Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
MRIS, ITE-MMS |
2015-07-10 14:15 |
Tokyo |
Waseda Univ. (Tokyo) |
[Invited Talk]
Storage and HDD market trends for the up-to-date
-- Trends for various storage -- Yoshiaki Horiuchi (HORI Tech) MR2015-12 |
[more] |
MR2015-12 pp.19-24 |
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2015-02-24 11:00 |
Hokkaido |
Hokkaido Univ. (Hokkaido) |
[Invited Talk]
Various storage and HDD market trends
-- HDD,optics,semconductor,magunetic tape -- Yoshiaki Horiuchi (HORI Tec O) |
[more] |
|
NS, IN (Joint) |
2014-03-06 09:50 |
Miyazaki |
Miyazaki Seagia (Miyazaki) |
A Design of Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors Kohei Kotera, Akira Nagata, Katsuichi Nakamura (Network Application Engineering Labs), Yoshiaki Hori (Saga Univ.) NS2013-187 |
We propose an behavioral anomaly detection system which makes it possible to analyze and immediately detect anomaly traf... [more] |
NS2013-187 pp.61-66 |
IA |
2013-10-22 15:10 |
Tokyo |
Takeda Hall, Takeda Bldg. 5F, Hongo Campus, Univ. of Tokyo (Tokyo) |
Application Analysis on Network Traffic from Many Sensors Yoshiaki Hori, Yaokai Feng (Saga Univ.), Akira Nagata, Kohei Kotera, Katsuichi Nakamura (NAL) IA2013-49 |
We discuss an anomaly detection of a computer network in Bigdata era. The network has to support to deliver network traf... [more] |
IA2013-49 pp.37-40 |
IA |
2013-10-22 15:30 |
Tokyo |
Takeda Hall, Takeda Bldg. 5F, Hongo Campus, Univ. of Tokyo (Tokyo) |
A Study of Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors Akira Nagata, Kohei Kotera, Katsuichi Nakamura (NAL), Yoshiaki Hori (Saga Univ.) IA2013-50 |
For a computer network in Bigdata era, we discuss an behavioral anomaly detection system which makes it possible to anal... [more] |
IA2013-50 pp.41-44 |
ICSS |
2012-03-16 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
A Behavior-based Detection Method for Outbreaks of Low-rate Attacks Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi (ISIT) ICSS2011-45 |
Low-rate attacks can conceal their traffic because they are very much like normal communication. Thus, although a number... [more] |
ICSS2011-45 pp.37-42 |
ICSS |
2009-11-13 15:30 |
Miyazaki |
University of Miyazaki (Miyazaki) |
Packet filtering with IP address database and identification of attack path Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ) |
[more] |
|
ICSS |
2009-11-13 15:55 |
Miyazaki |
University of Miyazaki (Miyazaki) |
A Consideration of Feature Extraction for Attacks on Darknet Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60 |
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] |
ICSS2009-60 pp.37-42 |
ICSS |
2009-11-13 16:20 |
Miyazaki |
University of Miyazaki (Miyazaki) |
The relation betwenn the arrangement of network sensors and the information obtained by the sensors Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more] |
|
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry (Fukuoka) |
Variable Probabilistic Packet Mareking with TTL for IP Traceback Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
There are various kinds of menaces that exist within the network. There is a menace called the DoS
attacks in the one o... [more] |
ISEC2008-31 SITE2008-25 pp.109-114 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry (Fukuoka) |
A Proposal of Intrusion Detection using Third-parties Support Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2008-37 |
Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies ... [more] |
ISEC2008-37 pp.15-22 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry (Fukuoka) |
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
For covering various requirements for the evaluations of security measures for a system with good coordination among the... [more] |
ISEC2008-54 pp.139-146 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 16:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry (Fukuoka) |
A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) ISEC2008-57 |
[more] |
ISEC2008-57 pp.163-168 |
PN, CS, OCS (Joint) |
2008-06-13 11:10 |
Hokkaido |
Chitose Institute of Science and Technology (Hokkaido) |
Development for faster suppression of transient gain excursion in AGC Yoshiaki Horiuchi, Masamichi Shiga, Noriyasu Shiga, Yoichi Oikawa, , Hiroshi Nagaeda (Trimatiz) CS2008-16 |
The system in which the power of such signals as burst ones or fast Add/Drop ones is rapidly changed has been developed ... [more] |
CS2008-16 pp.55-60 |
NS, IN (Joint) |
2008-03-06 10:10 |
Okinawa |
Bankoku Shinryokan (Okinawa) |
Collaborated Link Evaluation with Packet Transfer Ratio in Multihop Wireless Network Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga (KIT), Yoshiaki Hori (Kyushu Univ.), Hiroshi Ishinishi (NAL), Shuuji Kaizaki (KEPC) IN2007-175 |
Multihop Wireless Network provides flexible network architecture to be enable adding one or more Access Points (APs) to ... [more] |
IN2007-175 pp.97-102 |
NS, CS, IN (Joint) |
2007-09-20 13:30 |
Miyagi |
Tohoku University (Miyagi) |
Access Point Evaluation with Packet Transfer Ratio in Multihop Wireless Network Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga (KIT), Yoshiaki Hori (KU), Hiroshi Ishinishi (NAL) IN2007-49 |
Wireless LAN has been deployed widely to provide inexpensive access network for end systems. Especially Multiop Wireles... [more] |
IN2007-49 pp.37-42 |
COMP |
2006-12-04 09:30 |
Aichi |
Nagoya University (Aichi) |
Economic-inspired truthful reputation feedback mechanism in P2P networks Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
[more] |
COMP2006-42 pp.9-14 |
AI |
2006-11-10 10:00 |
Kyoto |
(Kyoto) |
On securing open networks through trust and reputation - architecture, challenges and solutions Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
[more] |
AI2006-12 pp.1-6 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 11:35 |
Okayama |
Okayama Univ. (Okayama) |
Visualization Technologies of nicter Incident Analysis System Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE) |
The authors have been working on the R&D activities of nicter, an Internet security incident analysis center investigati... [more] |
ISEC2006-51 pp.83-89 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 17:00 |
Okayama |
Okayama Univ. (Okayama) |
Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security Erwan Le Malecot (Inst. of Sys., Inf. Tech. and nanotech.), Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
We introduce an original visualization design based on an interactive 3D
representation of the traffic between selected... [more] |
ISEC2006-71 pp.229-236 |