Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-06 14:05 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Investigation of Multiple Infections by Matching Large-scale Network Flow Data of ISP with Sinkhole Observation Data Kosuke Murakami, Masataka Nakahara (KDDIR/KDDI), Takashi Matsunaka (KDDIR), Ayumu Kubota (KDDIR/KDDI) |
[more] |
|
ICSS, IPSJ-SPT |
2024-03-22 08:55 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
A Method for Detecting Mirai Botnet Groups and Their C2 Servers Using Flow Data Collected in Large-Scale Network Kosuke Murakami, Masataka Nakahara, Ayumu Kubota (KDDIR/KDDI) ICSS2023-83 |
(To be available after the conference date) [more] |
ICSS2023-83 pp.100-107 |
ICSS, IPSJ-SPT |
2023-03-13 16:50 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
An Analysis of the Risk of Unauthorized Access to the WebUI of IoT Devices Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-63 |
(To be available after the conference date) [more] |
ICSS2022-63 pp.91-96 |
ICSS |
2022-11-08 09:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Survey of Support Policy Settings and Publication for Consumer IoT Devices Takahiro Kasama (NICT), Kosuke Murakami (NICT/KDDI Research, Inc.), Akira Fujita, Daisuke Inoue (NICT) ICSS2022-41 |
There have been many cases of IoT devices that are in the End of Life (EoL) state, in which the vendor's support period ... [more] |
ICSS2022-41 pp.19-24 |
ICSS |
2022-11-08 09:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Analysis of Weak Password Settings for IoT Devices and Results of User Notifications Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-42 |
IoT devices with weak ID/Password settings that are accessible from the Internet by services that enable password authen... [more] |
ICSS2022-42 pp.25-30 |
IA, ICSS |
2022-06-23 15:20 |
Nagasaki |
Univ. of Nagasaki (Nagasaki, Online) (Primary: On-site, Secondary: Online) |
An Investigation of Abuse Possibility of IoT Devices After Unauthorized Login Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) IA2022-6 ICSS2022-6 |
IoT devices with weak ID/Password settings and accessible from the Internet by Telnet and SSH services are infected with... [more] |
IA2022-6 ICSS2022-6 pp.31-36 |
ICSS, IPSJ-SPT |
2022-03-07 13:10 |
Online |
Online (Online) |
A Method for Identifying IoT Devices Using Features from WebUI Contents and Images Kosuke Murakami (NICT/KDDI), Takahiro Kasama, Akira Fujita (NICT), Jumpei Urakawa (KDS), Daisuke Inoue (NICT) ICSS2021-59 |
Cyber attacks on IoT devices have caused damage such as information theft and malware infection.
In order to identify I... [more] |
ICSS2021-59 pp.7-12 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 11:45 |
Online |
Online (Online) |
A Large-scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials Kosuke Murakami, Takahiro Kasama, Daisuke Inoue (NICT) ISEC2021-34 SITE2021-28 BioX2021-35 HWS2021-34 ICSS2021-39 EMM2021-39 |
[more] |
ISEC2021-34 SITE2021-28 BioX2021-35 HWS2021-34 ICSS2021-39 EMM2021-39 pp.147-152 |
SRW |
2020-06-29 10:30 |
Online |
Online (Online) |
Comparison of 3D map format for path loss prediction model designed for spectrum sharing Kosuke Murakami, Jun-ichi Takada, Kentaro Saito, Panawit Hanpinitsak (Tokyo tech) SRW2020-1 |
[more] |
SRW2020-1 p.1 |
SR |
2019-12-05 13:50 |
Okinawa |
Ishigaki City Hall (Ishigaki Island) (Okinawa) |
[Poster Presentation]
Prediction Method of Spectrum Availability Focused on Dominant Path in Sub-urban Area at Millimeter Wave Kosuke Murakami, Jun-ichi Takada, Kentaro Saito, Panawit Hanpinitsak (Tokyo tech) SR2019-93 |
Due to the rapid spread of smartphones and related applications, mobile traffic rates have been increased. To meet with ... [more] |
SR2019-93 pp.37-42 |
ICSS, IPSJ-SPT |
2018-03-08 09:20 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
Estimate of Malicious Web Sites Based on Users' Web Access Behavior and Destination AS Numbers Kosuke Murakami, Jumpei Urakawa, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-65 |
[more] |
ICSS2017-65 pp.85-90 |
ICSS, IPSJ-SPT |
2018-03-08 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-82 |
DRDoS (Distributed Reflective Denial of Service) attack, which abuses publicly accessible servers called as a reflector,... [more] |
ICSS2017-82 pp.199-204 |
SRW |
2017-08-21 13:00 |
Kyoto |
Kyoto University (Kyoto) |
Development of SIMO Channel Sounder in 12GHz band by Utilizing Radio-on-Fiber Technology Kosuke Murakami, Kentaro Saito, Jun-ichi Takada (Tokyo Inst. of Tech.) SRW2017-12 |
Due to the rapid increase of demand for the high throughput in mobile communications, the utilization of multiple-input ... [more] |
SRW2017-12 pp.19-24 |
RECONF |
2015-06-20 14:25 |
Kyoto |
Kyoto University (Kyoto) |
Tile-base PLA Cell with Uni-Switch Structure Atsushi Nanri, Kosuke Murakami, Daijiro Murooka, Takuya Hirata, Qing Dong, Shigetoshi Nakatake (Univ. of Kitakyushu) RECONF2015-23 |
[more] |
RECONF2015-23 pp.125-130 |
IA, ICSS |
2015-06-11 16:05 |
Fukuoka |
Kyushu Institute of Technology Univ. (Fukuoka) |
Traffic Data Analysis for Multiple Darknet and its Applications Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7 |
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] |
IA2015-7 ICSS2015-7 pp.33-38 |