Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HIP |
2023-12-21 14:15 |
Miyagi |
Research Institute of Electrical Communication |
HIP2023-80 |
Recently local economies have been facing many challenges due to declining birthrates, aging populations, and informatio... [more] |
HIP2023-80 pp.21-27 |
IA, ICSS |
2021-06-22 09:00 |
Online |
Online |
Feature analysis of phishing website and phishing detection based on machine learning algorithms Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9 |
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] |
IA2021-9 ICSS2021-9 pp.44-49 |
IA, ICSS |
2021-06-22 09:25 |
Online |
Online |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
NLC |
2020-09-10 10:05 |
Online |
Online |
Extraction of medical technology sentences from the Faculty of Medicine Websites Yuta Sugawara, Kaito Takano, Hiroyuki Sakai (Seikei) NLC2020-2 |
In this research, we propose a method for extracting sentences including medical technology form the faculty of medicine... [more] |
NLC2020-2 pp.7-10 |
ICSS, IPSJ-SPT |
2020-03-03 09:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A research of HTTP request and an identification method of fake User-Agent values Masato Inoue, Masaki Hashimoto (IISEC) ICSS2019-83 |
Almost all websites that are open to the public are subject to scan and attack, and have received a lot of anomaly reque... [more] |
ICSS2019-83 pp.91-96 |
HIP, ASJ-H |
2020-02-15 13:00 |
Okinawa |
IT Souzou-kan Bldg. (Naha) |
The Efforts for iIproving the Operation and UX for Official Website in Department of Information Engineering Noritomo Taba, Tomokazu Nagata, Yuji Taniguchi (Ryukyu Univ) HIP2019-77 |
The official website of the University of the Ryukyus Intelligence Course is managed mainly by an organization called a ... [more] |
HIP2019-77 pp.1-5 |
ICSS |
2018-11-21 14:50 |
Kagoshima |
|
Spoofed Website Detection using Machine Learning Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto (Institute of Information Security) ICSS2018-56 |
In recent years, the damage by fake site has been rapidly increasing. Because fake sites are ceremonious as if they are ... [more] |
ICSS2018-56 pp.19-24 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Predicting Website Abuse Using Update Histories Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) ICSS2017-73 |
Threats of abusing websites that webmasters abandoned updates has increased.
In this paper, we propose a method of pred... [more] |
ICSS2017-73 pp.133-138 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 13:25 |
Tokyo |
|
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 |
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] |
ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 pp.81-86 |
ICSS, IPSJ-SPT |
2017-03-14 09:30 |
Nagasaki |
University of Nagasaki |
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58 |
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] |
ICSS2016-58 pp.111-116 |
ICSS, IPSJ-SPT |
2017-03-14 11:45 |
Nagasaki |
University of Nagasaki |
Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU) ICSS2016-68 |
Android app developers sometimes copy code snippets posted on a Question and Answer Website and develop their apps. If a... [more] |
ICSS2016-68 pp.171-176 |
AI |
2017-02-27 15:30 |
Kyoto |
Kyoto Univ. |
Development of Information Collection Supporting System for Chinese Self-guided Tour to Japan Jie Ji, Takashi Yoshino (Wakayama Univ.) AI2016-38 |
Recently, the number of Chinese tourists traveling to Japan is rising rapidly. As it is easier for individuals to apply ... [more] |
AI2016-38 pp.19-24 |
CW (2nd) |
2016-03-09 |
Tokyo |
|
A Proposal for Posting Comments in Smartphone VR Shintaro Kutsumi, Jun Iio (Chuo Univ.) |
Currently we often use Video sharing websites and enjoy them. However these websites have two weak points;1) Comments ar... [more] |
|
AI |
2015-12-04 16:35 |
Fukuoka |
Kyutech-Salite |
Feature Extraction and Recipe Classification based on Recipe-Sharing Websites Mamoru Emoto, Yukio Ohsawa (Tokyo Univ.) AI2015-25 |
In this study, we are focused on review data posted by users of recipe-sharing websites. First by using posting dates of... [more] |
AI2015-25 pp.73-77 |
KBSE |
2014-11-06 16:30 |
Kyoto |
Doshisha Univ.(Kanbai-kan 3F, Muromachi Campus, Kyoto) |
The proposal of website integration approach by using cooperative contents model Masahiro Kasatani, Shigeo Kaneda, Takuma Otsuka (Doshisha Univ) KBSE2014-32 |
The demand for integration of websites is increasing as the websites developed. However, integration approach of website... [more] |
KBSE2014-32 pp.25-30 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71 |
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more] |
ICSS2013-71 pp.53-58 |
HCGSYMPO (2nd) |
2013-12-18 - 2013-12-20 |
Ehime |
Matsuyama Multi-Purpose Community Cente |
A Study on the Video Introducing a Town from Dog's Point of View Chihiro Ota, Katsuhiko Ogawa (Keio Univ) |
In order to play the mall continue to decline, event that attempted to attract the visitors across the country have been... [more] |
|
ICSS |
2013-11-12 14:15 |
Fukuoka |
Nishijin Plaza |
Evaluations of Multi-Stage Traffic Analysis against Attacks on Websites Takeshi Yagi, Takeo Hariu (NTT), Hiroki Takakura (Nagoya University) ICSS2013-57 |
This paper proposes a traffic analysis scheme to detect attacks from accesses to websites. Conventional schemes can dete... [more] |
ICSS2013-57 pp.3-8 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:00 |
Hokkaido |
|
Evaluation of a Visualization System to Assess the Risk of Websites Tomoko Kajiyama (Aoyama Gakuin Univ.), Isao Echizen (NII) ISEC2012-16 SITE2012-12 ICSS2012-18 EMM2012-8 |
A prototype visualization system for helping children learn to assess website features and use them to identify risky we... [more] |
ISEC2012-16 SITE2012-12 ICSS2012-18 EMM2012-8 pp.51-57 |
EMM |
2011-11-15 13:15 |
Miyagi |
|
A Visualization Method for Helping Children Assess the Risk of Websites Tomoko Kajiyama (Aoyama Gakuin Univ.), Isao Echizen (NII) EMM2011-51 |
Since children cannot live in a safe cyberspace environment forever, setting up filtering or using educational materials... [more] |
EMM2011-51 pp.65-70 |