
SDM, OME |
2016-04-08 16:00 |
Okinawa |
Okinawa Prefectural Museum & Art Museum |
Non-thermal energy utilized low temperature solid phase crystallization of amorphous Ge on SiO2 substrate Kinta Kusano, Kazuki Kudo, Kodai Tomouchi, Taisei Sakaguchi, Kenta Moto (NIT, Kumamoto), Shinichi Motoyama, Yutaka Kusuda, Masahiro Furuta (SAMCO), Nobuyuki Naka, Tomoko Numata (HORIBA), Kenichiro Takakura, Isao Tsunoda (NIT, Kumamoto) SDM2016-8 OME2016-8 |
We have investigated the low-temperature SPC of amorphous Ge on insulating substrate. High temperature and long time ann... [more] |
SDM2016-8 OME2016-8 pp.31-34 |
OME, SDM |
2015-04-30 11:05 |
Okinawa |
Oh-hama Nobumoto Memorial Hall |
Influence of TEOS-SiO2 cap layer on Au induced lateral crystallization for amorphous Ge on insulator Kazuki Kudo, Kinta Kusano, Takatsugu Sakai (KNCT), Shinichi Motoyama, Yutaka Kusuda, Masahiro Furuta (SAMCO), Nobuyuki Naka, Tomoko Numata (HORIBA), Kenichiro Takakura, Isao Tsunoda (KNCT) SDM2015-11 OME2015-11 |
[more] |
SDM2015-11 OME2015-11 pp.41-44 |
CQ, CS (Joint) |
2015-04-22 11:10 |
Fukuoka |
Fukuoka Institute of Technology |
Multi-flow-based Traffic Analysis for Behavior Identification Yusuke Iemura, Yuichi Kumano (Osaka City Univ), Nobuyuki Nakamura (OKI), Shingo Ata, Ikuo Oka (Osaka City Univ) CQ2015-10 |
Recently, application identification methods are attracted as an important role for network management which enables app... [more] |
CQ2015-10 pp.51-56 |
ICM |
2015-03-19 10:40 |
Okinawa |
Ishigaki-City-Hall |
A Method of Multi-stage Application Identification for Improving Identification Accuracy Yuichi Kumano, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) ICM2014-57 |
A method of application identification is important for network management because it is used for traffic controls and a... [more] |
ICM2014-57 pp.19-24 |
NS, CS, IN (Joint) |
2013-09-13 13:50 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
A Study on Online Application Identification of Encrypted Traffic Yuichi Kumano, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2013-74 |
Application identification in the middle is one of important technique for network operators to manage application based... [more] |
IN2013-74 pp.85-90 |
NS, IN (Joint) |
2013-03-08 10:50 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
WLAN access point's collaboration method for saving radio resource Nobuyuki Nakamura (OKI) IN2012-197 |
The LTE technology can provide higher bitrate of mobile internet than 3G and helps generating huge amount of data packet... [more] |
IN2012-197 pp.257-262 |
IMQ |
2012-10-12 17:00 |
Kyoto |
Kyoto Institute of Technology, The Kosen Kaikan Faculty Club |
Object Segmentation by Edges Features of Graph Cuts Yuki Matumoto, Weiwei Du, Nobuyuki Nakamori (Kyoto Inst. of Tech.) IMQ2012-21 |
We propose a simple graph cuts algorithm based edges features to object segmentation problems. We smooth the image using... [more] |
IMQ2012-21 pp.37-42 |
IN |
2012-10-12 13:15 |
Tokyo |
Tokyo Univ. Sanjo-Kaikan |
A Route Control Method in Software DEfined Access Networks Norihiro Imanaka, Nobuyuki Nakamura, Yoshihiro Nakahira, Masayuki Kashima (OKI), Shingo Ata (Osaka City Univ.), Go Hasegawa (Osaka Univ.) IN2012-104 |
Due to the wide use and spread of network communications, importance of provide appropriate qual-ities for network servi... [more] |
IN2012-104 pp.161-166 |
MoNA, IN (Joint) |
2011-11-18 12:25 |
Fukuoka |
|
A study on improving accuracy of application identification for encrypted traffic Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2011-101 |
In network management, application identification of traffic is important. However, encrypted traffic has been increasin... [more] |
IN2011-101 pp.49-54 |
NS |
2011-05-19 15:40 |
Tokyo |
Sophia University |
Method for Detection of QoS Degradation and Failure Locating Satoshi Ikada, Nobuyuki Nakamura, Hiroshi Hashizume, Takahisa Kabe, Kei Kato (OKI) NS2011-30 |
(Advance abstract in Japanese is available) [more] |
NS2011-30 pp.75-79 |
ICM |
2011-03-11 17:10 |
Okinawa |
Miyakojima Marine Terminal |
An Improvement of QoS degradation locating considering number of overlap of degraded flows at monitoring points Satoshi Ikada, Nobuyuki Nakamura, Shigeru Fukunaga (OKI) ICM2010-74 |
[more] |
ICM2010-74 pp.115-120 |
IN, NS (Joint) |
2011-03-04 09:50 |
Okinawa |
Okinawa Convention Center |
The Method for detecting Silent failures in Virtual Networks Nobuyuki Nakamura, Satoshi Ikada (OKI) IN2010-182 |
Now we have lots of opportunities to use the Virtual Network technologies like VPN, Cloud, etc. These virtual networks t... [more] |
IN2010-182 pp.229-234 |