Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, SR, NS, SeMI, RCC (Joint) |
2021-07-15 13:00 |
Online |
Online |
Wired Transmission Experiments of Chaos Coded Modulation Method Using Software-Defined Radio Kenya Tomita, Mamoru Okumura, Eiji Okamoto (NIT) RCC2021-30 NS2021-46 RCS2021-88 SR2021-28 SeMI2021-22 |
In recent years, with the progress on commercialization of the fifth-generation mobile communications system (5G), wirel... [more] |
RCC2021-30 NS2021-46 RCS2021-88 SR2021-28 SeMI2021-22 pp.37-42(RCC), pp.75-80(NS), pp.55-60(RCS), pp.42-47(SR), pp.51-56(SeMI) |
CS |
2020-11-06 14:45 |
Online |
Online + Central Community Center, Nonoichi Community Center (Primary: Online, Secondary: On-site) |
[Invited Lecture]
A self-learning traffic analysis method for self-driving private mobile networks Anan Sawabe (NEC/UTokyo), Takanori Iwai (NEC), Akihiro Nakao (UTokyo) CS2020-63 |
Recent wide-spreading IoT use cases lead IoT vertical players without wireless network expertise to utilize high perform... [more] |
CS2020-63 pp.81-82 |
MIKA (2nd) |
2019-10-03 14:05 |
Hokkaido |
Hokkaido Univ. |
[Invited Lecture]
Traffic Analysis Empowered by Machine Learning for Estimating Context of IoT Application Anan Sawabe, Takanori Iwai (NEC) |
We have observed the emergence of various Internet of Things (IoT) use cases, such as remote robot control, over the las... [more] |
|
MoNA, IN, CNR (Joint) [detail] |
2018-11-15 11:15 |
Saga |
Karatsu Civic Exchange Plaza |
Identification of Video Hosting Sites by Encrypted Traffic Analysis Considering Multi-Flow Transmission Tomoki Ito (Nagoya Univ.), Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC), Tutomu Murase (Nagoya Univ.) MoNA2018-24 CNR2018-21 |
In recent years, requirement of network application users have advanced from the improvement of QoS (Quality of Service)... [more] |
MoNA2018-24 CNR2018-21 pp.13-18(MoNA), pp.19-24(CNR) |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 12:10 |
Hokkaido |
Sapporo Convention Center |
ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 |
This paper addresses the problem of encrypted packet classification based on SSH encrypted network traffic. The objectiv... [more] |
ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 pp.305-310 |
NS, OCS, PN (Joint) |
2018-06-15 13:20 |
Fukushima |
Koriyama-Shoko-Kaigisho |
[Encouragement Talk]
Real-time Estimating Application Flow from Encrypted Traffic Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC) NS2018-33 |
In recent years, mobile network operators have focused on QoE and QoC of users, which requires advanced network control ... [more] |
NS2018-33 pp.31-36 |
RCS, NS (Joint) |
2017-12-14 12:50 |
Hiroshima |
Aster Plaza |
Identification of Applications on Smartphone by Encrypted Traffic Analysis Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC) NS2017-126 |
Requirements of smartphone users shift from the quality of service, i.e., throughput, to the quality of applications . M... [more] |
NS2017-126 pp.1-6 |
NS, CS, IN (Joint) |
2013-09-13 13:50 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
A Study on Online Application Identification of Encrypted Traffic Yuichi Kumano, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2013-74 |
Application identification in the middle is one of important technique for network operators to manage application based... [more] |
IN2013-74 pp.85-90 |
ISEC, IT, WBS |
2008-02-28 10:20 |
Tokyo |
|
A Method to Hide Traffic Flows Using Dummy Packets Mamoru Mimura, Yasuhiro Nakamura (NDA) IT2007-32 ISEC2007-129 WBS2007-63 |
Currently, some traffic analysis technologies with packet capturing are being developed to observe the usage of the netw... [more] |
IT2007-32 ISEC2007-129 WBS2007-63 pp.1-8 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:25 |
Okayama |
Okayama Univ. |
IDS for SSL Enncrypted Web Traffic Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.) |
The threat of attacks on web applications, such as SQL injection and cross site scripting, remains a serious problem. Th... [more] |
ISEC2006-32 SITE2006-29 pp.167-173 |