IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 26  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS 2024-05-09
14:55
Mie Sinfonia Technology Hibiki Hall Ise
(Primary: On-site, Secondary: Online)
On Ordered Proof of Transit Based on eBPF for Service Function Chaining
Takanori Hara (NAIST), Masahiro Sasabe (Kansai Univ.) NS2024-17
(To be available after the conference date) [more] NS2024-17
pp.23-28
NS, IN
(Joint)
2024-03-01
11:10
Okinawa Okinawa Convention Center Blockchain-based malicious node detection and defense method for potential-based routing
Kanato Otsu (Osaka Univ.), Naomi Kuze (Wakayama Univ.) NS2023-200
In recent years, the scale and complexity in networks have grown such as the Internet of Things (IoT).
For controlling... [more]
NS2023-200
pp.166-171
NS, IN
(Joint)
2024-03-01
09:45
Okinawa Okinawa Convention Center Distributed UAV Deployment Method for Jamming Avoidance
Fumiki Yamashita (Osaka Univ.), Naomi Kuze (Wakayama Univ.) NS2023-203
In recent years, unmanned aerial vehicles (UAVs) are used to collect and relay information including image and movie dat... [more] NS2023-203
pp.184-189
ICM, NS, CQ, NV
(Joint)
2023-11-21
09:30
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
Fallback control based false injection attack defense mechanism for managed potential-based routing
Tasuku Nagata, Naomi Kuze (Osaka Univ.) NS2023-109
Due to the rapid growth of information networks, self-organization is a promising approach for controlling network
syst... [more]
NS2023-109
pp.1-6
CS, IN, NS, NV
(Joint)
2020-09-11
09:25
Online Online A virtual-network replacing scheme for achieving a metabolic network
Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2020-24
A future targeted attacks would infect a network with a malware program and then tampers packet-forwarding routes. As a ... [more] IN2020-24
pp.13-18
NS, IN
(Joint)
2020-03-05
11:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
An inheritance scheme of dynamic routing information for achieving successive replacing of virtual routers
Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2019-93
In future targeted attacks, malware programs infected in routers may cause various problems. Thus, we have proposed a sc... [more] IN2019-93
pp.103-108
MIKA
(2nd)
2019-10-04
10:15
Hokkaido Hokkaido Univ. [Poster Presentation] Confirmation of Network Congestion in Throughput Control Using Multiple Paths
Jun Kiyama, Takuya Shindo, Takefumi Hiraguri (NIT)
In recent years, traffic on the Internet has increased with the development of streaming services. In addition, server a... [more]
CS 2019-07-04
09:15
Kagoshima Amami City Social Welfare Center A study of dynamic throughput suppression control by multiple routes that include longest route
Jun Kiyama, Takuya Shindo, Takefumi Hiraguri (NIT) CS2019-28
In recent years, Network traffic is increasing due to the development of streaming services which is high quality video ... [more] CS2019-28
pp.59-62
COMP 2018-10-26
13:45
Kyoto Kyoto University
Kento Masuda, Shinji Imahori (Chuo Univ.), Yasuhiro Ohara (NTT Communications) COMP2018-25
The number and scale of DDoS attacks are increasing by DDoS attacks agencies and IoT devices. DDoS mitigation is one of ... [more] COMP2018-25
pp.33-39
MoNA 2018-08-02
14:05
Hokkaido Otaru Citizen Center Extended GEDIR Routing with Detection of Node Failure
Naoshi Yakura, Hiroaki Higaki (Tokyo Denki Univ.) MoNA2018-7
In data message transmissions in wireless ad-hoc networks, it is assumed that all wireless node correctly work in accord... [more] MoNA2018-7
pp.7-12
CS 2018-07-12
10:59
Okinawa Eef Information Plaza (Kumejima Is.) Study on Routing Control Method for DoS Attack
Jun Kiyama, Takuya shindo, Takefumi Hiraguri (NIT) CS2018-24
DoS attack that attack a web service and the internet is a big problem in recent years, because DoS attack takes a resou... [more] CS2018-24
pp.67-70
ICTSSL, IN
(Joint)
2017-10-10
14:50
Shizuoka   A Verification of Effect of Malicious User on Delay Tolerant Network
Naoya Mikamoto, Yoichi Utsunomiya, Takashi Okuda (Aichi Prefectural Univ.) IN2017-36
Delay Tolerant Networking (DTN) system provides communication services under the challenging network condition where a c... [more] IN2017-36
pp.7-12
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2017-03-10
10:40
Okinawa Kumejima Island Wormhole attack prevention in MANET using multipath routing protocol
Chika Onodera, Takashi Minohara (Takushoku Univ.) CPSY2016-147 DC2016-93
In recent years, mobile ad hoc networks(MANET) are becoming more and more important when it is hard to use normal networ... [more] CPSY2016-147 DC2016-93
pp.309-314
IN, ICTSSL, NWS
(Joint)
2016-10-21
09:55
Osaka Osaka Uinv. Suggestion and construction of the defense system for Slow HTTP DoS attack based on the session monitoring
Kazuki Ikeda, Yutaka Kawahashi (Wakayama Univ.) IN2016-57
In recent years, with the wide spread of the Internet, many companies and organizations are providing services using the... [more] IN2016-57
pp.49-54
ISEC 2015-05-15
14:35
Tokyo Kikai-Shinko-Kaikan Bldg. Path analysis method of anonymous communication system Tor
Yukihiro Shibahara, Naoshi Sato (IISEC) ISEC2015-3
Anonymous communication system looks effective for the privacy protection because it could assure anonymity of path from... [more] ISEC2015-3
pp.15-22
SR
(2nd)
2014-10-30
- 2014-10-31
Overseas I2R, Singapore [Poster Presentation] Neighborhood connectivity based trust scheme to prevent acitve black hole attacks
Ruojun Cai, Peter Han Joo Chong (NTU)
Active black hole attack is one of the most severe security threats that can be easily employed against normal routing i... [more]
NS, IN
(Joint)
2013-03-08
15:30
Okinawa Okinawa Zanpamisaki Royal Hotel A Study of a Trust-aware Routing Protocol in Wireless Multi-hop Networks
Kazuya Kohara (Osaka Univ.), Hirotake Abe (Univ. of Tsukuba), Ken-ichi Baba, Shinji Shimojo (Osaka Univ.) NS2012-223
In wireless multihop networks, conventional trust based routing protocols are vulnerable to Spoofing ACK Attack.Maliciou... [more] NS2012-223
pp.337-342
CQ
(Workshop)

Osaka Osaka Gakuin University [Poster Presentation] A new method of proactive recovery mechanisms for large-scale network failures
Takuro Horie, Go Hasegawa (Osaka Univ.), Satoshi Kamei (NTT), Masayuki Murata (Osaka Univ.)
This paper proposes a novel recovery mechanism from large-scale network failures caused by earthquakes, terrorist attack... [more]
ICM, CQ, NS
(Joint)
2008-11-13
18:00
Fukushima Nihon University A plan of the method of controlling the NGN route using an indivisual security policy
Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] CQ2008-51
pp.33-38
IN 2008-01-17
13:40
Aichi Nagoya Institute of Technology Sub-Marine Attack and its Defense in Ad Hoc Network Routing Protocols
XiaoYang Zhang, Yasushi Wakahara (Univ. of Tokyo) IN2007-120
Recently, significant attention has been devoted to developing secure routing protocols for an Ad hoc network. In this p... [more] IN2007-120
pp.7-12
 Results 1 - 20 of 26  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan