IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
MRIS, ITE-MMS 2015-07-10
14:15
Tokyo Waseda Univ. [Invited Talk] Storage and HDD market trends for the up-to-date -- Trends for various storage --
Yoshiaki Horiuchi (HORI Tech) MR2015-12
 [more] MR2015-12
pp.19-24
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] 2015-02-24
11:00
Hokkaido Hokkaido Univ. [Invited Talk] Various storage and HDD market trends -- HDD,optics,semconductor,magunetic tape --
Yoshiaki Horiuchi (HORI Tec O)
 [more]
NS, IN
(Joint)
2014-03-06
09:50
Miyazaki Miyazaki Seagia A Design of Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors
Kohei Kotera, Akira Nagata, Katsuichi Nakamura (Network Application Engineering Labs), Yoshiaki Hori (Saga Univ.) NS2013-187
We propose an behavioral anomaly detection system which makes it possible to analyze and immediately detect anomaly traf... [more] NS2013-187
pp.61-66
IA 2013-10-22
15:10
Tokyo Takeda Hall, Takeda Bldg. 5F, Hongo Campus, Univ. of Tokyo Application Analysis on Network Traffic from Many Sensors
Yoshiaki Hori, Yaokai Feng (Saga Univ.), Akira Nagata, Kohei Kotera, Katsuichi Nakamura (NAL) IA2013-49
We discuss an anomaly detection of a computer network in Bigdata era. The network has to support to deliver network traf... [more] IA2013-49
pp.37-40
IA 2013-10-22
15:30
Tokyo Takeda Hall, Takeda Bldg. 5F, Hongo Campus, Univ. of Tokyo A Study of Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors
Akira Nagata, Kohei Kotera, Katsuichi Nakamura (NAL), Yoshiaki Hori (Saga Univ.) IA2013-50
For a computer network in Bigdata era, we discuss an behavioral anomaly detection system which makes it possible to anal... [more] IA2013-50
pp.41-44
ICSS 2012-03-16
14:10
Tokyo Kikai-Shinko-Kaikan Bldg. A Behavior-based Detection Method for Outbreaks of Low-rate Attacks
Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi (ISIT) ICSS2011-45
Low-rate attacks can conceal their traffic because they are very much like normal communication. Thus, although a number... [more] ICSS2011-45
pp.37-42
ICSS 2009-11-13
15:30
Miyazaki University of Miyazaki Packet filtering with IP address database and identification of attack path
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ)
 [more]
ICSS 2009-11-13
15:55
Miyazaki University of Miyazaki A Consideration of Feature Extraction for Attacks on Darknet
Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] ICSS2009-60
pp.37-42
ICSS 2009-11-13
16:20
Miyazaki University of Miyazaki The relation betwenn the arrangement of network sensors and the information obtained by the sensors
Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more]
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:20
Fukuoka Fukuoka Institute of System LSI Design Industry Variable Probabilistic Packet Mareking with TTL for IP Traceback
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
There are various kinds of menaces that exist within the network. There is a menace called the DoS
attacks in the one o... [more]
ISEC2008-31 SITE2008-25
pp.109-114
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:45
Fukuoka Fukuoka Institute of System LSI Design Industry A Proposal of Intrusion Detection using Third-parties Support
Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2008-37
Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies ... [more] ISEC2008-37
pp.15-22
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:40
Fukuoka Fukuoka Institute of System LSI Design Industry A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System
Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
For covering various requirements for the evaluations of security measures for a system with good coordination among the... [more] ISEC2008-54
pp.139-146
ISEC, SITE, IPSJ-CSEC 2008-07-25
16:10
Fukuoka Fukuoka Institute of System LSI Design Industry A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack
Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) ISEC2008-57
 [more] ISEC2008-57
pp.163-168
PN, CS, OCS
(Joint)
2008-06-13
11:10
Hokkaido Chitose Institute of Science and Technology Development for faster suppression of transient gain excursion in AGC
Yoshiaki Horiuchi, Masamichi Shiga, Noriyasu Shiga, Yoichi Oikawa, , Hiroshi Nagaeda (Trimatiz) CS2008-16
The system in which the power of such signals as burst ones or fast Add/Drop ones is rapidly changed has been developed ... [more] CS2008-16
pp.55-60
NS, IN
(Joint)
2008-03-06
10:10
Okinawa Bankoku Shinryokan Collaborated Link Evaluation with Packet Transfer Ratio in Multihop Wireless Network
Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga (KIT), Yoshiaki Hori (Kyushu Univ.), Hiroshi Ishinishi (NAL), Shuuji Kaizaki (KEPC) IN2007-175
Multihop Wireless Network provides flexible network architecture to be enable adding one or more Access Points (APs) to ... [more] IN2007-175
pp.97-102
NS, CS, IN
(Joint)
2007-09-20
13:30
Miyagi Tohoku University Access Point Evaluation with Packet Transfer Ratio in Multihop Wireless Network
Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga (KIT), Yoshiaki Hori (KU), Hiroshi Ishinishi (NAL) IN2007-49
Wireless LAN has been deployed widely to provide inexpensive access network for end systems. Especially Multiop Wireles... [more] IN2007-49
pp.37-42
COMP 2006-12-04
09:30
Aichi Nagoya University Economic-inspired truthful reputation feedback mechanism in P2P networks
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
 [more] COMP2006-42
pp.9-14
AI 2006-11-10
10:00
Kyoto   On securing open networks through trust and reputation - architecture, challenges and solutions
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
 [more] AI2006-12
pp.1-6
ISEC, SITE, IPSJ-CSEC 2006-07-21
11:35
Okayama Okayama Univ. Visualization Technologies of nicter Incident Analysis System
Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE)
The authors have been working on the R&D activities of nicter, an Internet security incident analysis center investigati... [more] ISEC2006-51
pp.83-89
ISEC, SITE, IPSJ-CSEC 2006-07-21
17:00
Okayama Okayama Univ. Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security
Erwan Le Malecot (Inst. of Sys., Inf. Tech. and nanotech.), Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
We introduce an original visualization design based on an interactive 3D
representation of the traffic between selected... [more]
ISEC2006-71
pp.229-236
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan