Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2018-11-21 13:50 |
Kagoshima |
|
[Invited Talk]
Advanced R&D Required at the Leading Edge of Cybersecurity Takeshi Yagi (NTT Security Japan) ICSS2018-55 |
[more] |
ICSS2018-55 pp.13-18 |
ICSS, IPSJ-SPT |
2018-03-08 09:45 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Automatically Collecting User-initiated Web-based Attacks Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-66 |
Recently, web content uses social engineering techniques to lure victims into clicking on them, originating malware down... [more] |
ICSS2017-66 pp.91-96 |
ICSS, IPSJ-SPT |
2018-03-08 10:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-67 |
With the growth of online advertising market, it has become the target of abuse, such as ad fraud by adware and bots. To... [more] |
ICSS2017-67 pp.97-102 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Predicting Website Abuse Using Update Histories Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) ICSS2017-73 |
Threats of abusing websites that webmasters abandoned updates has increased.
In this paper, we propose a method of pred... [more] |
ICSS2017-73 pp.133-138 |
OFT |
2018-01-18 14:50 |
Kumamoto |
|
MCF by silica powder forming technique Shinichi Arai, Shigeto Matsumoto, Takeshi Yagi (FEC) OFT2017-57 |
We investigate a new Multicore fiber (MCF) manufacturing method by silica powder forming technique using commercial Si... [more] |
OFT2017-57 pp.5-8 |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55 |
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] |
ICSS2015-55 pp.47-52 |
OFT, OCS, OPE (Joint) [detail] |
2016-02-19 16:10 |
Okinawa |
Okinawa Univ. |
MCF by CIP forming technique Shinichi Arai, Shigeto Matsumoto, Takeshi Yagi (FEC) OFT2015-73 OPE2015-241 |
e investigate a new Multicore fiber (MCF) preform manufacturing method by powder forming technique using commercial Si... [more] |
OFT2015-73 OPE2015-241 pp.101-104(OFT), pp.143-146(OPE) |
IA, ICSS |
2015-06-11 13:45 |
Fukuoka |
Kyushu Institute of Technology Univ. |
[Invited Talk]
Establishment of Cybersecurity Education by Industry-Academia Collaboration Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-2 ICSS2015-2 |
[more] |
IA2015-2 ICSS2015-2 pp.3-8 |
IA, ICSS |
2015-06-12 10:50 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10 |
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] |
IA2015-10 ICSS2015-10 pp.51-56 |
ICSS |
2014-11-28 11:10 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
searching malicious URL from vast webspace Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61 |
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more] |
ICSS2014-61 pp.61-66 |
OFT |
2014-10-23 13:25 |
Hyogo |
|
Development of ZrO2-SiO2 Based Ultra-High Δ PLC Device Yasuyoshi Uchida, Shintaro Yamasaki, Masanori Takahashi, Junichi Hasegawa, Takeshi Yagi (Furukawa Electric) OFT2014-24 |
Recently, downsizing and high-density integration are required for planar lightwave circuits (PLCs). To realize these fe... [more] |
OFT2014-24 pp.7-12 |
PN |
2014-09-04 15:45 |
Hokkaido |
|
[Invited Talk]
Optical Fiber Technologies for SDM Transmission Takeshi Yagi (Furukawa Electric) PN2014-15 |
Space Division Multiplexed (SDM) transmission is suggested as a breakthrough for expanding transmission capacity of phot... [more] |
PN2014-15 pp.25-30 |
ICSS, IA |
2014-06-06 13:00 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Analyzing Dynamic Class Loaded Applications in Android Takaaki Nagumo, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) IA2014-8 ICSS2014-8 |
[more] |
IA2014-8 ICSS2014-8 pp.39-44 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71 |
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more] |
ICSS2013-71 pp.53-58 |
ICSS, IPSJ-SPT |
2014-03-27 14:20 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of Web Phantom: Hybrid Web Honeypot Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-73 |
[more] |
ICSS2013-73 pp.65-70 |
ICSS, IPSJ-SPT |
2014-03-28 09:00 |
Okinawa |
Meio Univiersity |
Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis Kensuke Nakata, Kazunori Kamiya, Hiroshi Kurakami, Kazufumi Aoki, Takeshi Yagi (NTT) ICSS2013-74 |
Recent cyber-attacks rapidly get advanced to infect terminals via invalid network access and could damage enterprise act... [more] |
ICSS2013-74 pp.95-100 |
ICSS, IPSJ-SPT |
2014-03-28 14:20 |
Okinawa |
Meio Univiersity |
Design of HTTP Communication Profiling for Infected Hosts Detection Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84 |
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] |
ICSS2013-84 pp.155-160 |
OFT |
2014-01-24 14:30 |
Tokyo |
|
Investigation of the Influence of Fusion Splice on Crosstalk Properties of Multicore Fiber Katsunori Imamura, Ryuichi Sugizaki, Takeshi Yagi (Furukawa Electric), Masato Yoshida, Masataka Nakazawa (Tohoku Univ.) OFT2013-48 |
We investigated the relationship between splice loss and crosstalk properties in the fusion spliced multicore fibers. We... [more] |
OFT2013-48 pp.11-15 |
ICSS |
2013-11-12 14:15 |
Fukuoka |
Nishijin Plaza |
Evaluations of Multi-Stage Traffic Analysis against Attacks on Websites Takeshi Yagi, Takeo Hariu (NTT), Hiroki Takakura (Nagoya University) ICSS2013-57 |
This paper proposes a traffic analysis scheme to detect attacks from accesses to websites. Conventional schemes can dete... [more] |
ICSS2013-57 pp.3-8 |
IN, NV (Joint) |
2013-07-18 11:35 |
Hokkaido |
Hokkaido Univ. Faculty of Eng. Academic Lounge 3 |
Analysis of Blacklist Update Frequency for Monitoring Malware Infection Attacks on Websites Takeshi Yagi, Takeo Hariu (NTT), Hiroyuki Ohsaki (Kwansei Gakuin Univ.), Masayuki Murata (Osaka Univ.) IN2013-38 |
(Advance abstract in Japanese is available) [more] |
IN2013-38 pp.13-18 |