|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2012-03-16 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks Tetsuro Kito, Satoshi Kai, Tomohiro Shigemoto, Satoshi Takemoto, Tadashi Kaji (Hitachi) ICSS2011-44 |
There are many users who feel uneasy about security to use cloud computing environment. To provide the cloud computing e... [more] |
ICSS2011-44 pp.31-36 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry (Fukuoka) |
Information Leakage Prevention Function of host based for P2P File Exchange Environment Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.) |
Recently, there are many incidents to which the classified information of the individual or the organization flows out i... [more] |
ISEC2008-32 SITE2008-26 pp.115-122 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 16:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry (Fukuoka) |
Study of Database for information sharing of P2P File Exchange Environment Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi) |
Recently, there are many problems regarding the P2P file exchange environment on the Internet. The need to reconsider th... [more] |
ISEC2008-33 SITE2008-27 pp.123-128 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry (Fukuoka) |
A Study on Detecting Information Leak Virus by Activity Monitoring Tetsuro Kito (Hitachi, Ltd.), Takahiro Matsuki, Masaaki Matsuoka (LAC), Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.) |
In these days, it becomes a serious problem that personal/private information are disclosed by computer viruses which ab... [more] |
ISEC2008-60 pp.183-188 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry (Fukuoka) |
Development of publicity function of the illegitimate activity host by the IP marking Takahiro Matsuki, Masaaki Matsuoka (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.) |
Recently, there are many problems regarding the P2P file exchange environment on the Internet.
The need to reconsider t... [more] |
ISEC2008-61 pp.189-194 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:45 |
Hokkaido |
Future University-Hakodate (Hokkaido) |
Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai) |
We try to analyze access logs from multiple sensors to get information about distribution of malicious hosts. We use the... [more] |
ISEC2007-52 pp.51-56 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|