Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, LOIS |
2016-01-21 16:45 |
Fukuoka |
Fukuoka Institute of Technology |
[Invited Talk]
Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications Yoshiyasu Nishibe, Ken Ito, Masaki Onishi (NTT Com) ICM2015-33 LOIS2015-55 |
In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations... [more] |
ICM2015-33 LOIS2015-55 pp.41-46 |
TL |
2015-12-13 12:00 |
Tokyo |
Room 303/304/305, Building #8, Waseda University |
The future possibility of a study of evaluation for the writing in Japanese
-- A case of readers' evaluation for email -- Risa Kikuchi (JWU) TL2015-49 |
It’s an idea of a study of evaluation for e-mail written in Japanese. The purpose of the study is to make a contribution... [more] |
TL2015-49 pp.53-58 |
NC, MBE |
2015-03-16 14:00 |
Tokyo |
Tamagawa University |
Spam E-Mail Filtering Using Gray SOM Naoki Miyamoto, Jun Rokui (Shimane Univ.) MBE2014-165 NC2014-116 |
It has become an important issue that filtering of Ham-Mail or Spam-Mail as the Spam-Mail increase.
The vague Mail call... [more] |
MBE2014-165 NC2014-116 pp.271-276 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
Targeted Malware Detection Focused on Dummy Document Display Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-89 |
In recent years, targeted attacks have become a bigger threat. Attackers usually try to intrude into targeted organizati... [more] |
ICSS2014-89 pp.157-161 |
ICSS, IA |
2014-06-05 15:15 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
[Invited Talk]
Threat and Countermeasure Against the Targeted Attack Satoru Torii (Fujitsu Labs.) IA2014-2 ICSS2014-2 |
A lot of incidents by crafty cyber-attacks such as a targeted attack are made public. To confront such novel cyber-attac... [more] |
IA2014-2 ICSS2014-2 pp.7-8 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 16:25 |
Ishikawa |
Hotel Rurikoh |
An Efficient Judging Method of a Large Amount of E-mails Having the Same Sender and Recipient Addresses Yoshiharu Tsuzaki, Ryosuke Matsumoto, Daisuke Kotani, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) SITE2013-62 IA2013-87 |
With the wide use of e-mail, it has become commonly expected that e-mails are delivered to recipients immediately. It is... [more] |
SITE2013-62 IA2013-87 pp.61-66 |
SITE, IPSJ-CE, IPSJ-CLE |
2013-12-14 15:40 |
Okinawa |
Ryukyu Univ. |
The Circumstances and The Present Condition Of College Student's E-mail Use
-- Case of Students of Economics and Engineering -- Hiroshi Nunokawa (Iwate Pref. Univ.), Hideaki Suzuki (North Asia Univ.), Kiwamu Sato, Naohito Ogasawara (Iwate Pref. Univ.) SITE2013-52 |
The E-mail has long history and it is widely spread media in the Internet. Therefore, in many cases, the education about... [more] |
SITE2013-52 pp.79-84 |
ET |
2013-11-22 15:50 |
Fukushima |
Aizu University |
Design of Methods for Extracting the E-mail Discussion Processes Considering Diversity of Response Granularity Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga (Fukushima Univ.), Youzou Miyadera, Setsuo Yokoyama (Tokyo Gakugei Univ.), Shoichi Nakamura (Fukushima Univ.) ET2013-67 |
Discussion using e-mail is frequently conducted in intelligent works such as research activity. Although it is important... [more] |
ET2013-67 pp.53-58 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2013-09-02 11:00 |
Tottori |
|
Entropy and non-Additivity Masaru Tanaka (Fukuoka Univ.) PRMU2013-39 IBISML2013-19 |
Here we give an entropy through a contraction of a renormalized $tau$-log-likelihood with $tau = 1 - s$ and a negative $... [more] |
PRMU2013-39 IBISML2013-19 pp.39-46 |
IA, ICSS |
2013-06-20 16:50 |
Niigata |
Ao-re Nagaoka |
Operation and Issues of E-Mail System in Okayama University Nariyoshi Yamai, Kiyohiko Okayama, Takaoki Fujiwara, Yoshihiro Ohsumi (Okayama Univ.) IA2013-8 ICSS2013-8 |
Okayama University has been operating student e-mail systems using Gmail since April 2009. As for teachers, we have sta... [more] |
IA2013-8 ICSS2013-8 pp.43-48 |
SANE, SAT (Joint) |
2013-02-22 11:20 |
Okinawa |
Youth Center of Okinawa prefecture |
Optimization of Monopulse Angle Accuracy Based on Cramer-Rao Lower Bound Ryuhei Takahashi, Teruyuki Hara (Mitsubishi Electric Corp.) SANE2012-156 |
Monopulse angle estimation technique is widely used in phased array radar systems. Conventional monopulse angle accuracy... [more] |
SANE2012-156 pp.43-48 |
LOIS, IPSJ-CN, IPSJ-SPT |
2012-05-17 14:30 |
Chiba |
Chiba Institute of Technology |
A Proposal for Adding a Memo Function to E-mail Systems Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo) LOIS2012-1 |
As is often the case with the office workers in, for example, the customer relations department, they need to share meta... [more] |
LOIS2012-1 pp.49-54 |
SSS |
2012-03-16 15:40 |
Tokyo |
Meiji Univ. |
Targeted Email Attack Takehiko Nakayama (National Police Agency) SSS2011-29 |
Targeted e-mail attack is a form of attacks sending malicious e-mail to specific individual or company and it is very hu... [more] |
SSS2011-29 pp.17-18 |
MSS |
2012-03-08 15:15 |
Tokyo |
JAIST Tokyo Satellite |
Effect of the improvement on classification performance of the filtering system based on Baysian and decision tree methods Hiroyuki Yamaguchi, Manabu Sugii, Hiroshi Matsuno (Yamaguchi Univ.) MSS2011-76 |
Recent increase of spam mails is a serious problem in the Internet. bsfilter is one of the most well-used spam filters i... [more] |
MSS2011-76 pp.23-28 |
IN |
2012-01-26 15:20 |
Hokkaido |
Asahikawa-Terminal-Hotel |
A Survey on Immediacy of Mail Transfers from Mobile-phones Tohru Asami, Manabu Isomura, Wei Zhu, Yoshihiro Kawahara (Todai) IN2011-125 |
At the Tohoku Earthquake on 11 March 2011, mobile operators applied originator regurations from 70% to 90% to their pho... [more] |
IN2011-125 pp.29-34 |
ET |
2011-11-04 14:15 |
Okinawa |
|
Algorithms for Extracting Email-based Discussions Processes with Diverse Description Styles Hiroki Nakayama, Ryo Onuma (Fukushima Univ.), Youzou Miyadera, Setsuo Yokoyama (Tokyo Gakugei Univ.), Shoichi Nakamura (Fukushima Univ.) ET2011-62 |
Discussion using e-mail is frequently conducted in intelligent works such as research activity. Although there have been... [more] |
ET2011-62 pp.37-42 |
WIT |
2011-05-21 14:30 |
Niigata |
Niigata Univ. |
Development of a Route Guidance System for Blind Pedestrians George Akiyama, Tetsuya Watanabe, Ken Watanabe, Toshimitsu Yamaguchi (Niigata Univ.), Kazunori Minatani (DNC), Manabi Miyagi (Tsukuba Univ. Tech.), Susumu Oouchi (NISE) WIT2011-18 |
We developed a route guidance automatic creating system to help blind people know their route by speech. The route guida... [more] |
WIT2011-18 pp.97-100 |
IN, NS (Joint) |
2011-03-04 08:50 |
Okinawa |
Okinawa Convention Center |
Encrypted E-mail sharing system with multi-forwarding Fubuki Kubota, Taiichi Saito (Tokyo Denki Univ) NS2010-243 |
Proxy Re-Encryption scheme allows a proxy to transform a ciphertext computed with Alice's public key into one that can b... [more] |
NS2010-243 pp.445-448 |
ET |
2010-11-26 10:55 |
Tokyo |
Tokyo Institute of Technology |
Development of a Support System for Grasping Discussion Processes from E-mails Hiroki Nakayama (Fukushima Univ.), Youzou Miyadera, Setsuo Yokoyama (Tokyo Gakugei Univ.), Shoichi Nakamura (Fukushima Univ.) ET2010-52 |
This research aims to develop support methods for grasping discussion transition processes from e-mails. This paper main... [more] |
ET2010-52 pp.19-24 |
IA |
2010-11-24 15:35 |
Yamanashi |
Seisen-Ryo |
Design of a Certified E-mail System without a Trusted Third Party Satoshi Ishibashi, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) IA2010-54 |
These days, as e-mails become more and more important, the demand for certified e-mail is growing. Methods for certified... [more] |
IA2010-54 pp.19-24 |