IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, SITE, IPSJ-IOT [detail] 2022-03-08
14:20
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
A proposal of detection system for malicious DoH communication generated by DGA-based malware
Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) SITE2021-59 IA2021-72
(To be available after the conference date) [more] SITE2021-59 IA2021-72
pp.79-82
IN, IA
(Joint)
2021-12-17
14:55
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Recognition of Malicious DNS Tunnel Tools by DoH Traffic Analysis Using Multi-stage Machine Learning Technology
Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) IA2021-48
(To be available after the conference date) [more] IA2021-48
pp.85-92
DC 2008-10-20
15:00
Tokyo National Center of Sciences A Power Optimization Method for Quorum Systems
Munetoshi Ishikawa, Koji Hasebe (Tsukuba Univ.), Akiyoshi Sugiki (JST), Takahiro Shinagawa (Tsukuba Univ.), Kazuhiko Kato (Tsukuba Univ., JST) DC2008-25
In this paper, we present a power optimization algorithm for quorum systems, more specifically for a general class of qu... [more] DC2008-25
pp.17-22
ISEC 2008-05-16
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. A method to reduce false positive of Anomaly Detection System
Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri (NTT DoCoMo), Satoshi Kawasaki (Univ. of Tsukuba), Hirotake Abe (Toyohashi Univ. of Technology), Takahiro Shinagawa, Kazuhiko Kato (Univ. of Tsukuba) ISEC2008-8
We proposed a new anomaly detection system. In this system, software behavior that deviates from a model representing no... [more] ISEC2008-8
pp.49-56
ISEC, SITE, IPSJ-CSEC 2006-07-20
17:00
Okayama Okayama Univ. Preventing Buffer Overflow Attacks bypassing NXbit Protection
Takahiro Shinagawa (TUAT)
This paper presents a protection scheme to prevent buffer overflow attacks that bypass the NXbit protection and execute ... [more] ISEC2006-38 SITE2006-35
pp.215-222
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan