IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 11 of 11  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS 2024-03-14
13:40
Okinawa Okinawa Pref Danjyo-Kyoudou-Sankaku Center
(Primary: On-site, Secondary: Online)
LOIS2023-64 Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] LOIS2023-64
pp.96-101
ICSS, IPSJ-SPT 2022-03-08
15:30
Online Online Verifying concept of personalized malware by investigating end-user environments
Daigo Ichikawa, Rui Tanabe, XU Haoyuan, Yoshioka Katsunari, Matsumoto Tsutomu (YNU) ICSS2021-83
Personalized malware conducts malicious activities only when it is running on the target environment. Previous studies h... [more] ICSS2021-83
pp.147-152
ICSS, IPSJ-SPT 2021-03-02
10:25
Online Online Proof of concept of sandbox evasion attack using email address stored in target machine
Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] ICSS2020-57
pp.184-189
ICSS 2018-11-21
16:05
Kagoshima   [Invited Talk] Security Countermeasure at ShowNet in Interop Tokyo 2018
Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) ICSS2018-59
Cyber attacks become emerging threats on the Internet.We held an exhibition in ICT called Interop Tokyo every June. In t... [more] ICSS2018-59
p.37
NS, IN
(Joint)
2018-03-01
09:20
Miyazaki Phoenix Seagaia Resort A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] IN2017-90
pp.5-10
RCS, IN, NV
(Joint)
2017-05-12
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] IN2017-5
pp.21-24
ICSS, IPSJ-SPT 2017-03-14
11:20
Nagasaki University of Nagasaki Graph based Detection of Advanced Persistent Threat on LAN
Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT) ICSS2016-65
Recently the countermeasures against continuously increasing Advanced Persistent Threats(APT) are urgently necessary.
I... [more]
ICSS2016-65
pp.153-158
IA, IN
(Joint)
2016-12-16
13:20
Hiroshima Hiroshima city university A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures
Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] IN2016-82
pp.91-96
IA, ICSS 2015-06-12
10:30
Fukuoka Kyushu Institute of Technology Univ. Experimental Results on an Attack Detection System for Advanced Persistent Threats
Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] IA2015-9 ICSS2015-9
pp.45-50
IA 2014-10-07
16:55
Osaka Grand Front OSAKA Tower-B 10F Recent cyber attack methodology and protection -- The Consideration based on Interop Tokyo 2014 ShowNet Security --
Ken Hashimoto (FireEye), Takashi Tomine (NICT), Yuji Sekiya (Univ. of Tokyo) IA2014-33
In social activities and daily life, a share of activities from the Internet has been gotten higher. Due to that changes... [more] IA2014-33
pp.51-56
ICSS, IPSJ-SPT 2014-03-28
11:15
Okinawa Meio Univiersity Timeline-Based Event Log Viewer over Multi-Host Environment
Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more]
ICSS2013-79
pp.125-130
 Results 1 - 11 of 11  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan