Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, IPSJ-DC |
2024-07-12 09:55 |
Hyogo |
Mikage Kokaido (Hyogo) |
Countermeasure against Internal Threat Regarding Psychological State of Organizational Members and Business Impact of Information Resources Yuki Kodaka (SOKENDAI), Hirokazu Hasegawa, Hiroki Takakura (NII) LOIS2024-6 |
Compared to external cyberattacks, insider threats caused by organizational members can spread more widely within the or... [more] |
LOIS2024-6 pp.31-36 |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-81 pp.87-92 |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90 |
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] |
ICSS2023-90 pp.153-159 |
IA, ICSS |
2023-06-21 09:55 |
Saga |
Saga Univ. (Saga, Online) (Primary: On-site, Secondary: Online) |
A Proposal for Access Control Method based on File Relation Inference from Users Behavior Yuki Kodaka (SOKENDAI), Hirokazu Hasegawa, Hiroki Takakura (NII) IA2023-8 ICSS2023-8 |
File access control is an effective method for protecting information from unauthorized access both within and outside a... [more] |
IA2023-8 ICSS2023-8 pp.40-47 |
ICSS, IPSJ-SPT |
2023-03-14 10:50 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74 |
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] |
ICSS2022-74 pp.157-162 |
IN, IA (Joint) |
2022-12-13 15:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Hiroshima, Online) (Primary: On-site, Secondary: Online) |
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66 |
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] |
IA2022-66 pp.91-98 |
IA, ICSS |
2022-06-23 14:30 |
Nagasaki |
Univ. of Nagasaki (Nagasaki, Online) (Primary: On-site, Secondary: Online) |
Discussion about improving a detection accuracy of malware variants using time series differences in latent representation. Atsushi Shinoda, Hajime Shimada, Yukiko Yamaguti (Nagoya Univ.), Hirokazu Hasegawa (NII) IA2022-4 ICSS2022-4 |
Today, computers are used for various purposes to support people's daily lives. Therefore, the existence of malware that... [more] |
IA2022-4 ICSS2022-4 pp.19-24 |
ICSS, IPSJ-SPT |
2021-03-01 11:30 |
Online |
Online (Online) |
Method of Similarity Evaluation among Incidents for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31 |
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] |
ICSS2020-31 pp.31-36 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online (Online) |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
ICSS |
2020-11-26 15:00 |
Online |
Online (Online) |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
ICSS |
2020-11-26 15:25 |
Online |
Online (Online) |
Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23 |
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more] |
ICSS2020-23 pp.21-25 |
ICSS, IPSJ-SPT |
2020-03-03 09:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84 |
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] |
ICSS2019-84 pp.97-102 |
ICSS |
2019-11-13 14:20 |
Miyazaki |
MRT Terrace(Miyazaki) (Miyazaki) |
Issue on Adversarial Malware Sample Generation using Reinforcement Learning against Machine Learning Based Malware Detection System Seiya Takagi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-62 |
In recent years, security researchers have applied machine learning techniques to malware detection researches to improv... [more] |
ICSS2019-62 pp.13-18 |
ICSS |
2019-11-13 15:45 |
Miyazaki |
MRT Terrace(Miyazaki) (Miyazaki) |
Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65 |
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] |
ICSS2019-65 pp.31-36 |
MoNA, IN, CNR (Joint) [detail] |
2018-11-15 10:00 |
Saga |
Karatsu Civic Exchange Plaza (Saga) |
A Design of Network Simulator with Step Execution and Resume Functions for Understanding Mechanism of Communication Takemasa Kuranaga, Yuichiro Tateiwa, Yonghwan Kim, Yoshiaki Katayama (NIT), Hirokazu Hasegawa (Nagoya Univ.) IN2018-52 CNR2018-18 |
In network communication, understanding of the mechanism of communication, such as what kind of action is realized under... [more] |
IN2018-52 CNR2018-18 pp.1-6 |
IA |
2017-11-16 11:05 |
Overseas |
KMITL, Bangkok, Thailand (Overseas) |
A Proposal of Dynamic Access Control with SDN for Practical Network Separation Satoki Nakamura (NIT), Hirokazu Hasegawa (Nagoya Univ.), Yuichiro Tateiwa (NIT), Hiroki Takakura (NII), Yonghwan KIM, Yoshiaki Katayama (NIT) IA2017-45 |
As one of effective countermeasures against recent sophisticated cyber attacks, many researches have paid attention to n... [more] |
IA2017-45 pp.65-69 |
ICSS, IPSJ-SPT |
2017-03-13 16:40 |
Nagasaki |
University of Nagasaki (Nagasaki) |
Primary Discussion about a Honeypot System for IoT Aimed Protocols Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57 |
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] |
ICSS2016-57 pp.103-108 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-04 11:10 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) (Saga) |
Network Type Dynamic Analysis System for Prevention of Malware Infection Expansion Satoshi Fuchigami, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) SITE2015-73 IA2015-105 |
In recent years, it has been a social issue that cyber-attacks are increasing for the purpose of money or secret informa... [more] |
SITE2015-73 IA2015-105 pp.221-226 |
IA |
2013-10-10 14:00 |
Overseas |
Konkuk Univ., Seoul (Overseas) |
Proposal of a Network Control System to Detect, Analyze and Mitigate Targeted Cyber Attacks Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2013-26 |
Recently, targeted cyber attacks have been so sophisticated that we cannot detect them at early stage of intrusion.
The... [more] |
IA2013-26 pp.1-6 |
ICSS |
2012-11-22 14:30 |
Hiroshima |
Miyajima Mori-no-Yado (Hiroshima) |
Proposal of a network design support system for risk mitigation against inside attacks Hirokazu Hasegawa (Nagoya Univ.), Ray Atarashi (IIJ-II), Masahiko Kato (IIJ), Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura (Nagoya Univ.) ICSS2012-51 |
In sophisticated cyber attacks, even information protected by an isolated network is compromised. Although there are var... [more] |
ICSS2012-51 pp.37-42 |