|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ICD |
2022-10-25 17:05 |
Shiga |
(Primary: On-site, Secondary: Online) |
How to Identify the Physical Direction of CAN Message Transmission Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35 |
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] |
HWS2022-43 ICD2022-35 pp.76-81 |
MSS, NLP |
2022-03-29 10:45 |
Online |
Online |
A proposal of method for defending against cyber attacks by combining honeypots and IPS Yudai Yamamoto, Shingo Yamaguchi (Yamaguchi Univ.) MSS2021-71 NLP2021-142 |
We propose a defense system that makes it possible to detect and prevent attacks targeting web applications and IoT devi... [more] |
MSS2021-71 NLP2021-142 pp.83-88 |
SeMI, IPSJ-ITS, IPSJ-MBL, IPSJ-DPS (Joint) |
2020-06-18 13:00 |
Online |
Online |
A Prototype and Evaluation of Vibration Detection System for Surveillance of Deer Fence Takuya Kato (KDDI Research, Inc.), Hiroyuki Yokota (TIRI), Yuichiro Hei, Izuru Nogaito, Eiji Utsunomiya (KDDI Research, Inc.) SeMI2020-1 |
Deer fences are widely used as an effective means of preventing serious feeding damage by deer and other wildlife. If de... [more] |
SeMI2020-1 pp.1-6 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Proposal of Intrusion Detection using Third-parties Support Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2008-37 |
Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies ... [more] |
ISEC2008-37 pp.15-22 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 09:55 |
Iwate |
Iwate Prefectural University |
A Study on Implementation of the Worm Prevention System Following the Infection Process Shusuke Maeda, Tatsuya Baba, Hisamichi Ohtani, Masataka Kado, Tsutomu Inada (NTT DATA) |
The network incidents caused by Internet worms are increasing every year. Infection of worms that exploit the vulnerabil... [more] |
ISEC2005-10 SITE2005-8 pp.7-14 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|