Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, SITE, ISEC |
2023-11-09 13:55 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
ISEC2023-58 SITE2023-52 LOIS2023-16 |
With the spread of work style reforms such as remote work, communication about information security risks tends to be in... [more] |
ISEC2023-58 SITE2023-52 LOIS2023-16 pp.26-32 |
ICSS |
2019-11-13 14:55 |
Miyazaki |
MRT Terrace(Miyazaki) |
ICSS2019-63 |
E-mail has been one of the most widely used tools for computer-based communication since the early days of the Internet.... [more] |
ICSS2019-63 pp.19-23 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:35 |
Kochi |
Kochi University of Technology |
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT) ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 |
The trend of spam mails is changing. Since, in recent years, spam mails sent from overseas mail serversare increasing, s... [more] |
ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 pp.171-178 |
LOIS |
2019-03-08 11:15 |
Okinawa |
Miyakojima-shi Central Community Center |
A Spam Review Detection Method with Verifying Consistency among Multiple Review Sites and Performance Evaluation Chuhao Yao, Jiahong Wang, Eiichiro Kodama (Iwate pu) LOIS2018-71 |
In recent years, internet sites such as Amazon, Rakuten and TABElog that have the user review information are widely use... [more] |
LOIS2018-71 pp.91-96 |
KBSE |
2019-01-26 16:05 |
Tokyo |
NII |
A Spam Review Detection Method with Verifying Consistency among Multiple Review Sites Chuhao Yao, Jiahong Wang, Eiichiro Kodama (Iwate pu) KBSE2018-51 |
In recent years, internet sites such as Amazon, Rakuten and TABElog that have the user review information are widely use... [more] |
KBSE2018-51 pp.49-54 |
KBSE |
2018-03-01 10:00 |
Okinawa |
|
Spam Review Detection Based on Sentiment Analysis Yao Cuhao, Wang Jiahong, Kodama Eiichiro (iwate pu) KBSE2017-39 |
In recent years, the review sites like Rakuten and TABElog are widely used. As an important factor affecting purchasing ... [more] |
KBSE2017-39 pp.1-6 |
IA, ICSS |
2017-06-08 14:50 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Study on Email address harvesting by free service Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) IA2017-5 ICSS2017-5 |
The cyberattack for which an e-mail was used in recent years is a big problem socially. An indefinite point keeps also h... [more] |
IA2017-5 ICSS2017-5 pp.25-29 |
ICSS, IPSJ-SPT |
2016-03-03 12:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Malicious-Spam-Mail Detection System with Autonomous Learning Ability Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50 |
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more] |
ICSS2015-50 pp.19-24 |
NC, MBE |
2015-03-16 14:00 |
Tokyo |
Tamagawa University |
Spam E-Mail Filtering Using Gray SOM Naoki Miyamoto, Jun Rokui (Shimane Univ.) MBE2014-165 NC2014-116 |
It has become an important issue that filtering of Ham-Mail or Spam-Mail as the Spam-Mail increase.
The vague Mail call... [more] |
MBE2014-165 NC2014-116 pp.271-276 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Spam Analysis based on Mail Relay Routing Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75 |
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] |
ICSS2013-75 pp.101-106 |
CS |
2013-11-15 10:35 |
Hokkaido |
Noboribetsu-onsen Dai-ichi Takimotokan (Hokkaido) |
Preventing Voice-based SPAM by Hijacked Account Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2013-56 |
As the growing trend of integrating VoIP (Voice over IP) into SNS (Social Networking Service), we can easily guess the e... [more] |
CS2013-56 pp.93-98 |
IA, ICSS |
2011-06-16 13:05 |
Fukuoka |
Kyushu Institute of Technology |
Combining the outcomes of IP reputation services Tatsuya Mori, Kazumichi Sato, Yousuke Takahashi, Tatsuaki Kimura, Keisuke Ishibashi (NTT) IA2011-1 ICSS2011-1 |
(To be available after the conference date) [more] |
IA2011-1 ICSS2011-1 pp.1-6 |
IN, NS (Joint) |
2011-03-04 09:10 |
Okinawa |
Okinawa Convention Center |
An in-network spam filtering method using nearest neighbor search of edit distance Yosuke Tsukajima, Akihiro Nakao (Univ. of Tokyo) NS2010-244 |
Email has become an indispensable means for the communication in social life. However, a huge amount of spam has become ... [more] |
NS2010-244 pp.449-454 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 15:05 |
Aomori |
Hirosaki University |
On the use and misuse of E-mail sender authentication mechanisms Tatsuya Mori (NTT) ISEC2010-22 SITE2010-18 ICSS2010-28 |
E-mail sender authentication is a promising way of verifying the sources of e-mail messages. Since to- day’s primary e-m... [more] |
ISEC2010-22 SITE2010-18 ICSS2010-28 pp.101-106 |
NLC |
2010-01-25 14:20 |
Hiroshima |
Machizukuri Shimin Kouryu Plaza, Hiroshima City |
Towards the Personalized Splog Filtering System
-- Its Implementation and Evaluation Using Individual Splog Judgement Dataset -- Takayuki Yoshinaka (Tokyo Denki Univ.), Tomohiro Fukuhara (Univ. of Tokyo), Hidetaka Masuda (Tokyo Denki Univ.), Hiroshi Nakagawa (Univ. of Tokyo) NLC2009-38 |
The wide spread of spam blog (Splog) causes a big problem on today’s Web. The value of blog sites
is different by each ... [more] |
NLC2009-38 pp.31-36 |
NS, OCS, PN (Joint) |
2009-06-26 13:25 |
Nagasaki |
Nagasaki Museum of History and Culture (Nagasaki) |
[Encouragement Talk]
A Study of Spam Mail Detection before Receiving DATA Command at SMTP Server and its Evaluation using Large-scale Mail Log Data Yukiko Sawaya, Yutaka Miyake (KDDI R&D Labs, Inc.) NS2009-41 |
As the number of spam mail has been increasing and it occupies 85% of all email traffic, SMTP servers are frustrated wit... [more] |
NS2009-41 pp.61-66 |
ICSS |
2009-05-15 13:40 |
Hyogo |
Kobe University |
[Special Talk]
Internatinal Standarization Activities in ITU-T Study Group 17 (Security)
-- Standarizatoin on Network Security and ID Management -- Yutaka Miyake, Ryu Watanabe (KDDI Labs.) ICSS2009-2 |
This paper describes activities of international standard related security issues at the ITU-T which is international st... [more] |
ICSS2009-2 pp.3-8 |
ICSS |
2009-05-15 15:10 |
Hyogo |
Kobe University |
Investigation of Spam Mail Driven Web-Based Passive Attack Yuhei Kawakoya, Mitsuaki Akiyama, Kazufumi Aoki, Mitsutaka Itoh (NTT), Hiroki Takakura (Kyoto Univ) ICSS2009-5 |
In recent years, the number of web-based passive attacks which are driven by URLs included in spam mail is increasing. B... [more] |
ICSS2009-5 pp.21-26 |
IN, NS (Joint) |
2009-03-03 09:20 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
PrBL: Probabilistic BlackList for E-mail Spammers Tatsuya Mori (NTT) NS2008-146 |
Recent drastic increase in the number of spam messages has caused
significant overload on e-mail delivery systems.
IP... [more] |
NS2008-146 pp.15-20 |
DE |
2008-12-01 |
Tokyo |
Gakushuin |
[Poster Presentation]
Analysis of Individual Splogosphere for User Adaptable Splog Filtering Takayuki Yoshinaka (Tokyo Denki Univ.), Tomohiro Fukuhara (Tokyo Univ.), Hidetaka Masuda (Tokyo Denki Univ.), Hiroshi Nakagawa (Tokyo Univ.) DE2008-51 |
Today, spam blog sites(Splogs) increase on the Web and the blogospheres so theses splogs become the
noise. We describe ... [more] |
DE2008-51 pp.1-2 |