Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2018-03-02 14:40 |
Miyazaki |
Phoenix Seagaia Resort |
Development of an Emulation System for Autonomous and Distributed Internet Security Infrastructure Masaya Shimode, Tomohiro Akasaki, Hiroyuki Kimiyama, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-236 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" for protecting our resources on the Inte... [more] |
NS2017-236 pp.385-390 |
NS, IN (Joint) |
2018-03-02 15:00 |
Miyazaki |
Phoenix Seagaia Resort |
Distributed High-Speed Packet Filtering System for Autonomous and Distributed Internet Security Infrastructure Hiroyuki Kimiyama, Yuya Kishi, Haruka Momo, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-237 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to
protect our resources ... [more] |
NS2017-237 pp.391-396 |
NS, IN (Joint) |
2017-03-03 14:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Attack Blocking Method on Autonomous and Distributed Security Infrastructure for the Internet Hiroyuki Kimiyama, Ken Eguchi, Tomoaki Tsutsumi, Kaori Sano, Hirohumi Yamaki, Yoichiro Ueno, Naoki Yonesaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2016-251 |
Cyber attacks on network connected equipment, such as servers, PCs, IoTs and so on, will never be ended. Over 600Gbit/s ... [more] |
NS2016-251 pp.541-546 |
IA, IN (Joint) |
2016-12-15 16:20 |
Hiroshima |
Hiroshima city university |
Generation of Dropping Request Message by Identifying Source Addresses and Attributes of Attacking Packets Mamoru Yogosawa, Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Tsuyoshi Ishikawa, Teruaki Tsutsumi, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno, Hiroyuki Kimiyama, Naoki Yonezaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) IA2016-69 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. It naturally lead us to switching ... [more] |
IA2016-69 pp.35-40 |
IA |
2016-08-29 13:00 |
Tokyo |
IIJ Seminar Room |
Experiments to Block Bandwidth Attacks on Testbed Simulating Autonomous Internet Security Infrastructure Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Mamoru Yogosawa, Kudou Wataru, Ryusei Suzuki, Kazuo Ohsawa, Tsuyoshi Ishikawa, Daichi Ashikawa, Tomoaki Tutumi, Kaoru Sano, Hirofumi Yamaki, Yoichirou Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (TDU) IA2016-14 |
[more] |
IA2016-14 pp.7-12 |
LOIS, ISEC, SITE |
2015-11-06 16:20 |
Kanagawa |
Kanagawa Univ. |
A Feasibility Study of Autonomous Security Infrastructure in the Internet Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] |
ISEC2015-46 SITE2015-33 LOIS2015-40 pp.67-74 |
IA |
2014-09-12 10:00 |
Tokyo |
Tokyo Tech Front |
A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attack Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-14 |
An architecture of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets... [more] |
IA2014-14 pp.1-6 |
IA |
2014-09-12 10:30 |
Tokyo |
Tokyo Tech Front |
An Implementation and Evaluation of Multi-Layer-Binding Router using OpenFlow Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-15 |
A prototype of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets to ... [more] |
IA2014-15 pp.7-12 |
IA, ICSS |
2011-06-17 10:50 |
Fukuoka |
Kyushu Institute of Technology |
[Invited Talk]
Trend on Information Security and Technologies for Solving Issues Ryoichi Sasaki (Tokyo Denki Univ.) IA2011-9 ICSS2011-9 |
Information security issues can be considered to reach new stage judging from appearances of Wikileaks and Stuxnet, and ... [more] |
IA2011-9 ICSS2011-9 pp.47-56 |
SITE |
2006-11-02 14:00 |
Tokyo |
|
[Invited Talk]
Development and Trial Applications of Multple Risks Communicator Ryoichi Sasaki (Tokyo Denki Univ.) |
[more] |
SITE2006-37 pp.1-6 |
SITE |
2006-11-02 14:40 |
Tokyo |
|
Analysis on Y2K Issue from Viewpoint of Risk Communication Mitsuhiro Taniyama, Ryoichi Sasaki (TDU) |
[more] |
SITE2006-38 pp.7-12 |
SITE |
2006-11-02 15:05 |
Tokyo |
|
Method to Support Information Acquisition from Decision - Makers in“Multiplex Risk Communicator” Tomohiro Watanabe, Hiroshi Yajima, Ryoichi Sasaki (Tokyo Denki Univ) |
[more] |
SITE2006-39 pp.13-18 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 10:45 |
Okayama |
Okayama Univ. |
Survey and Analysis on Data Delete in PC for Internet Auction Satsuki Sato, Yuki Ashino (TDU), Tetsutaro Uehara (KU), Ryoichi Sasaki (TDU) |
[more] |
ISEC2006-18 SITE2006-15 pp.67-73 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 15:20 |
Okayama |
Okayama Univ. |
A Proposal of Response Delay Method for Spam Mail from BOTNET Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU) |
Recently, increasing spam mails have been becoming causes of many problems. About 80 % of spam mails have been sent from... [more] |
ISEC2006-35 SITE2006-32 pp.191-197 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:20 |
Okayama |
Okayama Univ. |
Proposal and Evaluation on Epidemiological Approach to Computer Virus Ryoichi Sasaki (Dendai) |
Because computer virus has evolved every moment, the range which encounters computer virus is expanded or damage has tur... [more] |
ISEC2006-48 pp.61-67 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 16:35 |
Okayama |
Okayama Univ. |
Proposal on whistle-blower protection technology to prevent the exposure of accuser from an indictment document Masataka Tada, Mituyuki Takatuka, Takanobu Masubuchi, Ryoichi Sasaki (Tokyo Den Univ.) |
[more] |
ISEC2006-60 pp.153-158 |
SN (2nd) |
2006-01-19 15:20 |
Tokyo |
Tokyo Denki University Kanda Campus |
A system of assisting elderly people's life Yuichi Uehara, Tomohiro Uchiyama, Kei Takeuchi, Mitsuhiro Shimazaki, Tsuyoshi Suzuki, Taiichi Saito, Yoshito Tobe, Katsuto Nakajima, Ryoichi Sasaki (Tokyo Denki Univ.) |
[more] |
|
ISEC, IPSJ-CSEC, SITE |
2005-07-21 14:15 |
Iwate |
Iwate Prefectural University |
Research on Epidemiologic Approach for Anti Computer Viruses - 2
-- Applying to the model of anti mass-mailing virus measure -- Satoshi Seki (Waseda Univ.), Ryoichi Sasaki (Tokyo Denki Univ.), Mitsuru Iwamura (Waseda Univ.), Hiroshi Motosugi (Tokyo Denki Univ.) |
[more] |
ISEC2005-23 SITE2005-21 pp.105-111 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 14:40 |
Iwate |
Iwate Prefectural University |
Extension and Evaluation of Check Function for Improper Sending of Personal Information in Encrypted Mail System Kenji Yasu (TDU), Yasuhiko Akabane (NSD), Masami Ozaki (HIN), Koji Semoto (DCS), Ryoichi Sasaki (TDU) |
[more] |
ISEC2005-24 SITE2005-22 pp.113-118 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:50 |
Iwate |
Iwate Prefectural University |
Proposal on Sumi coating method which can change the coating parts to protect against insider attacks Takanobu Masubuchi, Hajime Nakamura, Saneyuki Ishii, Noriko Ogawa, Hiroshi Kashimura, Ryoichi Sasaki (Tokyo Denki Univ) |
Digital signatures do not allow any alteration of a document. However, for some signed documents ”appropriate” alteratio... [more] |
ISEC2005-33 SITE2005-31 pp.179-186 |
|