IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 25  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2023-11-16
13:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Real time detection for replay-attack communication in control system
Koushi Nishi, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu University) ICSS2023-52
Attacks on control system in factory and power plant are increasing every year. Therefore, System that monitor communica... [more] ICSS2023-52
pp.7-14
ICSS 2023-11-16
13:50
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Device identification and attribute values consideration with browser fingerprint
Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-53
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprinting is us... [more] ICSS2023-53
pp.15-21
ICSS 2023-11-16
15:20
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device
Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] ICSS2023-56
pp.35-41
ICSS 2023-11-17
13:30
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Simulation of DNS cache poisoning attack detection method using DNS logs
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyui Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-64
DNS cache poisoning attacks exist as an attack that exploits the DNS cache function. Takahashi et al. proposed a method ... [more] ICSS2023-64
pp.93-100
ICSS 2023-11-17
13:55
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Analysis of the influence of DDoS attacks on Snort and legitimate users
Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65
(To be available after the conference date) [more] ICSS2023-65
pp.101-107
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:00
Hokkaido Hokkaido Jichiro Kaikan Analysis of effective attribute values on risk-based authentication with browser fingerprint
Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprint is used ... [more] ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19
pp.30-36
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:20
Hokkaido Hokkaido Jichiro Kaikan Analysis of Snort's impact due to DDoS attacks
Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33
In recent years, the number of DDoS attacks has been increasing.Tokuyama et al.[1][2] constructed an environment in whic... [more] ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33
pp.127-132
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
14:50
Hokkaido Hokkaido Jichiro Kaikan Anomaly detection with dataset including replay-attack communication
Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52
General-purpose devices and communications are increasingly introduced to control systems in factories and power plants ... [more] ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52
pp.247-254
NS, ICM, CQ, NV
(Joint)
2022-11-24
18:05
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] NS2022-116
pp.91-96
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
16:15
Online Online Identification and tracking of website users in consideration of privacy in browser fingerprinting
Takashi Tsukazaki, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp), Hiroyuki Okazaki (Shinshu Univ.) ISEC2022-28 SITE2022-32 BioX2022-53 HWS2022-28 ICSS2022-36 EMM2022-36
Browser fingerprinting is to identify website users by collecting information about device. In our previous research, we... [more] ISEC2022-28 SITE2022-32 BioX2022-53 HWS2022-28 ICSS2022-36 EMM2022-36
pp.124-130
ICSS, IPSJ-SPT 2022-03-07
15:20
Online Online Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] ICSS2021-65
pp.38-43
ICSS, IPSJ-SPT 2022-03-07
15:00
Online Online Identification of website users using browser fingerprinting and network packet
Takashi Tsukazaki, Yuichi Futa (TUT), Taku Yazawa (Dotexp) ICSS2021-66
Browser fingerprinting is gaining attention as a means of identifying website users. Browser fingerprinting is to identi... [more] ICSS2021-66
pp.44-48
ICSS 2021-11-30
09:30
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Real-time detection of Distributed Slow HTTP DoS attacks using communication analysis
Koki Tamura, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp) ICSS2021-54
At ICSS in this March, we proposed a detection method of Slow HTTP DoS Attacks with
distinguishment between communicat... [more]
ICSS2021-54
pp.49-54
ICSS 2021-11-30
09:55
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Comparison of CNN padding method using a part of malware API call sequence data with RNN.
Shugo Asai, Yuichi Futa (TUT) ICSS2021-55
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] ICSS2021-55
pp.55-60
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-19
11:20
Online Online Fake Command Attack Detection of industrial Control System with SVM
Yuki Harada, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.) ISEC2021-15 SITE2021-9 BioX2021-16 HWS2021-15 ICSS2021-20 EMM2021-20
Recently, industrial control systems (ICS) are introduced TCP/IP protocol and connect internet via office network. Secur... [more] ISEC2021-15 SITE2021-9 BioX2021-16 HWS2021-15 ICSS2021-20 EMM2021-20
pp.35-40
ICSS, IPSJ-SPT 2021-03-02
10:00
Online Online Authentication and authorization of IoT devices using blockchain and fog nodes
Takahiro Igarashi, Yuichi Futa (TUT) ICSS2020-43
In this paper, we propose a system for authentication / authorization of IoT devices using blockchain. With reference to... [more] ICSS2020-43
pp.102-107
ICSS, IPSJ-SPT 2021-03-02
11:30
Online Online Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes
Koki Tamura, Yuichi Futa (TUT) ICSS2020-46
In this paper, We propose an attack detection system using multiple thresholds in order to increase the detection rate o... [more] ICSS2020-46
pp.120-125
ICSS, IPSJ-SPT 2021-03-02
11:05
Online Online Accuracy evaluation of CNNs and random forests with Malware API call sequences
Shugo Asai, Futa Yuichi (TUT) ICSS2020-58
In this paper, we compare the accuracy of the results of classifying each malware family by Random Forest and CNN using ... [more] ICSS2020-58
pp.190-194
NS, NWS
(Joint)
2020-01-23
13:30
Okinawa   Electricity transaction system using smart contract
Youta Tatsuke, Yuichi Futa, Yoshihiro Kita (TUT) NS2019-161
Electricity transaction, which is an important infrastructure of industrial activity, often targeted by cyber-terrorists... [more] NS2019-161
pp.1-6
ISEC, SITE, LOIS 2019-11-02
10:50
Osaka Osaka Univ. Detection System of DNS Cache Poisoning Using Blockchain Technology
Tomohiro Takahashi, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) ISEC2019-78 SITE2019-72 LOIS2019-37
Recently we enjoy the benefits of the Internet.
Internet is working by various network services.
The Domain Name Syst... [more]
ISEC2019-78 SITE2019-72 LOIS2019-37
pp.107-112
 Results 1 - 20 of 25  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan