IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 41  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
11:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics
Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] ICSS2023-70
pp.9-16
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
pp.332-336
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Analyzing Cybersecurity Datasets -- Enhancing Security throughout the Data Life Cycle --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] IA2023-63
pp.37-39
ISEC 2023-05-17
10:45
Tokyo Kikai-Shinko-Kaikan Bldg. On the Risk Assessment Method against ML-specific Attacks for ML system developers -- A Damage Assessment Method for ML system developers --
Jun Yajima, Maki Inui, Kentarou Tsuji (Fujitsu Ltd.), Nobukazu Yoshioka (Waseda Univ.) ISEC2023-4
To develop machine learning (ML) systems that are secure againstML-specific attacks, to conduct threat assessment to fin... [more] ISEC2023-4
pp.25-32
IA, ICSS 2022-06-23
15:20
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
An Investigation of Abuse Possibility of IoT Devices After Unauthorized Login
Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) IA2022-6 ICSS2022-6
IoT devices with weak ID/Password settings and accessible from the Internet by Telnet and SSH services are infected with... [more] IA2022-6 ICSS2022-6
pp.31-36
ICSS, IPSJ-SPT 2022-03-07
13:30
Online Online Time Efficient Risk Assessment Tool for IoT Systems
Rajulapati Shourya, Takashi Kawauchi (Hitachi) ICSS2021-60
We have developed an integrated security design platform that provides security analysis independent of the consultant's... [more] ICSS2021-60
p.13
ICSS, IPSJ-SPT 2022-03-08
11:00
Online Online A study of new cyber attacks for fast charging of electric vehicle
Hiroki Nagayama, Masahiro Shiraishi, Yukio Nagafuchi, Asami Miyajima (NTT) ICSS2021-70
In order to realize a carbon-neutral society, the shift from gasoline vehicles to electric vehicles (EVs) is being
prom... [more]
ICSS2021-70
pp.66-71
ICSS, IPSJ-SPT 2022-03-08
15:30
Online Online Verifying concept of personalized malware by investigating end-user environments
Daigo Ichikawa, Rui Tanabe, XU Haoyuan, Yoshioka Katsunari, Matsumoto Tsutomu (YNU) ICSS2021-83
Personalized malware conducts malicious activities only when it is running on the target environment. Previous studies h... [more] ICSS2021-83
pp.147-152
WBS, IT, ISEC 2021-03-05
13:30
Online Online Information retrieval for security reports using behavior of cyber attacker
Yuki Kawaguchi, Mayo Yamasaki (NTT) IT2020-154 ISEC2020-84 WBS2020-73
Cyber security incident responders require related information about related incidents for the quick and comprehensive
... [more]
IT2020-154 ISEC2020-84 WBS2020-73
pp.257-264
IN, NS
(Joint)
2021-03-05
09:50
Online Online A study of new cyber attacks for Data Distribution Services
Hiroki Nagayama, Masahiro Shiraishi, Tomoaki Washio, Asami Miyajima (NTT) IN2020-76
Data Distribution Services (DDS) has been attracting attention in recent years as pub/sub middleware for mission-critica... [more] IN2020-76
pp.132-137
ICSS, IPSJ-SPT 2021-03-02
10:25
Online Online Proof of concept of sandbox evasion attack using email address stored in target machine
Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] ICSS2020-57
pp.184-189
ICD, HWS [detail] 2020-10-26
13:50
Online Online Security Threats and Preventions for Photonics Computing Model
Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] HWS2020-33 ICD2020-22
pp.48-53
IN, CCS
(Joint)
2020-08-03
13:00
Online Online 5G Threat Analysis Based on Smart Factory Operational Scenario -- Security from a NFV perspective --
Takahashi Hideaki, Taenaka Yuzo, Kadobayashi Youki (NAIST) IN2020-13
The 5th generation mobile communication system (5G) is expected to bring major innovations to mobile communication netwo... [more] IN2020-13
pp.25-30
SC 2019-06-01
10:30
Ibaraki National Institute for Materials Science An Introduction of Security Case Studies for Service Robots and IoT Devices
Jiro Yamazaki, Hidenori Tsuiji, Fumiaki Yamasaki (NOS) SC2019-8
In the past years, robots worked in very restricted area such as industrial factory for a certain purposes and
also iso... [more]
SC2019-8
pp.45-50
IN, NS
(Joint)
2019-03-05
11:30
Okinawa Okinawa Convention Center A study on Maliciousness Measurement in Cyber Threat Intelligence Using Graph Convolutional Networks
Yuta Kazato, Yoshihide Nakagawa, Yuichi Nakatani (NTT) IN2018-128
Cyber threat information (CTI) sharing is one of the important functions to protect end-users and services from cyber-at... [more] IN2018-128
pp.265-270
ICSS 2018-11-21
16:05
Kagoshima   [Invited Talk] Security Countermeasure at ShowNet in Interop Tokyo 2018
Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) ICSS2018-59
Cyber attacks become emerging threats on the Internet.We held an exhibition in ICT called Interop Tokyo every June. In t... [more] ICSS2018-59
p.37
NS, IN
(Joint)
2018-03-01
09:20
Miyazaki Phoenix Seagaia Resort A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] IN2017-90
pp.5-10
ICSS 2017-11-20
15:40
Oita Beppu International Convention Center Educational Tools to Learn Concrete Control Measures Corresponding to Threats of Cyber Attacks
Tan Omiya, Daisuke Miyamoto, Youki Kadobayashi (NAIST) ICSS2017-40
Recently, the threats of cyber attacks have increased. There is the need to understand information security measures to ... [more] ICSS2017-40
pp.11-16
RCS, IN, NV
(Joint)
2017-05-12
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] IN2017-5
pp.21-24
ICSS, IPSJ-SPT 2017-03-13
13:25
Nagasaki University of Nagasaki Modeling of Attack Activity for Integrated Analysis of Threat Information
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] ICSS2016-47
pp.7-12
 Results 1 - 20 of 41  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan