Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2025-03-04 12:00 |
Kagoshima |
Ama-Home Plaza (Kagoshima, Online) (Primary: On-site, Secondary: Online) |
A Two-Stage Classification-Based Intrusion Detection Model for Mitigating Unknown Attacks on MQTT Brokers Masako Miyazawa (Chuo Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Takatsugu Nakayama (Ritsumeikan Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2024-03-22 08:30 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Proposal of Moving Target Defense Approach on Reliability in Web Services Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82 |
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] |
ICSS2023-82 pp.93-99 |
IA |
2023-11-22 16:00 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Aomori, Online) (Primary: On-site, Secondary: Online) |
A Study on BGP Routing Operations in the Deployment of ASPA as Path Validation Yusho Yamaguchi (Osaka Univ.), Taiji Kimura (JPNIC), Naoto Yanai, Atsuo Inomata (Osaka Univ.) IA2023-40 |
Autonomous Systems Path Authorization (ASPA) is a technology for verifying routing information advertised in Border Gate... [more] |
IA2023-40 pp.25-32 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62 |
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] |
ICSS2022-62 pp.85-90 |
ICSS, IPSJ-SPT |
2023-03-14 11:10 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Investigating Server Fingerprints and Their Identifiability in Onion Service Yuuki Kimura, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ./Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-75 |
Anonymous network technology exists to ensure anonymous communication. Among the many anonymous networks that have been ... [more] |
ICSS2022-75 pp.163-168 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online (Online) |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online (Online) |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34 |
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] |
ICSS2020-34 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 10:00 |
Online |
Online (Online) |
Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.) ICSS2020-36 |
Programming competitions are held all over the world to write programs accurately in a short time. However, because many... [more] |
ICSS2020-36 pp.61-65 |
IA, SITE, IPSJ-IOT [detail] |
2017-03-03 14:50 |
Okinawa |
Culture Resort Festone (Okinawa) (Okinawa) |
Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage Masumi Uno (NAIST), Masahiro Ishii (Tokyo Tech), Atsuo Inomata (TDU), Ismail Arai, Kazutoshi Fujikawa (NAIST) SITE2016-68 IA2016-98 |
Confidential information have been leaked accidentally by targetted attacks by targeted attacks.
Remote Access Trojan/t... [more] |
SITE2016-68 IA2016-98 pp.41-46 |
IA, IN (Joint) |
2014-12-18 15:25 |
Hiroshima |
Hiroshima City University (Hiroshima) |
A Vehicle Clustering Algorithm for Information Propagation by Inter-Vehicle Communications Naohiro Washio (NAIST), Satoshi Matsuura (Tokyo Tech/NICT), Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2014-72 |
In the information propagation over a wide area, such as Vehicle-to-Vehicle (V2V) communications, there is the case that... [more] |
IA2014-72 pp.19-24 |
IA, IN (Joint) |
2014-12-19 11:05 |
Hiroshima |
Hiroshima City University (Hiroshima) |
A method of dynamic route selection for searching disaster victims with unmanned aerial vehicle Yoshihiro Ryugo, Kenji Ohira, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2014-76 |
In a disaster situation, it is difficult to investigate the damage situation from the ground due to the failure of infra... [more] |
IA2014-76 pp.43-48 |
WBS, ITS (Joint) |
2014-12-18 15:35 |
Kumamoto |
Kumamoto University (Kumamoto) |
A context aware routing metric for reliable route discovery in MANET using fuzzy logic Mehnaz Seraj, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) ITS2014-31 |
In mobile ad hoc networks, mobile devices communicate together in an autonomous fashion via multi-hop routes. Because of... [more] |
ITS2014-31 pp.63-67 |
IA |
2014-01-31 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
A study on IPv4 Sunset technique in campus network Daisuke Murata, Kenji Ohira, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2013-75 |
In this paper, in order to achieve IPv4 Sunset in campus network, we firstly analyze IPv4 traffic pattern of current sta... [more] |
IA2013-75 pp.43-48 |
IA |
2014-01-31 10:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
Data Guarantee Mechanism for Distributed Publish/Subscribe System Masanao Matsuura (NAIST), Satoshi Matsuura (NAIST/NICT), Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2013-76 |
Publish/Subscribe systems are infrastructures for real-time stream processing on distributed sensor networks. Sensor new... [more] |
IA2013-76 pp.49-54 |
ITS, IEE-ITS |
2013-03-11 13:40 |
Kyoto |
(Kyoto) |
Location Tracking Prevention with Dummy Packet for Vehicular Communications Tsubasa Teramoto, Satoru Noguchi, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) ITS2012-64 |
In emerging vehicular communication systems, each vehicle periodically broadcasts Safety Messages, which contains vehicl... [more] |
ITS2012-64 pp.49-54 |
IN, IA (Joint) |
2012-12-14 13:30 |
Hiroshima |
Hiroshima City Univ. (Hiroshima) |
A proposal for dynamic server consolidation considering the impact on applications Masashi Hashimoto (NAIST), Minoru Ikebe (Oita Univ.), Yoshihiro Okamoto, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2012-68 |
Server consolidation techniques have widely been studied to reduce energy consumption in datacenters. One solution is to... [more] |
IA2012-68 pp.55-60 |
IN, IA (Joint) |
2012-12-14 13:55 |
Hiroshima |
Hiroshima City Univ. (Hiroshima) |
Energy optimal data-center network topology calculation considering network traffic changing Toru Tsuda, Kohei Ichikawa, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2012-69 |
Datacenter is essential for service provider on the Internet. However, energy consumption of ICT equipment is increasing... [more] |
IA2012-69 pp.61-66 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 14:00 |
Hokkaido |
Hokkaido Univ. (Hokkaido) |
A Design of Distributed Data Managements for Large Scale Location Based Services Yuki Nunobiki (NAIST), Satoshi Matsuura (NAIST/NICT), Atsuo Inomata, Kazutoshi Fujikawa (NAIST) SITE2011-53 IA2011-103 |
Lots of mobile devices equip GPS and everyone can easily use location based services (LBSs). In addition, IMES(Indoor M... [more] |
SITE2011-53 IA2011-103 pp.287-292 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 14:20 |
Hokkaido |
Hokkaido Univ. (Hokkaido) |
A divide and merge method of sensor data processing based on geographic information on large-scale publish/subscribe systems Ryota Miyagi (NAIST), Satoshi Matsuura (NICT), Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) SITE2011-54 IA2011-104 |
As sensor-networking technologies have rapidly been developed, various sensor data have become available thanks to Publi... [more] |
SITE2011-54 IA2011-104 pp.293-298 |
IA |
2012-02-24 10:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
A methodology of splitting video stream on Data Stream Management Systems Keita Kanda (NAIST), Satoshi Matsuura (NAIST/NICT), Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2011-72 |
Data stream management systems with many cameras construct surveillance systems. These systems provide various types of ... [more] |
IA2011-72 pp.41-46 |