IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 36  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2022-11-08
09:50
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Tracing Methodology for Scanning Campaigns Based on Darknet Analysis
Chansu Han, Akira Tanaka, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (QU) ICSS2022-43
(To be available after the conference date) [more] ICSS2022-43
pp.31-36
ICSS, IPSJ-SPT 2021-03-01
09:10
Online Online Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts
Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-26
(To be available after the conference date) [more] ICSS2020-26
pp.1-6
ICSS, IPSJ-SPT 2021-03-01
13:40
Online Online An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-38
 [more] ICSS2020-38
pp.72-77
ICSS, IPSJ-SPT 2021-03-01
14:05
Online Online Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware
Reo Kawasoe (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-39
 [more] ICSS2020-39
pp.78-83
ICSS, IPSJ-SPT 2020-03-02
11:10
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring
Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT) ICSS2019-93
 [more] ICSS2019-93
pp.189-194
ICSS, IPSJ-SPT 2020-03-03
10:10
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
ICSS2019-100 (To be available after the conference date) [more] ICSS2019-100
pp.283-288
ICSS 2019-11-13
13:55
Miyazaki MRT Terrace(Miyazaki) A Fast Algorithm for Constructing Phylogenetic Trees and Its Evaluation
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2019-61
 [more] ICSS2019-61
pp.7-12
ICSS, IPSJ-SPT 2019-03-08
10:00
Okinawa NICT Okinawa Electromagnetic Technology Center ICSS2018-78  [more] ICSS2018-78
pp.89-94
ICSS, IPSJ-SPT 2019-03-08
11:15
Okinawa NICT Okinawa Electromagnetic Technology Center Threat Information Analysis Using Conditional Generative Adversarial Network
Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT) ICSS2018-81
 [more] ICSS2018-81
pp.105-110
HWS
(2nd)
2018-12-13
11:35
Tokyo Tokyo Univ. Takeda Bldg. Takeda Hall (Advance abstract in Japanese is available) [more]
ICSS 2018-11-21
15:15
Kagoshima   Malware Analysis Method Using Conditional Generative Adversarial Network
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) ICSS2018-57
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] ICSS2018-57
pp.25-30
ICSS 2018-11-22
13:30
Kagoshima   ICSS2018-64 (To be available after the conference date) [more] ICSS2018-64
pp.61-66
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
11:45
Hokkaido Sapporo Convention Center Real-time Botnet Detection Using Nonnegative Tucker Decomposition
Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
pp.297-304
ICSS, IA 2018-06-26
09:25
Ehime Ehime University A consideration on the possibility of automatic classifying for anomalous posts on Twitter
Ryutaro Ushigome (NICT/Chuo Univ), Takeshi Matsuda (Univ of Nagasaki), Michio Sonoda, Takeshi Takahashi, Mio Suzuki (NICT), Jinhui Chao (Chuo Univ) IA2018-9 ICSS2018-9
A lot of information has been posted on the SNS, including not only erroneous information and inappropriate writing, but... [more] IA2018-9 ICSS2018-9
pp.55-60
ICSS, IA 2018-06-26
11:40
Ehime Ehime University A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] IA2018-13 ICSS2018-13
pp.77-82
ICSS, IPSJ-SPT 2018-03-07
13:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2017-51
In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and ... [more] ICSS2017-51
pp.1-6
IA, ICSS 2015-06-12
15:20
Fukuoka Kyushu Institute of Technology Univ. A study on a Tool for Automated Vulnerability Monitoring and Alerting on Software Assets inside Organizations
Takeshi Takahashi, Daisuke Miyamoto, Bhola Panta, Koji Nakao (NICT) IA2015-18 ICSS2015-18
Each organization needs to manage its IT assets and related vulnerabilities in order to maintain its security level.
Ne... [more]
IA2015-18 ICSS2015-18
pp.99-104
ICSS 2015-03-04
15:30
Okinawa Meio Univiersity A Study on Risk Quantification Techniques for Android Applications with Category Information
Takeshi Takahashi (NICT), Takao Mimura, Masata Nishida (SecureBrain), Koji Nakao (NICT) ICSS2014-95
 [more] ICSS2014-95
pp.193-197
SC 2013-03-15
13:40
Tokyo   Towards Provenance-Based Security Risk Assessment
Guillermo Horacio Ramirez Caceres, Yohei Murakami, Koji Zettsu, Takeshi Takahashi, Shin'ichiro Matsuo (NICT)
We are developing a Knowledge Language Grid (KLG) system, which enables users to combine multiple assets data from diffe... [more] SC2012-18
pp.7-12
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:05
Hokkaido   A Study on Cybersecurity Information Discovery Mechanisms over the Internet
Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT) ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11
This paper prposes a scheme that links assorted structured cybersecurity information over networks and discovers them in... [more] ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11
pp.71-76
 Results 1 - 20 of 36  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan