IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 65  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-22
08:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
Proposal of Moving Target Defense Approach on Reliability in Web Services
Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] ICSS2023-82
pp.93-99
LOIS 2024-03-14
10:35
Okinawa Okinawa Pref Danjyo-Kyoudou-Sankaku Center
(Primary: On-site, Secondary: Online)
Adaptation for Group Assessment in Drawing Process-Based Cognitive Function Testing Application
Keisuke Yoshida (Kobe Univ.), Sachio Saiki (Kochi Univ. of Tech.), Naoki Kodama (Niigata Univ. of Health and Welfare), Atsushi Sato (Aichi Shukutoku Univ.), Chen Sinan, Masahide Nakamura (Kobe Univ.) LOIS2023-60
Japan faces a surge in dementia patients amid its super-aging society, emphasizing the need for regular group cognitive ... [more] LOIS2023-60
pp.70-77
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Router Security Assessment Using CAPEC Vulnerability Assessment Criteria
Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] IA2023-62
pp.30-36
RCS, IN, NV
(Joint)
2023-05-26
11:30
Kanagawa Keio University (Hiyoshi Campus), and online
(Primary: On-site, Secondary: Online)
[Invited Lecture] Blockchain based Wireless Access Sharing
Motoharu Sasaki, Takeru Fukushima, Takatsune Moriyama (NTT) IN2023-13 RCS2023-26
In this paper, by combining the blockchain used in Web3 with wireless access, we present wireless access sharing using b... [more] IN2023-13 RCS2023-26
pp.55-60
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services
Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] ICSS2022-62
pp.85-90
ICSS, IPSJ-SPT 2023-03-13
17:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more]
ICSS2022-66
pp.109-114
SC 2022-05-27
11:20
Online Online Developing a Secure Streaming System of Clinic Site for Medical Education
Sinan Chen, Masahide Nakamura, Kenji Sekiguchi (Kobe Univ.) SC2022-5
Clinical practice in the outpatient consultation room is restricted due to the COVID-19 control measures, resulting in t... [more] SC2022-5
pp.25-30
IA, ICSS 2021-06-22
09:00
Online Online Feature analysis of phishing website and phishing detection based on machine learning algorithms
Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] IA2021-9 ICSS2021-9
pp.44-49
IA, ICSS 2021-06-22
09:25
Online Online Analtsis of cost-effectiveness in malicious site detection using VirusTotal
Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more]
IA2021-10 ICSS2021-10
pp.50-55
NS 2021-04-16
10:50
Online Online The service identifier based network access control method for supporting system of people with disabilities.
Masaaki Noro, Yosuke Takano, Naoki Oguchi (FUJITSU LABORATORIES), Shunji Abe (NII) NS2021-10
Research and development of a support system using camera images for people with disabilities who bring their smartphone... [more] NS2021-10
pp.53-58
ICSS, IPSJ-SPT 2021-03-02
09:35
Online Online An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log
Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] ICSS2020-55
pp.172-177
ET 2020-06-13
14:00
Online Online Development of Teaching Materials for Data Processing Exercises Using Public Data
Katsumi Yoshine (Nanzan Univ.) ET2020-3
In data processing exercises, real data will bring out learners interest than fictitious data. In this paper, we introdu... [more] ET2020-3
pp.11-14
ICSS, IPSJ-SPT 2020-03-03
09:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] ICSS2019-84
pp.97-102
ICSS, IPSJ-SPT 2019-03-07
13:55
Okinawa NICT Okinawa Electromagnetic Technology Center Regulatory Compliance Monitoring on the Web Using Paragraph Vector
Mitsuharu Sasaki (NTT EAST), Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya (NTT) ICSS2018-71
There are a certain number of employees who violate regulatory compliance by non-malicious acts. Since their violation m... [more] ICSS2018-71
pp.19-24
ICSS, IPSJ-SPT 2019-03-07
15:25
Okinawa NICT Okinawa Electromagnetic Technology Center A User Participation Type Web Security Platform and Its Real World Evaluation
Akira Yamada, Yukiko Sawaya, Takashi Matsunaka, Shoma Tanaka, Ayumu Kubota (KDDI Research) ICSS2018-74
A User Participation Type Web Security Platform and Its Real World [more] ICSS2018-74
pp.35-40
IN, NS
(Joint)
2019-03-05
14:10
Okinawa Okinawa Convention Center Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack
Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2018-271
pp.455-460
ASN, NS, RCS, SR, RCC
(Joint)
2018-07-11
13:10
Hokkaido Hakodate Arena [Encouragement Talk] Proposal of Automatic Data Collection and Repository Generation for Statistical Analysis and Visualization of Dark Web Markets
Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2018-41
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2018-41
pp.25-30
NS, IN
(Joint)
2018-03-01
10:30
Miyazaki Phoenix Seagaia Resort A Study on Key Re-registration due to Change of Device for Mobile-Device-based Public Key Authentication
Hideo Nishimura, Takao Yamashita, Yasuhiko Yoshimura, Satoru Furukawa (NTT) IN2017-101
A mobile-device-based public key authentication method is standardized in the FIDO Alliance to eliminate the passwords i... [more] IN2017-101
pp.69-74
NS, IN
(Joint)
2018-03-01
11:30
Miyazaki Phoenix Seagaia Resort Statistical Analysis on Dark Web Market Focusing on DDoS/Botnet
Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2017-182
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2017-182
pp.85-90
TL 2017-12-10
11:35
Ehime Ehime University A study on web page tamper detection method using natural language processing.
Shotaro Aikawa, Masaki Inamura (TDU) TL2017-49
Web page attack methods diversify just like daily updated vulnerability information, it is difficult to detect attacks b... [more] TL2017-49
pp.31-36
 Results 1 - 20 of 65  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan