Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-06 14:45 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
A Large-Scale Investigation of Security Risks in Medical IoT Devices Kosuke Tanizaki (Kobe Univ./NICT), Keisuke Furumoto, Kohei Masumi, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2023-03-13 15:20 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Multimodal Feature Integration Toward High-Accuracy Network Intrusion Detection Masazumi Iida, Kohei Miyamoto, Yoshinari Takeishi, Shota Kawanaka (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2022-55 |
(To be available after the conference date) [more] |
ICSS2022-55 pp.43-48 |
ICSS |
2022-11-08 09:50 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Tracing Methodology for Scanning Campaigns Based on Darknet Analysis Chansu Han, Akira Tanaka, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (QU) ICSS2022-43 |
(To be available after the conference date) [more] |
ICSS2022-43 pp.31-36 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online (Online) |
Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-26 |
(To be available after the conference date) [more] |
ICSS2020-26 pp.1-6 |
ICSS, IPSJ-SPT |
2021-03-01 13:40 |
Online |
Online (Online) |
An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-38 |
[more] |
ICSS2020-38 pp.72-77 |
ICSS, IPSJ-SPT |
2021-03-01 14:05 |
Online |
Online (Online) |
Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware Reo Kawasoe (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-39 |
[more] |
ICSS2020-39 pp.78-83 |
ICSS, IPSJ-SPT |
2020-03-02 11:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT) ICSS2019-93 |
[more] |
ICSS2019-93 pp.189-194 |
ICSS, IPSJ-SPT |
2020-03-03 10:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
ICSS2019-100 |
(To be available after the conference date) [more] |
ICSS2019-100 pp.283-288 |
ICSS |
2019-11-13 13:55 |
Miyazaki |
MRT Terrace(Miyazaki) (Miyazaki) |
A Fast Algorithm for Constructing Phylogenetic Trees and Its Evaluation Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2019-61 |
[more] |
ICSS2019-61 pp.7-12 |
ICSS, IPSJ-SPT |
2019-03-08 10:00 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center (Okinawa) |
ICSS2018-78 |
[more] |
ICSS2018-78 pp.89-94 |
ICSS, IPSJ-SPT |
2019-03-08 11:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center (Okinawa) |
Threat Information Analysis Using Conditional Generative Adversarial Network Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT) ICSS2018-81 |
[more] |
ICSS2018-81 pp.105-110 |
HWS (2nd) |
2018-12-13 11:35 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall (Tokyo) |
|
(Advance abstract in Japanese is available) [more] |
|
ICSS |
2018-11-21 15:15 |
Kagoshima |
(Kagoshima) |
Malware Analysis Method Using Conditional Generative Adversarial Network Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) ICSS2018-57 |
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] |
ICSS2018-57 pp.25-30 |
ICSS |
2018-11-22 13:30 |
Kagoshima |
(Kagoshima) |
ICSS2018-64 |
(To be available after the conference date) [more] |
ICSS2018-64 pp.61-66 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 11:45 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Real-time Botnet Detection Using Nonnegative Tucker Decomposition Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37 |
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] |
ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37 pp.297-304 |
ICSS, IA |
2018-06-26 09:25 |
Ehime |
Ehime University (Ehime) |
A consideration on the possibility of automatic classifying for anomalous posts on Twitter Ryutaro Ushigome (NICT/Chuo Univ), Takeshi Matsuda (Univ of Nagasaki), Michio Sonoda, Takeshi Takahashi, Mio Suzuki (NICT), Jinhui Chao (Chuo Univ) IA2018-9 ICSS2018-9 |
A lot of information has been posted on the SNS, including not only erroneous information and inappropriate writing, but... [more] |
IA2018-9 ICSS2018-9 pp.55-60 |
ICSS, IA |
2018-06-26 11:40 |
Ehime |
Ehime University (Ehime) |
A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13 |
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] |
IA2018-13 ICSS2018-13 pp.77-82 |
ICSS, IPSJ-SPT |
2018-03-07 13:00 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2017-51 |
In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and ... [more] |
ICSS2017-51 pp.1-6 |
IA, ICSS |
2015-06-12 15:20 |
Fukuoka |
Kyushu Institute of Technology Univ. (Fukuoka) |
A study on a Tool for Automated Vulnerability Monitoring and Alerting on Software Assets inside Organizations Takeshi Takahashi, Daisuke Miyamoto, Bhola Panta, Koji Nakao (NICT) IA2015-18 ICSS2015-18 |
Each organization needs to manage its IT assets and related vulnerabilities in order to maintain its security level.
Ne... [more] |
IA2015-18 ICSS2015-18 pp.99-104 |
ICSS |
2015-03-04 15:30 |
Okinawa |
Meio Univiersity (Okinawa) |
A Study on Risk Quantification Techniques for Android Applications with Category Information Takeshi Takahashi (NICT), Takao Mimura, Masata Nishida (SecureBrain), Koji Nakao (NICT) ICSS2014-95 |
[more] |
ICSS2014-95 pp.193-197 |