IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 22  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2024-01-25
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Analyzing Cybersecurity Datasets -- Enhancing Security throughout the Data Life Cycle --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] IA2023-63
IA 2024-01-25
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Strengthening Cybersecurity with Data Analytics -- A Web Tool for Secure Exploration of CVE Data --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] IA2023-68
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
Hokkaido Hokkaido Jichiro Kaikan A Study on the Application of Nudge to Improve Cybersecurity
Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
IA, ICSS 2023-06-20
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
[Invited Talk] Cybersecurity education and the role of universities
Hiroshi Koide (Kyushu Univ.) IA2023-6 ICSS2023-6
In this presentation, the speaker will first discuss his experiences in the cybersecurity human resource development pro... [more] IA2023-6 ICSS2023-6
IA, SITE, IPSJ-IOT [detail] 2023-03-17
Gunma Maebashi Institute of Technology
(Primary: On-site, Secondary: Online)
[Invited Talk] Dual-Use of Cybersecurity -- From the Threat Landscape in Cyberspace with a Focus on IoT Security --
Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] SITE2022-62 IA2022-85
IA 2023-01-25
Osaka Osaka Umeda Campus, Kwansei Gakuin University (Osaka)
(Primary: On-site, Secondary: Online)
Cybersecurity Analysis of Internet Banking in Developing and Developed countries, a case study of Tanzania and Japan
Ndalama Festus Edward, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2022-72
Over the last few years, internet banking has become the primary way of accessing banking services for many bank custome... [more] IA2022-72
MSS, SS 2021-01-27
Online Online Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks
Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] MSS2020-37 SS2020-22
Online Online Development of an Intrusion Detection System Utilizing Social Network Analysis Principles
James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] IA2020-29
IA 2020-10-01
Online Online [Poster Presentation] Cybersecurity Inventory of Autonomous Intelligent Drones Applying IEC 62443 Standard
Shih-Yuan Ku, Yu-Lun Wu (National Taiwan University of Science and Technology), Yung-Chiao Chen (National Taiwan University), Jiann-Liang Chen (National Taiwan University of Science and Technology) IA2020-5
With the deepening of the computerization and intelligence of various systems, Industrial Control System (ICS) cybersecu... [more] IA2020-5
SITE, IPSJ-EIP [detail] 2020-06-04
Online Online Reconsideration of 'Risk' in information security/cybersecurity governance -- Based on the discussion in Science, Technology and Society (STS) --
Takumi Kimura (NRI SecureTechnologies) SITE2020-2
As information security/cybersecurity has been increasing, so is the importance of (Information) Security Governance. Ho... [more] SITE2020-2
SS, MSS 2020-01-14
Hiroshima   Sensor Attack Detection in Control Systems Using Moving Horizon Estimation
Kei Isono, Koichi Kobayashi (Hokkaido Univ.), Ryosuke Adachi (Yamaguchi Univ.), Yuh Yamashita (Hokkaido Univ.) MSS2019-46 SS2019-30
The sensor attack detection problem in control systems is important in cybersecurity. In this paper, we propose a method... [more] MSS2019-46 SS2019-30
KBSE, SC 2019-11-08
Nagano Shinshu University Malicious Domain Names Detection Based on TF-IDE and Variational Autoencoder: Classification with Quantum-enhanced Support Vector Machine
Yuwei Sun (UTokyo), Ng S. T. Chong (UNU), Hideya Ochiai (UTokyo) KBSE2019-26 SC2019-23
With the development of network technology, the use of domain name system (DNS) becomes common. However, the attacks on ... [more] KBSE2019-26 SC2019-23
ISEC, SITE, LOIS 2019-11-02
Osaka Osaka Univ. Consideration regarding Critical Infrastructure Protection Policies in Cybersecurity -- Approach from the "Science and Technology Studies (STS)" --
Hideyuki Fujii, Takumi Kimura (NRI Secure) ISEC2019-80 SITE2019-74 LOIS2019-39
A comparison of critical infrastructure protection strategies in each country's cyber security policy reveals that there... [more] ISEC2019-80 SITE2019-74 LOIS2019-39
ISEC 2018-05-16
Tokyo Ookayama Campus, Tokyo Institute of Technology Survey on Tracking of Leaked NEM by Coincheck Incident
Teppei Sato (Univ. of Tsukuba), Mitsuyoshi Imamura (Univ. of Tsukuba/NomuraAM), Kazumasa Omote (Univ. of Tsukuba) ISEC2018-7
Some volunteers had performed tracking a huge amount of NEM leaked from CoinCheck by sending specific mosaics which no o... [more] ISEC2018-7
CQ 2016-08-29
Ibaraki Tsukubasan Impact Assessment of Tamper Signal Characteristics in Secure Control Systems with Tamper Detection Observer
Jin Hoshino, Hitoshi Kojima, Takahiro Funakoshi, Ryusuke Imai, Ryogo Kubo (Keio Univ.) CQ2016-55
Today, networked control systems (NCSs) have become popular in many areas of studies, due to the growth of information a... [more] CQ2016-55
ICSS, IPSJ-SPT 2016-03-03
Kyoto Academic Center for Computing and Media Studies, Kyoto University Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling
Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) ICSS2015-53
Organization introducing ICT systems needs to properly respond to the information security incidents. In contrast, recen... [more] ICSS2015-53
ICSS, IPSJ-SPT 2014-03-28
Okinawa Meio Univiersity MATATABI: Multi-layer Threat Analysis Platform with Hadoop
Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] ICSS2013-77
DE 2012-12-13
Kyoto Campus Plaza Kyoto [Invited Talk] State-of-the-art Cybersecurity Technologies and Challenges for Security Big Data
Daisuke Inoue (NICT) DE2012-32
We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter) in order to fight ... [more] DE2012-32
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
Hokkaido   A Study on Cybersecurity Information Discovery Mechanisms over the Internet
Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT) ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11
This paper prposes a scheme that links assorted structured cybersecurity information over networks and discovers them in... [more] ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11
ICSS 2010-11-05
Hiroshima Hiroshima City University Ontological Approach toward Cybersecurity in Cloud Computing
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ICSS2010-49
Following the immense development of cloud computing, various standardization activities have been taken place.
However... [more]
 Results 1 - 20 of 22  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan