Mon, Mar 2 PM 13:30 - 13:40 |
|
13:30-13:40 |
Opening Address ( 10 min. ) |
Mon, Mar 2 PM Security : IOT, SITE, IA 13:40 - 15:20 |
(1) IA |
13:40-14:05 |
Secure file transfer on 100 Gbps network using single server |
Junichiro Shitami, Goki Honjo (UTokyo), Kei Hiraki (PFN), Mary Inaba (UTokyo) |
(2) IA |
14:05-14:30 |
Implementation and Evaluation of Detection and Blocking System against DGA-based Bot by Focusing on NXDOMAIN Responses |
Yuki Iuchi (Hokkaido Univ.), Yong Jin, Hikaru Ichise (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) |
(3) SITE |
14:30-14:55 |
Proposal of Anomaly Based Attack Detection System for IoT Devices Using Deep Metric Learning |
Tatsuya Takimoto, Hiroyuki Inaba (KIT) |
(4) |
14:55-15:20 |
|
|
15:20-15:40 |
Break ( 20 min. ) |
Mon, Mar 2 PM Network, Management, etc : IOT, IA 15:40 - 16:55 |
(5) |
15:40-16:05 |
|
(6) |
16:05-16:30 |
|
(7) |
16:30-16:55 |
|
Mon, Mar 2 PM Privacy, Education : SITE 15:40 - 17:20 |
(8) SITE |
15:40-16:05 |
The Consideration of Stakeholders' Case Relationships related to Implicit Descriptions protected by Attorney-Client Privilege |
Hiroshi Kitamura (Setsunan Univ.) |
(9) SITE |
16:05-16:30 |
On Regulation of "Dual-use Knowledge" |
Takushi Otani (Kibi International Univ.) |
(10) SITE |
16:30-16:55 |
Research Ethics Education with Jigsaw Method for International Students |
Daisuke Suzuki (Hokuriku Univ.) |
(11) SITE |
16:55-17:20 |
The design of the sample policy for utilizing educational data |
Hiroshi Ueda (Hosei Univ.), Hiroaki Ogata (Kyoto Univ.), Tsuneo Yamada (The Open Univ. of Japan) |
Tue, Mar 3 AM RDM, etc : IOT, RDM 09:40 - 11:20 |
(12) |
09:40-10:05 |
|
(13) |
10:05-10:30 |
|
(14) |
10:30-10:55 |
|
(15) |
10:55-11:20 |
|
Tue, Mar 3 AM Network, Design : IOT, IA 09:40 - 11:20 |
(16) IA |
09:40-10:05 |
A design and implementation of an HBM-based packet scheduler |
Katsushi Kobayashi (U. Tokyo) |
(17) IA |
10:05-10:30 |
A Study on Autonomous Decentralized Allocation Method for Content Replicas in ICN |
Toshitaka Kashimoto, Yusuke Sakumoto (Kwansei Gakuin Univ) |
(18) IA |
10:30-10:55 |
A Study on Efficient Blind Search Utilizing the Rendezvous of Random Walk Agents |
Fumiya Toyoda, Yusuke Sakumoto, Hiroyuki Ohsaki (Kwansei Gakuin Univ) |
(19) |
10:55-11:20 |
|
|
11:20-12:50 |
Lunch Break ( 90 min. ) |
Tue, Mar 3 PM Network, Visualization : IOT, IA 12:50 - 14:30 |
(20) IA |
12:50-13:15 |
3D visualization of AS topology |
Ippei Onishi, Michiko Harayama (Gifu Univ.) |
(21) |
13:15-13:40 |
|
(22) |
13:40-14:05 |
|
(23) |
14:05-14:30 |
|
Tue, Mar 3 PM RDM, Education, etc : SITE, RDM 12:50 - 14:30 |
(24) SITE |
12:50-13:15 |
On issues about utilization and management of records stored inside learning management systems |
Takahiro Tagawa, Naomi Fujimura (Kyushu Univ.) |
(25) SITE |
13:15-13:40 |
Study of Risks and Measures for Using of Cloud Services in Universities |
Yoshinari Kanaya (Tohoku Univ.) |
(26) |
13:40-14:05 |
|
(27) |
14:05-14:30 |
|
|
14:30-14:50 |
Break ( 20 min. ) |
Tue, Mar 3 PM Security, Management : IOT, SITE, IA 14:50 - 16:05 |
(28) |
14:50-15:15 |
|
(29) SITE |
15:15-15:40 |
A Study of Currency-Basket-backed Stablecoins using Linear Logic |
Yusuke Kaneko (SMBC), Hitoshi Okada (NII), Shigeichiro Yamasaki (KINDAI Univ.) |
(30) IA |
15:40-16:05 |
A PKI Extension of OSPFv3 to Ensure Source of Prefixes |
Takahiro Oriishi, Kenji Matsuura (Tokushima Univ.), Kenji Ohira (Osaka Univ.) |
Tue, Mar 3 PM Closing 16:10 - 16:20 |
|
16:10-16:15 |
IA Student Award ( 5 min. ) |
|
16:15-16:20 |
Closing Address ( 5 min. ) |