Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICTSSL |
2023-05-18 16:05 |
Niigata |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
From Multidimensional Mobile Communication To Multidimensional Network Masakazu Sengoku (Jigyo) ICTSSL2023-7 |
In the 1990s, an international symposium on multidimensional mobile communications started in Japan. The multi-dimension... [more] |
ICTSSL2023-7 pp.35-40 |
NS |
2023-05-11 16:50 |
Tokyo |
Shinjuku Campus, Kogakuin University + Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
SINET6, an academic science information network connecting the whole Japan with 400-Gbps high-speed link. takashi kurimoto, koji sasayama, osamu akashi, urushidani shigeo (NII) NS2023-14 |
This paper describes the architectural design, services, and operation and monitoring functions of Science Information N... [more] |
NS2023-14 pp.20-25 |
RCC, ISEC, IT, WBS |
2023-03-15 09:30 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Networks anomaly detection by VAE based on features extracted by CNN Higashihata Kazuki (Osaka Prefecture Univ.), Aoki Shigeki, Miyamoto Takao (Osaka Metropolitan Univ.) IT2022-111 ISEC2022-90 WBS2022-108 RCC2022-108 |
Anomaly-based IDS, one of the intrusion detection systems (IDS), can detect unknown anomalies, but there is a problem of... [more] |
IT2022-111 ISEC2022-90 WBS2022-108 RCC2022-108 pp.269-276 |
IN, NS (Joint) |
2023-03-03 09:50 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Cyber-Attack Detection Method for Closed Network
-- A study of the detection technique of network-bridged equipment -- Nobuyuki Nakamura (OKI) IN2022-100 |
Cyber-Attacks in closed network occur recently. As closed network is not connected to the internet and may contain equip... [more] |
IN2022-100 pp.205-210 |
PN |
2023-03-02 12:00 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Conceptual Demonstration of the Reconfigurable Probe over US-Japan Experimantal Network in SC22 Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2022-59 |
Towards the realization of a secure Beyond 5G infrastructure network, we have proposed the "Reconfigurable In-network Se... [more] |
PN2022-59 pp.90-95 |
HWS, VLD |
2023-03-04 13:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
* Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Nagata Makoto (Kobe Univ.) VLD2022-121 HWS2022-92 |
With the development of IoT, security is becoming increasingly important. Confidential information and other information... [more] |
VLD2022-121 HWS2022-92 pp.267-272 |
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2023-02-22 10:15 |
Hokkaido |
Hokkaido Univ. |
Generation Method of Targeted Adversarial Examples using Gradient Information for the Target Class of the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2022-61 IE2022-78 |
With the advancement of AI technology, the vulnerability of AI system is pointed out. The adversarial examples (AE), whi... [more] |
ITS2022-61 IE2022-78 pp.107-111 |
MBE, MICT, IEE-MBE [detail] |
2023-01-17 10:40 |
Saga |
|
Potential problems that will arise for hospital LANs Eisuke Hanada (Saga Univ.), Takato Kudou (Oita Univ.) MICT2022-46 MBE2022-46 |
Hospital Information Systems (HIS) have been introduced in almost all large hospitals. In addition to this, IP networks ... [more] |
MICT2022-46 MBE2022-46 pp.17-21 |
IN, IA (Joint) |
2022-12-13 09:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
A Study on Obfuscation of Node Centrality in Large-Scale Networks Hiroki Kawamura, Takeaki Iwata, Ryotaro Matsuo, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2022-55 |
Node centrality (e.g., degree centrality, eigenvector centrality, betweenness centrality), which is determined by the ne... [more] |
IA2022-55 pp.40-46 |
IN, IA (Joint) |
2022-12-13 15:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66 |
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] |
IA2022-66 pp.91-98 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 15:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluation of power delivery networks in secure semiconductor systems Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 |
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] |
VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 pp.82-86 |
ICTSSL, IN, NWS, IEE-SMF |
2022-10-27 14:30 |
Nagano |
Shinshu University (Primary: On-site, Secondary: Online) |
Proposal for an Electronic Medicine Notebook System Using Blockchain Technology Takumi Kusano, Koichi Gyoda (SIT) ICTSSL2022-18 |
In Japan, a medicine notebook is used to keep a record of medication history as part of the personal health information ... [more] |
ICTSSL2022-18 pp.6-11 |
HWS, ICD |
2022-10-25 10:25 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Study on Profiling Side-channel Analysis against AES-CTR Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23 |
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more] |
HWS2022-31 ICD2022-23 pp.6-11 |
HWS, ICD |
2022-10-25 17:05 |
Shiga |
(Primary: On-site, Secondary: Online) |
How to Identify the Physical Direction of CAN Message Transmission Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35 |
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] |
HWS2022-43 ICD2022-35 pp.76-81 |
R |
2022-10-07 14:50 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
A Note on A Transformer Encoder-Based Malware Classification Using API Calls Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36 |
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] |
R2022-36 pp.25-30 |
SIP |
2022-08-26 14:26 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki Island) (Primary: On-site, Secondary: Online) |
Generation method of Adversarial Examples using XAI Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SIP2022-72 |
With the advancement of AI technology, AI can be applied to various fields. Therefore the accountability for the decisio... [more] |
SIP2022-72 pp.115-120 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 11:10 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
Construction of IoT System Based on Zero Trust Networks Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41 |
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] |
NS2022-41 pp.71-76 |
CQ, CS (Joint) |
2022-05-12 14:20 |
Fukui |
Fukui (Fuku Pref.) (Primary: On-site, Secondary: Online) |
Distributed Network Intrusion Detection System Using Federated Learning Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5 |
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] |
CQ2022-5 pp.20-25 |
VLD, HWS [detail] |
2022-03-08 10:20 |
Online |
Online |
Evaluation of leakage-based LR-PUF's resistance to machine learning attacks Tomoaki Oikawa, Kimiyoshi Usami (SIT) VLD2021-93 HWS2021-70 |
One of the LSI individual identification technologies is PUF (Physically Unclonable Function), which utilizes the physic... [more] |
VLD2021-93 HWS2021-70 pp.93-98 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 13:55 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
An Examination about Management of IP Address Assignment with IPoE in a Campus Network Kenji Ohira (Osaka Univ.) SITE2021-58 IA2021-71 |
When an information security incident occurs, an investigation is started using the IP address as a starting point, but ... [more] |
SITE2021-58 IA2021-71 pp.75-78 |