Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) (Osaka) |
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network. Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 |
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more] |
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 pp.249-253 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) (Osaka) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) (Osaka) |
Phishing Detection Method Based on Machine Learning Using DNS Graph Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 |
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more] |
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 pp.337-342 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 11:10 |
Okinawa |
Miyakojima City Future Creation Center (Okinawa, Online) (Primary: On-site, Secondary: Online) |
A Routing Method Using Redirection Based on User Movement Prediction in CCN-based MANET Yuto Kanata, Masaki Hanada (Tokyo Univ. of information Sciences) SITE2023-70 IA2023-76 |
In recent years, many studies in terms of CCN-based MANET, applying CCN architecture to MANET, have been conducted with ... [more] |
SITE2023-70 IA2023-76 pp.12-17 |
NS, IN (Joint) |
2024-03-01 13:00 |
Okinawa |
Okinawa Convention Center (Okinawa) |
Interest Packet Forwarding Scheme by MPR Set with Movement Prediction in CCN-based MANETs Haruya Matsumoto, Masaki Hanada (Tokyo Univ. of information Sciences) IN2023-110 |
In recent years, many studies in terms of CCN-based MANET, applying CCN architecture to MANET, have been conducted.In a ... [more] |
IN2023-110 pp.267-272 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 14:10 |
Ehime |
Ehime Prefecture Gender Equality Center (Ehime, Online) (Primary: On-site, Secondary: Online) |
Probabilistic Block Transfer Method Considering Propagation Delay Between Regions in Blockchain Networks Shintarou Ohtsuka, Yuki Ishida, Masaki Hanada, Fumikazu Iseki (Tokyo Univ. of information Sciences) NS2023-121 |
Blockchain is a secure distributed ledger system, which is based on peer-to-peer networks. Cryptocurrencies, such as Bi... [more] |
NS2023-121 pp.62-67 |
IN, NS (Joint) |
2023-03-03 10:30 |
Okinawa |
Okinawa Convention Centre + Online (Okinawa, Online) (Primary: On-site, Secondary: Online) |
A Routing Method Considering Content Server Mobility in a Tree-Structured Mobile Network over CCN Yuto Nakagawa, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu (Tokyo Univ. of Technology) IN2022-106 |
In recent years, mobile network traffic has been rapidly increasing with spread of mobile devices such as smartphones. It ... [more] |
IN2022-106 pp.241-246 |
SWIM |
2022-11-26 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo, Online) (Primary: On-site, Secondary: Online) |
Sample Program Recommendation System to Support Programming Education Yoshihisa Udagawa (Tokyo Univ. of Information Sciences) SWIM2022-24 |
One effective way to learn programming techniques is to reuse sample programs. As the number of sample programs increase... [more] |
SWIM2022-24 pp.20-26 |
NS, IN (Joint) |
2022-03-11 15:50 |
Online |
Online (Online) |
A Routing Method Considering User Mobility in Tree-Structured Mobile Network over CCN Yuto Nakagawa, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu (Tokyo Univ. of Technology) IN2021-52 |
[more] |
IN2021-52 pp.127-132 |
KBSE, SWIM |
2021-05-21 14:45 |
Online |
Online (Online) |
Calculating similarity among Java programs based on method calls and visualization of similar programs Yoshihisa Udagawa (Tokyo Univ. of Information Sciences) KBSE2021-5 SWIM2021-5 |
One of the promising ways to improve programming techniques is to refer to sample programs published on the Internet. Ho... [more] |
KBSE2021-5 SWIM2021-5 pp.25-30 |
IN, NS (Joint) |
2021-03-05 13:20 |
Online |
Online (Online) |
Study on Interest Packet Sending Rate for VoD Streaming over CCN. Yuto Nakagawa, Masaki Hanada (Tokyo Univ. of Information Sciences.), Hidehiro Kanemitsu (Tokyo Univ. of Tech.) |
[more] |
|
SWIM |
2021-02-19 15:50 |
Online |
Online (Online) |
Statistical Analysis of Stock Price Fluctuations in Global Markets Before and After Corona Epidemic Sho Nishi, Yoshitaka Nishino, Yoshihiko Shiina, Jyunya Ohkuma, Kunihiko Usami, Shouta Tokuda, Susumu Ohtsuki, Tomorou Tanabe, Yuta Nakazato, Keisuke Iwaki, Yoshihisa Udagawa (Tokyo Univ. of Information Sciences) SWIM2020-19 |
The spread of COVID-19 is making a serious impact on the world economy. As policies to maintain economic activities have... [more] |
SWIM2020-19 pp.44-49 |
EA, ASJ-H |
2019-08-08 15:50 |
Miyagi |
Tohoku Univ. (Miyagi) |
[Invited Talk]
Sonic data transmission technology and its evaluation Akira Nishimura (Tokyo Univ. of Information Sciences) EA2019-28 |
[more] |
EA2019-28 pp.35-40 |
SITE, ISEC, LOIS |
2018-11-04 11:30 |
Fukuoka |
(Fukuoka) |
A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35 |
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] |
ISEC2018-75 SITE2018-53 LOIS2018-35 pp.63-68 |
ET |
2018-03-03 14:25 |
Kochi |
Kochi University of Technology (Eikokuji Campus) (Kochi) |
Training of program coding using dynamic algorithm visualization. Masanori Ohshiro, Yasuo Nagai (Tokyo Univ. of Information Sciences) ET2017-113 |
In order to program the algorithm, it is necessary to understand how the process is carried out, and what kind of variab... [more] |
ET2017-113 pp.143-146 |
NS, IN (Joint) |
2018-03-02 13:10 |
Miyazaki |
Phoenix Seagaia Resort (Miyazaki) |
In-Network Caching Method Considering Content Popularity and Playback Sequence for VoD Services over CCN Akira Toyozaki, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu, Hidenori Nakazato (Waseda Univ.) IN2017-129 |
In recent years,Content-Centric Networking (CCN) has been emerged as a new networking paradigm for efficient content del... [more] |
IN2017-129 pp.237-242 |
NS, IN (Joint) |
2018-03-02 13:30 |
Miyazaki |
Phoenix Seagaia Resort (Miyazaki) |
MPR Selection and Routing Methods Using Link Disconnection Prediction in OLSR Protocol Wataru Nagata, Akira Toyozaki, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu (Waseda Univ.), Yasuo Nagai (Tokyo Univ. of Information Sciences) IN2017-134 |
OLSR is one of well-known proactive protocols for MANETs.
OLSR may cause the reduction of network performance because ... [more] |
IN2017-134 pp.267-272 |
SRW |
2017-12-18 11:10 |
Tokyo |
Waseda Univ. (Tokyo) |
Dynamic transmission range control for exposed node reduction in Ad Hoc WLANs Emilia Weyulu, Masaki Hanada, Moo Wan Kim (Tokyo Univ. Of Information Sciences) SRW2017-61 |
[more] |
SRW2017-61 pp.7-11 |
RCS, IN, NV (Joint) |
2017-05-12 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
Ad-hoc Routing Method based on Predicted Link Connection Duration and Hop Count Wataru Nagata, Takeshi Misu, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu (Waseda Univ.), Yasuo Nagai (Tokyo Univ. of Information Sciences) IN2017-6 |
With the growth of IoT (Internet of Things), cars that are equipped with Internet access (i.e., connected cars) are grad... [more] |
IN2017-6 pp.25-30 |
IE, EMM, LOIS, IEE-CMN, ITE-ME [detail] |
2014-09-18 16:30 |
Kochi |
(Kochi) |
Reversible and robust audio watermarking based on spread spectrum and amplitude expansion in the integer-MDCT domain Akira Nishimura (Tokyo Univ. of Information Sciences) LOIS2014-22 IE2014-35 EMM2014-52 |
The present study proposes a novel reversible and robust technique
for hiding data in audio. It is perfectly reversib... [more] |
LOIS2014-22 IE2014-35 EMM2014-52 pp.47-52 |