IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 31  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SAT, SANE
(Joint)
2024-02-09
13:20
Kagoshima AmaHome PLAZA (Amami City Shimin Koryu Center)
(Primary: On-site, Secondary: Online)
Secure Firmware Updates for Nano-Satellites: Design Considerations and PoC Implementation
Yuta Nakagawa, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-111
With the increase in the number of satellite launches in recent years, cyber attacks on satellites have become a serious... [more] SANE2023-111
pp.43-48
SAT, SANE
(Joint)
2024-02-09
13:45
Kagoshima AmaHome PLAZA (Amami City Shimin Koryu Center)
(Primary: On-site, Secondary: Online)
Cyber Threat Analysis for Nano-Satellites
Keika Mori, Ryoya Furukawa, Yuta Nakagawa, Kotaro Saito, Yusuke Yamamoto, FajardoTapia Isai, Shogo Suzuki, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-112
The number of launches of nano-satellites is increasing due to more frequent launch opportunities and lower development ... [more] SANE2023-112
pp.49-54
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
14:25
Online Online Cryptocurrency Analysis System for Investigating Cyber Crime Economy
Hiroshi Mori, Hiroshi Kumagai, Yin Minn Pa Pa, Yuta Takata, Ryoya Furukawa, Yuji Sakurai, Masaki Kamizono (DTCY) ISEC2022-24 SITE2022-28 BioX2022-49 HWS2022-24 ICSS2022-32 EMM2022-32
 [more] ISEC2022-24 SITE2022-28 BioX2022-49 HWS2022-24 ICSS2022-32 EMM2022-32
pp.98-103
ICSS, IPSJ-SPT 2022-03-08
10:00
Online Online Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures
Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] ICSS2021-67
pp.49-54
ICSS, IPSJ-SPT 2021-03-02
10:00
Online Online Evaluation of Uncertain Reports by Multiple Anti-virus Engines
Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] ICSS2020-56
pp.178-183
ICSS, IPSJ-SPT 2019-03-08
13:25
Okinawa NICT Okinawa Electromagnetic Technology Center Proposal of a Non-Technical Skills Map for Computer Security Incident Responses
Takahiro Kasama, Shingo Yasuda, Hironobu Satoh (NICT), Masaki Kamizono, Emi Kojima (PwC), Takao Yamaguchi, Kazuharu Nara (JAMSS) ICSS2018-90
 [more] ICSS2018-90
pp.185-190
ICSS, IPSJ-SPT 2018-03-08
10:35
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning
Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2017-68
 [more] ICSS2017-68
pp.103-108
ICSS, IPSJ-SPT 2018-03-08
11:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center ICSS2017-75  [more] ICSS2017-75
pp.145-150
ICSS 2017-11-20
14:15
Oita Beppu International Convention Center [Invited Talk] Case Study and Future Perspective on Security Assessment of Connected Car
Masaki Kamizono (PwC) ICSS2017-38
Various cyber security threats and vulnerabilities are reported in accordance with the remarkable rise of the connected ... [more] ICSS2017-38
pp.1-4
ICSS 2017-11-20
16:05
Oita Beppu International Convention Center *
Emi Kojima (PwC), Kazuharu Nara (JAMSS), Masaki Kamizono (PwC) ICSS2017-41
(To be available after the conference date) [more] ICSS2017-41
pp.17-22
ICSS 2017-11-21
14:00
Oita Beppu International Convention Center ICSS2017-50  [more] ICSS2017-50
pp.71-76
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
14:15
Tokyo   ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23  [more] ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23
pp.93-98
ICSS, IPSJ-SPT 2017-03-13
13:25
Nagasaki University of Nagasaki Modeling of Attack Activity for Integrated Analysis of Threat Information
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] ICSS2016-47
pp.7-12
ICSS, IPSJ-SPT 2017-03-14
11:45
Nagasaki University of Nagasaki Representation for Attack Activity to Associate Threat Information
Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] ICSS2016-64
pp.147-152
ICSS, IPSJ-SPT 2017-03-14
10:55
Nagasaki University of Nagasaki A Vulnerability Analysis of Android Applications from the View of Framework
Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)
 [more]
ICSS 2016-11-25
13:00
Kanagawa Institute of Information Security [Invited Talk] Analyses of social needs and training programs of security human resources in Japan
Masashi Eto (NICT), Masaki Kamizono (PwC Cyber Services LLC) ICSS2016-38
In response to the serious shortage of cybersecurity human resources in the domestic industry, a number of training prog... [more] ICSS2016-38
p.1
ICSS 2016-11-25
16:10
Kanagawa Institute of Information Security Performance of link-mining techniques to detect malicious websites
Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] ICSS2016-44
pp.31-35
ICSS, IA 2016-06-07
13:25
Saga Saga University
Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services LLCPwC Cyber Services), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services LLCPwC Cyber Services), Masakatu Morii (Kobe Univ.) IA2016-12 ICSS2016-12
(To be available after the conference date) [more] IA2016-12 ICSS2016-12
pp.63-68
ICSS 2015-03-03
15:15
Okinawa Meio Univiersity A Pluggable and Programmable Flamework for Analyzing Security Logs
Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] ICSS2014-68
pp.31-36
ICSS 2015-03-03
16:15
Okinawa Meio Univiersity Link Structural Analysis of Drive-by-Download Attacks
Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] ICSS2014-70
pp.43-48
 Results 1 - 20 of 31  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan