Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-06 16:55 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Improvements to security guidelines for Tier 3 and below suppliers in the domestic automobile industry Kang TaeSeok (IISEC) |
[more] |
|
ICSS, IPSJ-SPT |
2025-03-06 17:35 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Public and private cooperation in case of critical infrastructure service outage due to cyber-attacks Yuya Yamada, Atsuhiro Goto (IISEC) |
[more] |
|
ICSS, IPSJ-SPT |
2025-03-07 14:50 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Evaluation of Deployment Strategies for Active Directory Deception Techniques Using CyberBattleSim Akihiko Nakajima, Takao Okubo (IISEC) |
(To be available after the conference date) [more] |
|
ICSS |
2024-11-21 14:50 |
Kanagawa |
MUZA Kawasaki Symphony Hall (Kanagawa) |
Analysis of the Japan-US-EU Automotive Industry Security Guidelines for Small Suppliers Kang Taeseok (IISEC) ICSS2024-68 |
To improve the security response capabilities of the Japanese domestic automotive industry supply chain, the automotive ... [more] |
ICSS2024-68 pp.16-23 |
IA |
2023-11-22 16:50 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Aomori, Online) (Primary: On-site, Secondary: Online) |
IA2023-42 |
When a spam scam email is reported, it is desirable to share the data so that many researchers aiming to improve informa... [more] |
IA2023-42 pp.41-47 |
LOIS, SITE, ISEC |
2023-11-09 13:55 |
Hiroshima |
Satellite Campus Hiroshima (Hiroshima, Online) (Primary: On-site, Secondary: Online) |
ISEC2023-58 SITE2023-52 LOIS2023-16 |
With the spread of work style reforms such as remote work, communication about information security risks tends to be in... [more] |
ISEC2023-58 SITE2023-52 LOIS2023-16 pp.26-32 |
HWS, VLD [detail] |
2021-03-04 16:00 |
Online |
Online (Online) |
Survey on intrusion detection system for Vehicle Security Techniques Ayaka Matsushita, Takao Okubo (IISEC) VLD2020-88 HWS2020-63 |
The purpose of this paper is to identify the factors that cause the characteristics of voltage waveforms of ECUs in auto... [more] |
VLD2020-88 HWS2020-63 pp.114-119 |
IN, ICTSSL, NWS |
2020-10-22 09:55 |
Online |
Online (Online) |
Resilience of IoT device sensor against physical attack threats Michihiko Anzai, Atsuhiro Goto (iisec) ICTSSL2020-14 |
(To be available after the conference date) [more] |
ICTSSL2020-14 pp.7-12 |
ICSS, IPSJ-SPT |
2020-03-02 13:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model Moritoshi Aoyanagi, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2019-75 |
Binary code similarity comparison plays an important role in binary code analysis, vulnerability detection, and stolen c... [more] |
ICSS2019-75 pp.43-48 |
ICSS, IPSJ-SPT |
2020-03-03 09:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
A research of HTTP request and an identification method of fake User-Agent values Masato Inoue, Masaki Hashimoto (IISEC) ICSS2019-83 |
Almost all websites that are open to the public are subject to scan and attack, and have received a lot of anomaly reque... [more] |
ICSS2019-83 pp.91-96 |
ICSS, IPSJ-SPT |
2020-03-03 10:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
Development of an expert system for automatic classification of illegal and harmful information on the dark web Hanae Kobayashi, Masaki Hashimoto (IISEC) ICSS2019-87 |
(To be available after the conference date) [more] |
ICSS2019-87 pp.113-118 |
IA |
2018-09-04 10:30 |
Hokkaido |
Hokkaido Univ. Conference Hall (Hokkaido) |
A Study on OTT and Access networks Ichiro Mizukoshi (IISEC/NTT EAST), Miya Kohno (Cisco Systems), Kenichi Nagami (INTEC) IA2018-22 |
According to Geoff Houston(2017), “The Internet is now composed of OTT and access networks” [1]. In this report we 1) an... [more] |
IA2018-22 pp.41-46 |
SSS |
2018-04-24 15:05 |
Tokyo |
(Tokyo) |
Study on equipment for mitigation of security damages in connected vehicles Midori Inaba (IISEC) SSS2018-4 |
Safety of connected and autonomous vehicles relies on security. Therefore, prevention of automotive networks from malici... [more] |
SSS2018-4 pp.13-16 |
WBS, IT, ISEC |
2018-03-08 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science (Tokyo) |
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99 |
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] |
IT2017-118 ISEC2017-106 WBS2017-99 pp.81-88 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
A Preliminary Study on Defining Malignant Activity by Linking in-System Elements Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-60 |
In recent years, cyber-attacks have become large-scale and complicated, and the impact on society continues to become in... [more] |
ICSS2017-60 pp.55-60 |
ICSS, IPSJ-SPT |
2018-03-08 10:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
Research on an Evaluation Method for Memory Forensics Tools Makoto Ashitsu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-70 |
[more] |
ICSS2017-70 pp.115-120 |
ICSS, IPSJ-SPT |
2018-03-08 10:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
A Malware Detection Method by Machine Learning Focused on Malignant Activity Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-71 |
In recent years, many researches on detection and classification of malware have been done. Among them, researches on te... [more] |
ICSS2017-71 pp.121-126 |
KBSE |
2018-03-01 15:50 |
Okinawa |
(Okinawa) |
Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50 |
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] |
KBSE2017-50 pp.67-72 |
LOIS, ISEC, SITE |
2017-11-09 15:20 |
Kyoto |
(Kyoto) |
A study on Information
-- Tribute to Shannon and Dretski -- Ichiro Mizukoshi (IISEC/NTT East) ISEC2017-65 SITE2017-47 LOIS2017-42 |
In engineering sense, there is no argument that the definition of Information by Shannon is the foundation of current in... [more] |
ISEC2017-65 SITE2017-47 LOIS2017-42 pp.95-98 |
LOIS, ISEC, SITE |
2017-11-09 16:30 |
Kyoto |
(Kyoto) |
Anonymous Attribute-Authentication Scheme in Multi-authority Setting on Key Generation Hiroaki Anada (U.Nagasaki), Seiko Arita (IISEC) ISEC2017-59 SITE2017-41 LOIS2017-36 |
In a setting that a single user is given plural credentials on her attributes and related secret keys, an authentication... [more] |
ISEC2017-59 SITE2017-41 LOIS2017-36 pp.63-70 |