Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WIT |
2023-06-17 14:30 |
Okinawa |
Okinawa Industry Support Center (Primary: On-site, Secondary: Online) |
Utilization of Sensors as Switch Interface via Webhook and WebSocket Junya Takasuka, Von Herbuela, Tomonori Karita (Ehime Univ.) WIT2023-15 |
This presentation reports on how sensors can be used as switches using Webhook and WebSockets. Electronic devices can be... [more] |
WIT2023-15 pp.71-73 |
ET |
2022-03-04 14:55 |
Online |
Online |
Incorporation and experimental use of thinking verbalization function in concept map/EBS integrated learning environment Kazutoshi Shimojo, Tsukasa Hirashima, Yusuke Hayashi (Hiroshima Univ) ET2021-74 |
EBS is said to have a certain effect on the solution of the MIF simple concept, and an experiment was conducted to more ... [more] |
ET2021-74 pp.129-134 |
IA, ICSS |
2021-06-22 09:00 |
Online |
Online |
Feature analysis of phishing website and phishing detection based on machine learning algorithms Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9 |
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] |
IA2021-9 ICSS2021-9 pp.44-49 |
IA, ICSS |
2021-06-22 09:25 |
Online |
Online |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
NLC |
2020-09-10 10:05 |
Online |
Online |
Extraction of medical technology sentences from the Faculty of Medicine Websites Yuta Sugawara, Kaito Takano, Hiroyuki Sakai (Seikei) NLC2020-2 |
In this research, we propose a method for extracting sentences including medical technology form the faculty of medicine... [more] |
NLC2020-2 pp.7-10 |
ICSS, IPSJ-SPT |
2020-03-03 09:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A research of HTTP request and an identification method of fake User-Agent values Masato Inoue, Masaki Hashimoto (IISEC) ICSS2019-83 |
Almost all websites that are open to the public are subject to scan and attack, and have received a lot of anomaly reque... [more] |
ICSS2019-83 pp.91-96 |
HIP, ASJ-H |
2020-02-15 13:00 |
Okinawa |
IT Souzou-kan Bldg. (Naha) |
The Efforts for iIproving the Operation and UX for Official Website in Department of Information Engineering Noritomo Taba, Tomokazu Nagata, Yuji Taniguchi (Ryukyu Univ) HIP2019-77 |
The official website of the University of the Ryukyus Intelligence Course is managed mainly by an organization called a ... [more] |
HIP2019-77 pp.1-5 |
ICSS |
2018-11-21 14:50 |
Kagoshima |
|
Spoofed Website Detection using Machine Learning Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto (Institute of Information Security) ICSS2018-56 |
In recent years, the damage by fake site has been rapidly increasing. Because fake sites are ceremonious as if they are ... [more] |
ICSS2018-56 pp.19-24 |
MSS, NLP (Joint) |
2018-03-13 13:00 |
Osaka |
|
Doubly folded Neimark-Sacker bifurcation and two coexisting two-dimensional tori part 3 Tomoki Ikegami (Meiji Univ.), Munehisa Sekikawa (Utsunomiya Univ.), Nataliya Stankevich (SSTU), Naohiko Inaba, Tetsuro Endo (Meiji Univ.) NLP2017-105 |
We study quasiperiodic bifurcations generated in a discrete dynamics generating three invariant tori. In our previous st... [more] |
NLP2017-105 pp.19-24 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Predicting Website Abuse Using Update Histories Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) ICSS2017-73 |
Threats of abusing websites that webmasters abandoned updates has increased.
In this paper, we propose a method of pred... [more] |
ICSS2017-73 pp.133-138 |
KBSE |
2017-09-19 14:05 |
Tokyo |
Doshisha Univ. Tokyo Branch Office |
A Proposal on Eliciting System Safety Requirements Shuichiro Yamamoto (Nagoya Univ.) KBSE2017-23 |
Eliciting safety requirements is necessary to assure system safety. It is impossible to confirm that the system satisfie... [more] |
KBSE2017-23 pp.13-18 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 13:25 |
Tokyo |
|
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 |
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] |
ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 pp.81-86 |
ICSS, IPSJ-SPT |
2017-03-14 09:30 |
Nagasaki |
University of Nagasaki |
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58 |
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] |
ICSS2016-58 pp.111-116 |
ICSS, IPSJ-SPT |
2017-03-14 11:45 |
Nagasaki |
University of Nagasaki |
Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU) ICSS2016-68 |
Android app developers sometimes copy code snippets posted on a Question and Answer Website and develop their apps. If a... [more] |
ICSS2016-68 pp.171-176 |
AI |
2017-02-27 15:30 |
Kyoto |
Kyoto Univ. |
Development of Information Collection Supporting System for Chinese Self-guided Tour to Japan Jie Ji, Takashi Yoshino (Wakayama Univ.) AI2016-38 |
Recently, the number of Chinese tourists traveling to Japan is rising rapidly. As it is easier for individuals to apply ... [more] |
AI2016-38 pp.19-24 |
LOIS, IPSJ-SPT, IPSJ-CN |
2016-05-12 15:55 |
Tokyo |
|
Suggestion of the Nomad Type Showroom Construction Method Realizing New Business Style Rinsuke Uchida, Shunsuke Ikkanzaka, YUta Isono, Takuya Mizushima, Toru Kobayashi (Department of Engineering,Nagasaki Univ.) LOIS2016-5 |
We suggest the nomad type showroom construction method realizing new business on demand in customer’s ICT environment. S... [more] |
LOIS2016-5 pp.21-26 |
CW (2nd) |
2016-03-09 |
Tokyo |
|
A Proposal for Posting Comments in Smartphone VR Shintaro Kutsumi, Jun Iio (Chuo Univ.) |
Currently we often use Video sharing websites and enjoy them. However these websites have two weak points;1) Comments ar... [more] |
|
CW (2nd) |
2016-03-09 |
Tokyo |
|
A real-time web-cast system for classes in the BYOD style Daiki Ito, Masaru Kamada (Ibaraki Univ.) |
A real-time web-cast system for classes in the BYOD style is developed.The teacher starts up our server application soft... [more] |
|
HCS |
2016-03-01 16:50 |
Ishikawa |
Rurikoh (Yamashiro Onsen) |
Passenger UX Prototypes in an IoT Embedded Vehicle
-- In-vehicle Communication Mediated by "Things" Brought in -- Yoshihiro Ohama, Hiroshi Yasuda (Toyota CRDL) HCS2015-89 |
In modern vehicles, various sensors and actuators are connected each other over in-vehicle network. If these on-board el... [more] |
HCS2015-89 pp.41-46 |
AI |
2015-12-04 16:35 |
Fukuoka |
Kyutech-Salite |
Feature Extraction and Recipe Classification based on Recipe-Sharing Websites Mamoru Emoto, Yukio Ohsawa (Tokyo Univ.) AI2015-25 |
In this study, we are focused on review data posted by users of recipe-sharing websites. First by using posting dates of... [more] |
AI2015-25 pp.73-77 |