Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-07 15:10 |
Okinawa |
Okinawa Prefectural Museum & Art Museum |
Generating Adversarial Training Data for Specific Malware Evasion Using Reinforcement Learning with High-Dimensional Features and Continuous Action Space Shota Kiba (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2024-115 |
The use of classifiers based on Machine Learning and Deep Learning is widely employed in the field of cybersecurity. How... [more] |
ICSS2024-115 pp.359-366 |
ICSS, IPSJ-SPT |
2025-03-07 15:30 |
Okinawa |
Okinawa Prefectural Museum & Art Museum |
Analyzing the Impact in Availability Attacks to LightGBM Based NIDS with Poisoning Attack Data Adding Perturbations by GA Yusha Yazici (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2024-116 |
In recent years, Network-based Intrusion Detection Systems (NIDS) using Machine Learning are playing a crucial role in t... [more] |
ICSS2024-116 pp.367-374 |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-81 pp.87-92 |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90 |
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] |
ICSS2023-90 pp.153-159 |
ICSS, IPSJ-SPT |
2023-03-14 10:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74 |
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] |
ICSS2022-74 pp.157-162 |
IN, IA (Joint) |
2022-12-13 15:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66 |
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] |
IA2022-66 pp.91-98 |
ICSS, IPSJ-SPT |
2021-03-01 11:30 |
Online |
Online |
Method of Similarity Evaluation among Incidents for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31 |
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] |
ICSS2020-31 pp.31-36 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
ICSS |
2020-11-26 15:00 |
Online |
Online |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
ICSS, IPSJ-SPT |
2020-03-03 09:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84 |
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] |
ICSS2019-84 pp.97-102 |
ICSS |
2019-11-13 14:20 |
Miyazaki |
MRT Terrace(Miyazaki) |
Issue on Adversarial Malware Sample Generation using Reinforcement Learning against Machine Learning Based Malware Detection System Seiya Takagi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-62 |
In recent years, security researchers have applied machine learning techniques to malware detection researches to improv... [more] |
ICSS2019-62 pp.13-18 |
ICSS |
2019-11-13 15:45 |
Miyazaki |
MRT Terrace(Miyazaki) |
Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65 |
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] |
ICSS2019-65 pp.31-36 |
ICSS, IPSJ-SPT |
2017-03-13 16:40 |
Nagasaki |
University of Nagasaki |
Primary Discussion about a Honeypot System for IoT Aimed Protocols Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57 |
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] |
ICSS2016-57 pp.103-108 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-04 11:10 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
Network Type Dynamic Analysis System for Prevention of Malware Infection Expansion Satoshi Fuchigami, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) SITE2015-73 IA2015-105 |
In recent years, it has been a social issue that cyber-attacks are increasing for the purpose of money or secret informa... [more] |
SITE2015-73 IA2015-105 pp.221-226 |
IN, IA (Joint) |
2015-12-17 17:10 |
Hiroshima |
Hiroshima City University |
Dynamic construction of to-many communication topology by using OpenFlow Shun Yanase, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) IA2015-76 |
To-many communication such as streaming and multi-point video conferencing basically uses tree structure of content dist... [more] |
IA2015-76 pp.43-48 |
ICSS |
2015-11-26 14:10 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Traffic Analysis to Identify Unintended Impact on Business Caused by an Incident Response Minori Shiota, Yukiko Yamaguchi, Hajime Shiimada (Nagoya Univ), Hiroki Takakura (NII) ICSS2015-36 |
To confront recent sophisticated targeted attacks, we have to prevent the theft of information and the destruction of th... [more] |
ICSS2015-36 pp.7-12 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96 |
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] |
ICSS2014-96 pp.199-204 |