Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2023-03-14 10:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74 |
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] |
ICSS2022-74 pp.157-162 |
IN, IA (Joint) |
2022-12-13 15:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66 |
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] |
IA2022-66 pp.91-98 |
IA, ICSS |
2022-06-23 14:30 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Discussion about improving a detection accuracy of malware variants using time series differences in latent representation. Atsushi Shinoda, Hajime Shimada, Yukiko Yamaguti (Nagoya Univ.), Hirokazu Hasegawa (NII) IA2022-4 ICSS2022-4 |
Today, computers are used for various purposes to support people's daily lives. Therefore, the existence of malware that... [more] |
IA2022-4 ICSS2022-4 pp.19-24 |
ICSS, IPSJ-SPT |
2021-03-01 11:30 |
Online |
Online |
Method of Similarity Evaluation among Incidents for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31 |
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] |
ICSS2020-31 pp.31-36 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
ICSS |
2020-11-26 15:00 |
Online |
Online |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
ICSS, IPSJ-SPT |
2020-03-03 09:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84 |
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] |
ICSS2019-84 pp.97-102 |
ICSS |
2019-11-13 14:20 |
Miyazaki |
MRT Terrace(Miyazaki) |
Issue on Adversarial Malware Sample Generation using Reinforcement Learning against Machine Learning Based Malware Detection System Seiya Takagi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-62 |
In recent years, security researchers have applied machine learning techniques to malware detection researches to improv... [more] |
ICSS2019-62 pp.13-18 |
ICSS |
2019-11-13 15:45 |
Miyazaki |
MRT Terrace(Miyazaki) |
Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65 |
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] |
ICSS2019-65 pp.31-36 |
EMD, R |
2019-02-15 16:05 |
Osaka |
|
[Invited Talk]
Information System Construction which Balances Both Business Continuity and Security Incident Containment Hajime Shimada (Nagoya Univ.) R2018-57 EMD2018-58 |
[more] |
R2018-57 EMD2018-58 p.31 |
ICSS, IPSJ-SPT |
2017-03-13 13:00 |
Nagasaki |
University of Nagasaki |
Clustering of Bot Port Scan and Brute-force Activities Shohei Araki, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Jun Miyoshi (NTT), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-46 |
Cyber-attacks targeting IoT devices are rapidly spreading. In September 2016, malware called Mirai caused great damages ... [more] |
ICSS2016-46 pp.1-6 |
ICSS, IPSJ-SPT |
2017-03-13 16:40 |
Nagasaki |
University of Nagasaki |
Primary Discussion about a Honeypot System for IoT Aimed Protocols Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57 |
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] |
ICSS2016-57 pp.103-108 |
ICSS |
2016-11-25 15:20 |
Kanagawa |
Institute of Information Security |
Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42 |
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] |
ICSS2016-42 pp.21-26 |
ICSS, IPSJ-SPT |
2016-03-03 13:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Actual Survey on Web Scanning by URI Co-occurrence Detection Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51 |
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more] |
ICSS2015-51 pp.25-30 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-04 11:10 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
Network Type Dynamic Analysis System for Prevention of Malware Infection Expansion Satoshi Fuchigami, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) SITE2015-73 IA2015-105 |
In recent years, it has been a social issue that cyber-attacks are increasing for the purpose of money or secret informa... [more] |
SITE2015-73 IA2015-105 pp.221-226 |
IN, IA (Joint) |
2015-12-17 17:10 |
Hiroshima |
Hiroshima City University |
Dynamic construction of to-many communication topology by using OpenFlow Shun Yanase, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) IA2015-76 |
To-many communication such as streaming and multi-point video conferencing basically uses tree structure of content dist... [more] |
IA2015-76 pp.43-48 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2015-12-03 10:50 |
Nagasaki |
Nagasaki Kinro Fukushi Kaikan |
Cache Energy Reduction by Switching between L1 High Power and Low Power Cache under DVFS Environment Kaoru Saito, Ryotaro Kobayashi (Toyohashi Univ of Tech), Hajime Shimada (Nagoya Univ.) CPSY2015-72 |
Current CPU utilizes cache memory for decreasing an access speed gap between CPU and main memory.
But the cache occupie... [more] |
CPSY2015-72 pp.63-68 |
CPSY, IPSJ-EMB, IPSJ-SLDM, DC [detail] |
2015-03-07 09:45 |
Kagoshima |
|
Energy Reduction of BTB by focusing on Number of Branches per Cache Line Hiroki Yamamoto, Ryotaro Kobayashi (TUT), Hajime Shimada (NU) CPSY2014-177 DC2014-103 |
Recent processors exploit Instruction Level Parallelism to improve performance, but it's limited by control dependency. ... [more] |
CPSY2014-177 DC2014-103 pp.89-94 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96 |
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] |
ICSS2014-96 pp.199-204 |
IA |
2014-11-06 15:30 |
Overseas |
Thailand |
Network Access Control by FPGA-Based Network Switch using HW/SW Cooperated IDS Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2014-52 |
In recent years, cyber targeted attacks are becoming so sophisticated so that countermeasures for them is becoming impor... [more] |
IA2014-52 pp.91-96 |