IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 59  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HIP 2023-12-21
14:15
Miyagi Research Institute of Electrical Communication HIP2023-80 Recently local economies have been facing many challenges due to declining birthrates, aging populations, and informatio... [more] HIP2023-80
pp.21-27
WIT 2023-06-17
14:30
Okinawa Okinawa Industry Support Center
(Primary: On-site, Secondary: Online)
Utilization of Sensors as Switch Interface via Webhook and WebSocket
Junya Takasuka, Von Herbuela, Tomonori Karita (Ehime Univ.) WIT2023-15
This presentation reports on how sensors can be used as switches using Webhook and WebSockets. Electronic devices can be... [more] WIT2023-15
pp.71-73
ET 2022-03-04
14:55
Online Online Incorporation and experimental use of thinking verbalization function in concept map/EBS integrated learning environment
Kazutoshi Shimojo, Tsukasa Hirashima, Yusuke Hayashi (Hiroshima Univ) ET2021-74
EBS is said to have a certain effect on the solution of the MIF simple concept, and an experiment was conducted to more ... [more] ET2021-74
pp.129-134
IA, ICSS 2021-06-22
09:00
Online Online Feature analysis of phishing website and phishing detection based on machine learning algorithms
Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] IA2021-9 ICSS2021-9
pp.44-49
IA, ICSS 2021-06-22
09:25
Online Online Analtsis of cost-effectiveness in malicious site detection using VirusTotal
Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more]
IA2021-10 ICSS2021-10
pp.50-55
NLC 2020-09-10
10:05
Online Online Extraction of medical technology sentences from the Faculty of Medicine Websites
Yuta Sugawara, Kaito Takano, Hiroyuki Sakai (Seikei) NLC2020-2
In this research, we propose a method for extracting sentences including medical technology form the faculty of medicine... [more] NLC2020-2
pp.7-10
ICSS, IPSJ-SPT 2020-03-03
09:10
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
A research of HTTP request and an identification method of fake User-Agent values
Masato Inoue, Masaki Hashimoto (IISEC) ICSS2019-83
Almost all websites that are open to the public are subject to scan and attack, and have received a lot of anomaly reque... [more] ICSS2019-83
pp.91-96
HIP, ASJ-H 2020-02-15
13:00
Okinawa IT Souzou-kan Bldg. (Naha) The Efforts for iIproving the Operation and UX for Official Website in Department of Information Engineering
Noritomo Taba, Tomokazu Nagata, Yuji Taniguchi (Ryukyu Univ) HIP2019-77
The official website of the University of the Ryukyus Intelligence Course is managed mainly by an organization called a ... [more] HIP2019-77
pp.1-5
ICSS 2018-11-21
14:50
Kagoshima   Spoofed Website Detection using Machine Learning
Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto (Institute of Information Security) ICSS2018-56
In recent years, the damage by fake site has been rapidly increasing. Because fake sites are ceremonious as if they are ... [more] ICSS2018-56
pp.19-24
MSS, NLP
(Joint)
2018-03-13
13:00
Osaka   Doubly folded Neimark-Sacker bifurcation and two coexisting two-dimensional tori part 3
Tomoki Ikegami (Meiji Univ.), Munehisa Sekikawa (Utsunomiya Univ.), Nataliya Stankevich (SSTU), Naohiko Inaba, Tetsuro Endo (Meiji Univ.) NLP2017-105
We study quasiperiodic bifurcations generated in a discrete dynamics generating three invariant tori. In our previous st... [more] NLP2017-105
pp.19-24
ICSS, IPSJ-SPT 2018-03-08
11:35
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Predicting Website Abuse Using Update Histories
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) ICSS2017-73
Threats of abusing websites that webmasters abandoned updates has increased.
In this paper, we propose a method of pred... [more]
ICSS2017-73
pp.133-138
KBSE 2017-09-19
14:05
Tokyo Doshisha Univ. Tokyo Branch Office A Proposal on Eliciting System Safety Requirements
Shuichiro Yamamoto (Nagoya Univ.) KBSE2017-23
Eliciting safety requirements is necessary to assure system safety. It is impossible to confirm that the system satisfie... [more] KBSE2017-23
pp.13-18
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
13:25
Tokyo   A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download
Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
pp.81-86
ICSS, IPSJ-SPT 2017-03-14
09:30
Nagasaki University of Nagasaki Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder
Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] ICSS2016-58
pp.111-116
ICSS, IPSJ-SPT 2017-03-14
11:45
Nagasaki University of Nagasaki Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities
Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU) ICSS2016-68
Android app developers sometimes copy code snippets posted on a Question and Answer Website and develop their apps. If a... [more] ICSS2016-68
pp.171-176
AI 2017-02-27
15:30
Kyoto Kyoto Univ. Development of Information Collection Supporting System for Chinese Self-guided Tour to Japan
Jie Ji, Takashi Yoshino (Wakayama Univ.) AI2016-38
Recently, the number of Chinese tourists traveling to Japan is rising rapidly. As it is easier for individuals to apply ... [more] AI2016-38
pp.19-24
LOIS, IPSJ-SPT, IPSJ-CN 2016-05-12
15:55
Tokyo   Suggestion of the Nomad Type Showroom Construction Method Realizing New Business Style
Rinsuke Uchida, Shunsuke Ikkanzaka, YUta Isono, Takuya Mizushima, Toru Kobayashi (Department of Engineering,Nagasaki Univ.) LOIS2016-5
We suggest the nomad type showroom construction method realizing new business on demand in customer’s ICT environment. S... [more] LOIS2016-5
pp.21-26
CW
(2nd)
2016-03-09 Tokyo   A Proposal for Posting Comments in Smartphone VR
Shintaro Kutsumi, Jun Iio (Chuo Univ.)
Currently we often use Video sharing websites and enjoy them. However these websites have two weak points;1) Comments ar... [more]
CW
(2nd)
2016-03-09 Tokyo   A real-time web-cast system for classes in the BYOD style
Daiki Ito, Masaru Kamada (Ibaraki Univ.)
A real-time web-cast system for classes in the BYOD style is developed.The teacher starts up our server application soft... [more]
HCS 2016-03-01
16:50
Ishikawa Rurikoh (Yamashiro Onsen) Passenger UX Prototypes in an IoT Embedded Vehicle -- In-vehicle Communication Mediated by "Things" Brought in --
Yoshihiro Ohama, Hiroshi Yasuda (Toyota CRDL) HCS2015-89
In modern vehicles, various sensors and actuators are connected each other over in-vehicle network. If these on-board el... [more] HCS2015-89
pp.41-46
 Results 1 - 20 of 59  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan