IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCS, SR, NS, SeMI, RCC
(Joint)
2021-07-15
13:00
Online Online Wired Transmission Experiments of Chaos Coded Modulation Method Using Software-Defined Radio
Kenya Tomita, Mamoru Okumura, Eiji Okamoto (NIT) RCC2021-30 NS2021-46 RCS2021-88 SR2021-28 SeMI2021-22
In recent years, with the progress on commercialization of the fifth-generation mobile communications system (5G), wirel... [more] RCC2021-30 NS2021-46 RCS2021-88 SR2021-28 SeMI2021-22
pp.37-42(RCC), pp.75-80(NS), pp.55-60(RCS), pp.42-47(SR), pp.51-56(SeMI)
CS 2020-11-06
14:45
Online Online + Central Community Center, Nonoichi Community Center
(Primary: Online, Secondary: On-site)
[Invited Lecture] A self-learning traffic analysis method for self-driving private mobile networks
Anan Sawabe (NEC/UTokyo), Takanori Iwai (NEC), Akihiro Nakao (UTokyo) CS2020-63
Recent wide-spreading IoT use cases lead IoT vertical players without wireless network expertise to utilize high perform... [more] CS2020-63
pp.81-82
MIKA
(2nd)
2019-10-03
14:05
Hokkaido Hokkaido Univ. [Invited Lecture] Traffic Analysis Empowered by Machine Learning for Estimating Context of IoT Application
Anan Sawabe, Takanori Iwai (NEC)
We have observed the emergence of various Internet of Things (IoT) use cases, such as remote robot control, over the las... [more]
MoNA, IN, CNR
(Joint) [detail]
2018-11-15
11:15
Saga Karatsu Civic Exchange Plaza Identification of Video Hosting Sites by Encrypted Traffic Analysis Considering Multi-Flow Transmission
Tomoki Ito (Nagoya Univ.), Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC), Tutomu Murase (Nagoya Univ.) MoNA2018-24 CNR2018-21
In recent years, requirement of network application users have advanced from the improvement of QoS (Quality of Service)... [more] MoNA2018-24 CNR2018-21
pp.13-18(MoNA), pp.19-24(CNR)
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
12:10
Hokkaido Sapporo Convention Center ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 This paper addresses the problem of encrypted packet classification based on SSH encrypted network traffic. The objectiv... [more] ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38
pp.305-310
NS, OCS, PN
(Joint)
2018-06-15
13:20
Fukushima Koriyama-Shoko-Kaigisho [Encouragement Talk] Real-time Estimating Application Flow from Encrypted Traffic
Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC) NS2018-33
In recent years, mobile network operators have focused on QoE and QoC of users, which requires advanced network control ... [more] NS2018-33
pp.31-36
RCS, NS
(Joint)
2017-12-14
12:50
Hiroshima Aster Plaza Identification of Applications on Smartphone by Encrypted Traffic Analysis
Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC) NS2017-126
Requirements of smartphone users shift from the quality of service, i.e., throughput, to the quality of applications . M... [more] NS2017-126
pp.1-6
NS, CS, IN
(Joint)
2013-09-13
13:50
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan A Study on Online Application Identification of Encrypted Traffic
Yuichi Kumano, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2013-74
Application identification in the middle is one of important technique for network operators to manage application based... [more] IN2013-74
pp.85-90
ISEC, IT, WBS 2008-02-28
10:20
Tokyo   A Method to Hide Traffic Flows Using Dummy Packets
Mamoru Mimura, Yasuhiro Nakamura (NDA) IT2007-32 ISEC2007-129 WBS2007-63
Currently, some traffic analysis technologies with packet capturing are being developed to observe the usage of the netw... [more] IT2007-32 ISEC2007-129 WBS2007-63
pp.1-8
ISEC, SITE, IPSJ-CSEC 2006-07-20
13:25
Okayama Okayama Univ. IDS for SSL Enncrypted Web Traffic
Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.)
The threat of attacks on web applications, such as SQL injection and cross site scripting, remains a serious problem. Th... [more] ISEC2006-32 SITE2006-29
pp.167-173
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan