Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 08:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Proposal of Moving Target Defense Approach on Reliability in Web Services Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82 |
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] |
ICSS2023-82 pp.93-99 |
LOIS |
2024-03-14 10:35 |
Okinawa |
Okinawa Pref Danjyo-Kyoudou-Sankaku Center (Primary: On-site, Secondary: Online) |
Adaptation for Group Assessment in Drawing Process-Based Cognitive Function Testing Application Keisuke Yoshida (Kobe Univ.), Sachio Saiki (Kochi Univ. of Tech.), Naoki Kodama (Niigata Univ. of Health and Welfare), Atsushi Sato (Aichi Shukutoku Univ.), Chen Sinan, Masahide Nakamura (Kobe Univ.) LOIS2023-60 |
Japan faces a surge in dementia patients amid its super-aging society, emphasizing the need for regular group cognitive ... [more] |
LOIS2023-60 pp.70-77 |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Router Security Assessment Using CAPEC Vulnerability Assessment Criteria Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62 |
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] |
IA2023-62 pp.30-36 |
RCS, IN, NV (Joint) |
2023-05-26 11:30 |
Kanagawa |
Keio University (Hiyoshi Campus), and online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Blockchain based Wireless Access Sharing Motoharu Sasaki, Takeru Fukushima, Takatsune Moriyama (NTT) IN2023-13 RCS2023-26 |
In this paper, by combining the blockchain used in Web3 with wireless access, we present wireless access sharing using b... [more] |
IN2023-13 RCS2023-26 pp.55-60 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62 |
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] |
ICSS2022-62 pp.85-90 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66 |
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more] |
ICSS2022-66 pp.109-114 |
SC |
2022-05-27 11:20 |
Online |
Online |
Developing a Secure Streaming System of Clinic Site for Medical Education Sinan Chen, Masahide Nakamura, Kenji Sekiguchi (Kobe Univ.) SC2022-5 |
Clinical practice in the outpatient consultation room is restricted due to the COVID-19 control measures, resulting in t... [more] |
SC2022-5 pp.25-30 |
IA, ICSS |
2021-06-22 09:00 |
Online |
Online |
Feature analysis of phishing website and phishing detection based on machine learning algorithms Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9 |
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] |
IA2021-9 ICSS2021-9 pp.44-49 |
IA, ICSS |
2021-06-22 09:25 |
Online |
Online |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
NS |
2021-04-16 10:50 |
Online |
Online |
The service identifier based network access control method for supporting system of people with disabilities. Masaaki Noro, Yosuke Takano, Naoki Oguchi (FUJITSU LABORATORIES), Shunji Abe (NII) NS2021-10 |
Research and development of a support system using camera images for people with disabilities who bring their smartphone... [more] |
NS2021-10 pp.53-58 |
ICSS, IPSJ-SPT |
2021-03-02 09:35 |
Online |
Online |
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55 |
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] |
ICSS2020-55 pp.172-177 |
ET |
2020-06-13 14:00 |
Online |
Online |
Development of Teaching Materials for Data Processing Exercises Using Public Data Katsumi Yoshine (Nanzan Univ.) ET2020-3 |
In data processing exercises, real data will bring out learners interest than fictitious data. In this paper, we introdu... [more] |
ET2020-3 pp.11-14 |
ICSS, IPSJ-SPT |
2020-03-03 09:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84 |
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] |
ICSS2019-84 pp.97-102 |
ICSS, IPSJ-SPT |
2019-03-07 13:55 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Regulatory Compliance Monitoring on the Web Using Paragraph Vector Mitsuharu Sasaki (NTT EAST), Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya (NTT) ICSS2018-71 |
There are a certain number of employees who violate regulatory compliance by non-malicious acts. Since their violation m... [more] |
ICSS2018-71 pp.19-24 |
ICSS, IPSJ-SPT |
2019-03-07 15:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
A User Participation Type Web Security Platform and Its Real World Evaluation Akira Yamada, Yukiko Sawaya, Takashi Matsunaka, Shoma Tanaka, Ayumu Kubota (KDDI Research) ICSS2018-74 |
A User Participation Type Web Security Platform and Its Real World [more] |
ICSS2018-74 pp.35-40 |
IN, NS (Joint) |
2019-03-05 14:10 |
Okinawa |
Okinawa Convention Center |
Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2018-271 pp.455-460 |
ASN, NS, RCS, SR, RCC (Joint) |
2018-07-11 13:10 |
Hokkaido |
Hakodate Arena |
[Encouragement Talk]
Proposal of Automatic Data Collection and Repository Generation for Statistical Analysis and Visualization of Dark Web Markets Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2018-41 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2018-41 pp.25-30 |
NS, IN (Joint) |
2018-03-01 10:30 |
Miyazaki |
Phoenix Seagaia Resort |
A Study on Key Re-registration due to Change of Device for Mobile-Device-based Public Key Authentication Hideo Nishimura, Takao Yamashita, Yasuhiko Yoshimura, Satoru Furukawa (NTT) IN2017-101 |
A mobile-device-based public key authentication method is standardized in the FIDO Alliance to eliminate the passwords i... [more] |
IN2017-101 pp.69-74 |
NS, IN (Joint) |
2018-03-01 11:30 |
Miyazaki |
Phoenix Seagaia Resort |
Statistical Analysis on Dark Web Market Focusing on DDoS/Botnet Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2017-182 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2017-182 pp.85-90 |
TL |
2017-12-10 11:35 |
Ehime |
Ehime University |
A study on web page tamper detection method using natural language processing. Shotaro Aikawa, Masaki Inamura (TDU) TL2017-49 |
Web page attack methods diversify just like daily updated vulnerability information, it is difficult to detect attacks b... [more] |
TL2017-49 pp.31-36 |