Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2024-05-09 14:55 |
Mie |
Sinfonia Technology Hibiki Hall Ise (Primary: On-site, Secondary: Online) |
On Ordered Proof of Transit Based on eBPF for Service Function Chaining Takanori Hara (NAIST), Masahiro Sasabe (Kansai Univ.) NS2024-17 |
(To be available after the conference date) [more] |
NS2024-17 pp.23-28 |
NS, IN (Joint) |
2024-03-01 11:10 |
Okinawa |
Okinawa Convention Center |
Blockchain-based malicious node detection and defense method for potential-based routing Kanato Otsu (Osaka Univ.), Naomi Kuze (Wakayama Univ.) NS2023-200 |
In recent years, the scale and complexity in networks have grown such as the Internet of Things (IoT).
For controlling... [more] |
NS2023-200 pp.166-171 |
NS, IN (Joint) |
2024-03-01 09:45 |
Okinawa |
Okinawa Convention Center |
Distributed UAV Deployment Method for Jamming Avoidance Fumiki Yamashita (Osaka Univ.), Naomi Kuze (Wakayama Univ.) NS2023-203 |
In recent years, unmanned aerial vehicles (UAVs) are used to collect and relay information including image and movie dat... [more] |
NS2023-203 pp.184-189 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 09:30 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
Fallback control based false injection attack defense mechanism for managed potential-based routing Tasuku Nagata, Naomi Kuze (Osaka Univ.) NS2023-109 |
Due to the rapid growth of information networks, self-organization is a promising approach for controlling network
syst... [more] |
NS2023-109 pp.1-6 |
CS, IN, NS, NV (Joint) |
2020-09-11 09:25 |
Online |
Online |
A virtual-network replacing scheme for achieving a metabolic network Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2020-24 |
A future targeted attacks would infect a network with a malware program and then tampers packet-forwarding routes. As a ... [more] |
IN2020-24 pp.13-18 |
NS, IN (Joint) |
2020-03-05 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
An inheritance scheme of dynamic routing information for achieving successive replacing of virtual routers Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2019-93 |
In future targeted attacks, malware programs infected in routers may cause various problems. Thus, we have proposed a sc... [more] |
IN2019-93 pp.103-108 |
MIKA (2nd) |
2019-10-04 10:15 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
Confirmation of Network Congestion in Throughput Control Using Multiple Paths Jun Kiyama, Takuya Shindo, Takefumi Hiraguri (NIT) |
In recent years, traffic on the Internet has increased with the development of streaming services. In addition, server a... [more] |
|
CS |
2019-07-04 09:15 |
Kagoshima |
Amami City Social Welfare Center |
A study of dynamic throughput suppression control by multiple routes that include longest route Jun Kiyama, Takuya Shindo, Takefumi Hiraguri (NIT) CS2019-28 |
In recent years, Network traffic is increasing due to the development of streaming services which is high quality video ... [more] |
CS2019-28 pp.59-62 |
COMP |
2018-10-26 13:45 |
Kyoto |
Kyoto University |
Kento Masuda, Shinji Imahori (Chuo Univ.), Yasuhiro Ohara (NTT Communications) COMP2018-25 |
The number and scale of DDoS attacks are increasing by DDoS attacks agencies and IoT devices. DDoS mitigation is one of ... [more] |
COMP2018-25 pp.33-39 |
MoNA |
2018-08-02 14:05 |
Hokkaido |
Otaru Citizen Center |
Extended GEDIR Routing with Detection of Node Failure Naoshi Yakura, Hiroaki Higaki (Tokyo Denki Univ.) MoNA2018-7 |
In data message transmissions in wireless ad-hoc networks, it is assumed that all wireless node correctly work in accord... [more] |
MoNA2018-7 pp.7-12 |
CS |
2018-07-12 10:59 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
Study on Routing Control Method for DoS Attack Jun Kiyama, Takuya shindo, Takefumi Hiraguri (NIT) CS2018-24 |
DoS attack that attack a web service and the internet is a big problem in recent years, because DoS attack takes a resou... [more] |
CS2018-24 pp.67-70 |
ICTSSL, IN (Joint) |
2017-10-10 14:50 |
Shizuoka |
|
A Verification of Effect of Malicious User on Delay Tolerant Network Naoya Mikamoto, Yoichi Utsunomiya, Takashi Okuda (Aichi Prefectural Univ.) IN2017-36 |
Delay Tolerant Networking (DTN) system provides communication services under the challenging network condition where a c... [more] |
IN2017-36 pp.7-12 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-10 10:40 |
Okinawa |
Kumejima Island |
Wormhole attack prevention in MANET using multipath routing protocol Chika Onodera, Takashi Minohara (Takushoku Univ.) CPSY2016-147 DC2016-93 |
In recent years, mobile ad hoc networks(MANET) are becoming more and more important when it is hard to use normal networ... [more] |
CPSY2016-147 DC2016-93 pp.309-314 |
IN, ICTSSL, NWS (Joint) |
2016-10-21 09:55 |
Osaka |
Osaka Uinv. |
Suggestion and construction of the defense system for Slow HTTP DoS attack based on the session monitoring Kazuki Ikeda, Yutaka Kawahashi (Wakayama Univ.) IN2016-57 |
In recent years, with the wide spread of the Internet, many companies and organizations are providing services using the... [more] |
IN2016-57 pp.49-54 |
ISEC |
2015-05-15 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Path analysis method of anonymous communication system Tor Yukihiro Shibahara, Naoshi Sato (IISEC) ISEC2015-3 |
Anonymous communication system looks effective for the privacy protection because it could assure anonymity of path from... [more] |
ISEC2015-3 pp.15-22 |
SR (2nd) |
2014-10-30 - 2014-10-31 |
Overseas |
I2R, Singapore |
[Poster Presentation]
Neighborhood connectivity based trust scheme to prevent acitve black hole attacks Ruojun Cai, Peter Han Joo Chong (NTU) |
Active black hole attack is one of the most severe security threats that can be easily employed against normal routing i... [more] |
|
NS, IN (Joint) |
2013-03-08 15:30 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
A Study of a Trust-aware Routing Protocol in Wireless Multi-hop Networks Kazuya Kohara (Osaka Univ.), Hirotake Abe (Univ. of Tsukuba), Ken-ichi Baba, Shinji Shimojo (Osaka Univ.) NS2012-223 |
In wireless multihop networks, conventional trust based routing protocols are vulnerable to Spoofing ACK Attack.Maliciou... [more] |
NS2012-223 pp.337-342 |
CQ (Workshop) |
|
Osaka |
Osaka Gakuin University |
[Poster Presentation]
A new method of proactive recovery mechanisms for large-scale network failures Takuro Horie, Go Hasegawa (Osaka Univ.), Satoshi Kamei (NTT), Masayuki Murata (Osaka Univ.) |
This paper proposes a novel recovery mechanism from large-scale network failures caused by earthquakes, terrorist attack... [more] |
|
ICM, CQ, NS (Joint) |
2008-11-13 18:00 |
Fukushima |
Nihon University |
A plan of the method of controlling the NGN route using an indivisual security policy Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51 |
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] |
CQ2008-51 pp.33-38 |
IN |
2008-01-17 13:40 |
Aichi |
Nagoya Institute of Technology |
Sub-Marine Attack and its Defense in Ad Hoc Network Routing Protocols XiaoYang Zhang, Yasushi Wakahara (Univ. of Tokyo) IN2007-120 |
Recently, significant attention has been devoted to developing secure routing protocols for an Ad hoc network. In this p... [more] |
IN2007-120 pp.7-12 |