Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-11-22 16:50 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Primary: On-site, Secondary: Online) |
IA2023-42 |
When a spam scam email is reported, it is desirable to share the data so that many researchers aiming to improve informa... [more] |
IA2023-42 pp.41-47 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-07 14:45 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
A Research of U.K Telecommunications (Security) Act 2021
-- Toward a Study of How to Change Information Security into Mandatory -- Yusuke Tachibana (FIT) SITE2021-53 IA2021-66 |
In December 2021, the UK passed the Telecommunications (Security) Act 2021. This act requires telecom operators to take ... [more] |
SITE2021-53 IA2021-66 pp.45-51 |
ET |
2020-03-07 13:50 |
Kagawa |
National Institute of Technology, Kagawa Collage (Cancelled but technical report was issued) |
Redefining Risk Assessment Based on Interpretation of Viewpoints and Researching Validity by Visualization System Kazuya Nitta, Naka Gotoda, Yusuke Kometani, Shigemi Ono, Rihito Yaegashi, Toshihiro Hayashi, Giro Imai, Koji Kida, Keizo Saisho (Kagawa Univ) ET2019-92 |
While information security threats become more sophisticated and complicated, an increasing number of organizations have... [more] |
ET2019-92 pp.93-98 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 09:55 |
Kochi |
Kochi University of Technology |
Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information Motoki Kusume, Koji Kida, Keizo Saisho (Kagawa Univ.) ISEC2019-12 SITE2019-6 BioX2019-4 HWS2019-7 ICSS2019-10 EMM2019-15 |
The damage caused by zero day attack performed between the time vulnerabilities are found in the software and the time t... [more] |
ISEC2019-12 SITE2019-6 BioX2019-4 HWS2019-7 ICSS2019-10 EMM2019-15 pp.1-6 |
DC |
2018-12-14 16:50 |
Okinawa |
Miyako Seisyonen-No-Ie |
Consideration on the key points to ensure security for train control using communication Tomonori Hasegawa (NTSEL), Takashi Mori (JR-West), Morimasa Hayashida (NTSEL), Takeshi Mizuma (U-Tokyo) DC2018-69 |
In view of the declining birthrate and the aging of the population, a growing importance has been given to maintenance-s... [more] |
DC2018-69 pp.55-58 |
CS |
2018-07-12 17:00 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
[Special Invited Talk]
Cyber Security: Lessons Learned from Actual Cases
-- Recent Trends of Cyber Attacks and Effective Approaches -- Hiroo Suzuki, Tetsushi Morita (NTT) CS2018-34 |
In 5G/IoT era, cyber security is an indispensable element for the sound development of digital economy utilizing informa... [more] |
CS2018-34 p.109 |
SIP, EA, SP, MI (Joint) [detail] |
2018-03-19 13:00 |
Okinawa |
|
[Poster Presentation]
Text-dependent voice liveness detection based on pop-noise detector considering speaker-dependent phoneme information for speaker verification Shihono Mochizuki, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-111 SIP2017-120 SP2017-94 |
This paper proposes a pop-noise (PN) detection method considering speaker-dependent phoneme information for text-depende... [more] |
EA2017-111 SIP2017-120 SP2017-94 pp.57-62 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-06 11:15 |
Tochigi |
Kinugawa Onsen Hotel |
Study on Effect Testing of Persuasive Message Stimulating Computer Virus Measures based on Collective Protection Motivation Theory Kana Shimbo, Komagome Tasuku, Takahashi Momomi, Harada Akane, Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.) SITE2017-74 IA2017-85 |
Numerous Internet users not recovering their infected PCs are reported. In order to have them recover their PCs, the pro... [more] |
SITE2017-74 IA2017-85 pp.205-208 |
ET |
2018-03-03 16:05 |
Kochi |
Kochi University of Technology (Eikokuji Campus) |
Development and Evaluation of a System for Support Visualization and Transmission for Recognition of Risk Assessment Process for the Incident Response Yuji Yamasaki, Naka Gotoda, Yusuke Kometani, Toshihiro Hayashi, Rihito Yaegashi, Keizo Saisho (Kagawa Univ.) ET2017-103 |
In recent years, the expansion of damage caused by information security incidents has become a problem, and appropriate ... [more] |
ET2017-103 pp.83-88 |
ISEC, LOIS, SITE |
2016-11-08 11:30 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
[Invited Talk]
Threat of Electromagnetic Information Leakage and Countermeasures Yu-ichi Hayashi (Tohoku Gakuin Univ.) ISEC2016-63 SITE2016-53 LOIS2016-41 |
As our information society has further developed, the widespread use of personal electronic devices like smartphones and... [more] |
ISEC2016-63 SITE2016-53 LOIS2016-41 p.75 |
ICM, LOIS |
2016-01-21 16:45 |
Fukuoka |
Fukuoka Institute of Technology |
[Invited Talk]
Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications Yoshiyasu Nishibe, Ken Ito, Masaki Onishi (NTT Com) ICM2015-33 LOIS2015-55 |
In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations... [more] |
ICM2015-33 LOIS2015-55 pp.41-46 |
ISEC |
2013-12-11 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Education for Practical Hardware Security Based on Information Security Education Program Yu-ichi Hayashi, Naofumi Homma (Tohoku Univ.), Toshihiro Katashita (AIST), Hideaki Sone (Tohoku Univ.) ISEC2013-78 |
This paper reports an education course for the development of human resources in hardware security in a practical educat... [more] |
ISEC2013-78 pp.33-37 |
ICSS, IA |
2012-06-21 15:20 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
Considering secure information infrastructure for gathering victim information Masahiro Hiji (Hitachi East Japan Solutions, Ltd./Tohoku Univ.), Kazuyoshi Matsumoto (Hitachi East Japan Solutions, Ltd.) IA2012-4 ICSS2012-4 |
The electric power and the communication network after the earthquake stopped for a long term.
This was a trouble wher... [more] |
IA2012-4 ICSS2012-4 pp.19-23 |
SITE, IPSJ-EIP |
2012-05-16 10:35 |
Tokyo |
NII |
The Questionnaire about an Information Security Measures for the Person in Charge of an Information Security in a Private University Masaru Ogawa (Kobe Gakuin Univ.) SITE2012-3 |
This paper discusses the result of questionnaire about an information security measures for the person in charge of an i... [more] |
SITE2012-3 pp.13-18 |
AP, ITE-BCT |
2012-02-09 10:20 |
Hiroshima |
NHK Hiroshima |
Evaluation of Fundamental Characteristics of Wireless Terminal Authentication Scheme Based on Radio Propagation Characteristics Naoki Otani, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2011-187 |
There is a problem of spoofing attack to legitimate users in wireless communication. As one of the countermeasures for t... [more] |
AP2011-187 pp.13-18 |
IN, IA (Joint) |
2011-12-16 12:50 |
Hiroshima |
Hiroshima City University |
Overlay Based, Distributed Defense-Framework against DDoS Attacks Mohamad Eid, Hitoshi Aida (Univ. of Tokyo) IA2011-51 |
The World Wide Web plays vital roles in our daily lives. But cyber-attackers abuse this vitality by threatening web serv... [more] |
IA2011-51 pp.37-42 |
AP, WPT (Joint) |
2011-10-13 13:25 |
Kanagawa |
Kanagawa Womens Center |
Experimental Evaluation of Wireless Terminal Authentication Scheme Based on Radio Propagation Characteristics Naoki Otani, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2011-80 |
There is a problem of spoofing attack to legitimate users in wireless communication. As one of the countermeasures for t... [more] |
AP2011-80 pp.19-24 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2009-12-03 11:00 |
Kochi |
Kochi City Culture-Plaza |
A Quantitative Evaluation of Security for Scan-based Side Channel Attack and Countermeasures Yuma Ito, Masayoshi Yoshimura, Hiroto Yasuura (Kyushu Univ) VLD2009-52 DC2009-39 |
There is a potential that the secret information on an encryption LSI is leaked from a scan chain. There are many counte... [more] |
VLD2009-52 DC2009-39 pp.73-78 |
SITE, IPSJ-EIP |
2008-05-30 13:25 |
Tochigi |
Utsunomiya University |
On Active Relationships Concerning Security between the Real World and the Virtual World Shigeki Koyama, Masahiro Matsuo (Hokkaido Univ.) |
Though most consumers are exposed to heavy risks in the Internet, they are not ready for taking enough security measures... [more] |
SITE2008-2 pp.7-10 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 11:10 |
Okayama |
Okayama Univ. |
A study on security technologies for paper documents Ryu Ebisawa, Yasuhiro Fujii, Yoshiyasu Takahashi, Satoru Tezuka (Hitachi) |
While the administration of the Privacy Law and the expected application of J-SOX (Japanese version of The Sarbanes-Oxle... [more] |
ISEC2006-50 pp.75-81 |