|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, RCS (Joint) |
2020-12-18 14:35 |
Online |
Online |
People Flow Reconstruction Based on Anonymous Sensor Data toward Smart City Infrastructure for Estimating Infection Route. Kotaro Matsuda, Hiroki Ikeuchi, Yousuke Takahashi, Tsuyoshi Toyono (NTT) NS2020-103 |
The spread of infectious diseases such as COVID-19 incerases the demand for a social infrastructure to estimate the rout... [more] |
NS2020-103 pp.85-90 |
IA |
2015-08-25 16:05 |
Tokyo |
IIJ Seminar Room (Iidabashi Grand Bloom 13F) |
Extracting Block Structure from Router Command Output Data Tatsuaki Kimura, Akio Watanabe, Keishiro Watanabe, Tsuyoshi Toyono, Keisuke Ishibashi (NTT) IA2015-25 |
[more] |
IA2015-25 pp.35-40 |
ICM |
2015-03-20 10:40 |
Okinawa |
Ishigaki-City-Hall |
Branch Point Extraction from Process Event Logs for Operational Workflow Mining Akio Watanabe, Tatsuaki Kimura, Tsuyoshi Toyono, Keisuke Ishibashi (NTT) ICM2014-63 |
[more] |
ICM2014-63 pp.55-60 |
NS, IN (Joint) |
2014-03-07 15:30 |
Miyazaki |
Miyazaki Seagia |
Extraction Method for Operation Process Inforation from Trouble Tickets Akio Watanabe, Tatsuaki Kimura, Tsuyoshi Toyono, Ken Nishimatsu (NTT) IN2013-199 |
[more] |
IN2013-199 pp.327-330 |
NS, IN (Joint) |
2013-03-08 13:20 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Visualizing Network Logs for Diagnosing Large-scale Networks Problems Tatsuaki Kimura, Tatsuya Mori, Tsuyoshi Toyono, Keisuke Ishibashi, Kohei Shiomoto (NTT) NS2012-250 |
Network logs, such as router syslogs are efficient for understanding faulty events or current network states in detail. ... [more] |
NS2012-250 pp.495-498 |
IN |
2009-07-09 15:15 |
Hokkaido |
HOKKAIDO UNIVERSITY |
[Invited Talk]
Anomalous Traffic Observed in DNS Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato (NTT) IN2009-28 |
DNS is one onf the most critical infrastructure of the Internet, and used for most of Internet applications. On the othe... [more] |
IN2009-28 pp.19-24 |
IA, SITE |
2009-03-05 14:00 |
Kumamoto |
|
Evaluation of Black Domain List by Using DNS Query Graph Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato, Makoto Iwamura (NTT) SITE2008-47 IA2008-70 |
Botnet hosts, which can be controlled by malicious operators for executing DDoS attacks or spamming,
have been one of t... [more] |
SITE2008-47 IA2008-70 pp.19-24 |
IN |
2009-02-06 10:25 |
Kagawa |
Kagawa University |
Monitoring DNS Cache Poisoning Attacks Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato (NTT), Meidai Saito (National Police Academy) IN2008-129 |
In this paper, we propose a method to detect the new type of DNS cache poisoning attack, which was discovered July 2008 ... [more] |
IN2008-129 pp.43-48 |
IN |
2005-12-15 15:20 |
Hiroshima |
Hiroshima City Univ. |
[Invited Talk]
DNS traffic analysis and anomalies detection on DNS cache servers Tsuyoshi Toyono, Keisuke Ishibashi (NTT) |
DNS is a indispensable system of the Internet, and we must use DNS name resolution at first of connections. This paper r... [more] |
IN2005-115 pp.31-36 |
CS, IN, NS (Joint) |
2005-09-16 09:00 |
Miyagi |
Tohoku Univ. |
Detecting Mass-mailing Worm with DNS Traffic Monitoring Keisuke Ishibashi, Tsuyoshi Toyono, Katsuyasu Toyama (NTT) |
is often difficult to determine whether a DNS query is caused by malicious or normal activity, because
information... [more] |
IN2005-69 pp.49-54 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|