Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2017-11-16 14:50 |
Overseas |
KMITL, Bangkok, Thailand |
Log analysis for hijacked user account's login detection method based on an autonomous system number of access source Akira Sato, Shuji Sannomiya, Yoshihiro Oyama, Hisashi Nakai, Kenichi Yoshida, Keisuke Kameyama (Univ. of Tsukuba) IA2017-50 |
User accounts may be hijacked carelessly, and system administrators
should detect such hijacked user accounts as soon a... [more] |
IA2017-50 pp.95-98 |
MSS |
2017-03-16 16:50 |
Shimane |
Shimane Univ. |
Finding the Candidates of Attributes in Mail Words Filtered by Bayesian Method Nozomi Fujii, Manabu Sugii, Hiroshi Matsuno (Yamacguchi Univ.) MSS2016-89 |
The interest of a research about mail-filtering system is in a method based on Bayesian theory.The existing systems for ... [more] |
MSS2016-89 pp.43-48 |
IA, SITE, IPSJ-IOT [detail] |
2017-03-03 15:40 |
Okinawa |
Culture Resort Festone (Okinawa) |
Struggling against New-Born Malwares Attached to Mails Motoyuki Ohmori, Naoki Miyata, Kiyoyuki Nakashima, Kenichi Takahashi (Tottori Univ.) SITE2016-70 IA2016-100 |
We, Tottori University, have been experiencing targeted attacks using malicious mails especially since fiscal year 2016.... [more] |
SITE2016-70 IA2016-100 pp.51-56 |
ET |
2016-11-18 15:45 |
Shizuoka |
Plaza Verde |
Semi-Automated Attendance Checking System Using GPS, E-mailing, and Click Operation Kentaro Kato, Kazuma Obiya, Soma Sato (NIT) ET2016-64 |
This paper proposes the semi-automated attendance checking system using GPS, E-mailing, and click operation. This system... [more] |
ET2016-64 pp.53-56 |
IA |
2016-11-04 13:10 |
Overseas |
Taipei (Taiwan) |
Countermeasure of Spoofed Emails by Checking the Reliability of DKIM Signature Benjaporn Rienthong (King Mongkut's Univ. of Tech. Thonburi), Naoya Kitagawa, Nariyoshi Yamai (Tokyo Univ. of Agri. and Tech) IA2016-49 |
Although e-mail communication has been widely used for many years, the spoofed e-mails becoming a serious concern nowada... [more] |
IA2016-49 pp.103-107 |
IA |
2016-11-04 13:30 |
Overseas |
Taipei (Taiwan) |
Multi-site distributed backup system for mail service for disaster preparedness Masatoshi Kakiuchi, Takahiro Tsujii, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2016-50 |
Distributed system across multiple sites is effective ways for information service continuity for disaster preparedness.... [more] |
IA2016-50 pp.109-112 |
ICSS, IPSJ-SPT |
2016-03-03 12:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Malicious-Spam-Mail Detection System with Autonomous Learning Ability Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50 |
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more] |
ICSS2015-50 pp.19-24 |
NC, MBE |
2015-03-16 14:00 |
Tokyo |
Tamagawa University |
Spam E-Mail Filtering Using Gray SOM Naoki Miyamoto, Jun Rokui (Shimane Univ.) MBE2014-165 NC2014-116 |
It has become an important issue that filtering of Ham-Mail or Spam-Mail as the Spam-Mail increase.
The vague Mail call... [more] |
MBE2014-165 NC2014-116 pp.271-276 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 16:25 |
Ishikawa |
Hotel Rurikoh |
An Efficient Judging Method of a Large Amount of E-mails Having the Same Sender and Recipient Addresses Yoshiharu Tsuzaki, Ryosuke Matsumoto, Daisuke Kotani, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) SITE2013-62 IA2013-87 |
With the wide use of e-mail, it has become commonly expected that e-mails are delivered to recipients immediately. It is... [more] |
SITE2013-62 IA2013-87 pp.61-66 |
IA, ICSS |
2013-06-20 16:50 |
Niigata |
Ao-re Nagaoka |
Operation and Issues of E-Mail System in Okayama University Nariyoshi Yamai, Kiyohiko Okayama, Takaoki Fujiwara, Yoshihiro Ohsumi (Okayama Univ.) IA2013-8 ICSS2013-8 |
Okayama University has been operating student e-mail systems using Gmail since April 2009. As for teachers, we have sta... [more] |
IA2013-8 ICSS2013-8 pp.43-48 |
LOIS, IPSJ-CN, IPSJ-SPT |
2012-05-17 14:30 |
Chiba |
Chiba Institute of Technology |
A Proposal for Adding a Memo Function to E-mail Systems Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo) LOIS2012-1 |
As is often the case with the office workers in, for example, the customer relations department, they need to share meta... [more] |
LOIS2012-1 pp.49-54 |
MSS |
2012-03-08 15:15 |
Tokyo |
JAIST Tokyo Satellite |
Effect of the improvement on classification performance of the filtering system based on Baysian and decision tree methods Hiroyuki Yamaguchi, Manabu Sugii, Hiroshi Matsuno (Yamaguchi Univ.) MSS2011-76 |
Recent increase of spam mails is a serious problem in the Internet. bsfilter is one of the most well-used spam filters i... [more] |
MSS2011-76 pp.23-28 |
WIT |
2011-05-21 14:30 |
Niigata |
Niigata Univ. |
Development of a Route Guidance System for Blind Pedestrians George Akiyama, Tetsuya Watanabe, Ken Watanabe, Toshimitsu Yamaguchi (Niigata Univ.), Kazunori Minatani (DNC), Manabi Miyagi (Tsukuba Univ. Tech.), Susumu Oouchi (NISE) WIT2011-18 |
We developed a route guidance automatic creating system to help blind people know their route by speech. The route guida... [more] |
WIT2011-18 pp.97-100 |
IN, NS (Joint) |
2011-03-04 08:50 |
Okinawa |
Okinawa Convention Center |
Encrypted E-mail sharing system with multi-forwarding Fubuki Kubota, Taiichi Saito (Tokyo Denki Univ) NS2010-243 |
Proxy Re-Encryption scheme allows a proxy to transform a ciphertext computed with Alice's public key into one that can b... [more] |
NS2010-243 pp.445-448 |
ET |
2010-11-26 10:55 |
Tokyo |
Tokyo Institute of Technology |
Development of a Support System for Grasping Discussion Processes from E-mails Hiroki Nakayama (Fukushima Univ.), Youzou Miyadera, Setsuo Yokoyama (Tokyo Gakugei Univ.), Shoichi Nakamura (Fukushima Univ.) ET2010-52 |
This research aims to develop support methods for grasping discussion transition processes from e-mails. This paper main... [more] |
ET2010-52 pp.19-24 |
IA |
2010-11-24 15:35 |
Yamanashi |
Seisen-Ryo |
Design of a Certified E-mail System without a Trusted Third Party Satoshi Ishibashi, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) IA2010-54 |
These days, as e-mails become more and more important, the demand for certified e-mail is growing. Methods for certified... [more] |
IA2010-54 pp.19-24 |
NS, IN (Joint) |
2010-03-05 14:00 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A method of deducing the user's state of mind and preferences by analyzing pictographic characters and emoticons in mobile phone emails Ryo Yamashita, Sanae Yamaguchi, Kazumasa Takami (Soka Univ.) IN2009-211 |
As the ubiquitous environment is taking root, there are calls for services that deliver content appropriate for the indi... [more] |
IN2009-211 pp.399-404 |
PN, IN (Joint) |
2009-10-09 10:25 |
Saitama |
KDDI Laboratory |
Improving Performability of E-mail Systems with Slower Vehicles Kazuki Onda, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefectural Univ.) IN2009-67 |
An e-mail system mainly consists of e-mail servers, networks, and so on. To get the e-mail system to work properly, abov... [more] |
IN2009-67 pp.29-34 |
IN |
2009-07-09 16:15 |
Hokkaido |
HOKKAIDO UNIVERSITY |
[Invited Talk]
High-performance, High-efficient Security Processing Satoshi Kamiya (NEC) IN2009-29 |
With the Internet growth and progress of Cloud Computing, circumstances using computer resources via network is getting ... [more] |
IN2009-29 pp.25-30 |
NS, OCS, PN (Joint) |
2009-06-26 13:25 |
Nagasaki |
Nagasaki Museum of History and Culture (Nagasaki) |
[Encouragement Talk]
A Study of Spam Mail Detection before Receiving DATA Command at SMTP Server and its Evaluation using Large-scale Mail Log Data Yukiko Sawaya, Yutaka Miyake (KDDI R&D Labs, Inc.) NS2009-41 |
As the number of spam mail has been increasing and it occupies 85% of all email traffic, SMTP servers are frustrated wit... [more] |
NS2009-41 pp.61-66 |