Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, ICTSSL, IEE-SMF |
2023-10-19 09:00 |
Fukuoka |
Fukuoka University |
Effects and Investigate Attack Messages on the IoT-ZTN System Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32 |
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] |
IN2023-32 pp.1-4 |
IA |
2023-09-21 16:30 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Performance Evaluation of Access Control Functions in IoT-ZTN System Gateway Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IA2023-17 |
With the increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks ... [more] |
IA2023-17 pp.38-42 |
R |
2018-05-25 14:25 |
Aichi |
Aichi Institute of Technology, Motoyama Campus |
Reliability consideration of a system with multiple-stage check policy Mitsuhiro Imaizumi (Aichi Gakusen Univ.), Mitsutaka Kimura (Gifu City Women's col.) R2018-2 |
This paper formulates a stochastic model for a system with illegal access. The server has the function of IDS, and illeg... [more] |
R2018-2 pp.7-12 |
ICSS |
2015-11-26 15:25 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Study on Rogue Access Point detection method Takaaki Hoyo, Atsushi Kanai (Hosei Univ.) ICSS2015-39 |
Wireless LAN access points are installed everywhere, it has become possible to connect to the Internet. While such acces... [more] |
ICSS2015-39 pp.25-30 |
IA, IN (Joint) |
2014-12-18 12:50 |
Hiroshima |
Hiroshima City University |
Detecting rogue access points by traffic analysis on both wireless and wired LAN Takehiro Kawata, Takeshi Yada (NTT) IN2014-91 |
We propose a novel method for detecting rogue access points(APs) of IEEE 802.11 wireless LAN connected to managed networ... [more] |
IN2014-91 pp.1-4 |
ICSS, IA |
2014-06-05 13:35 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
[Invited Talk]
A two-path authentication for protecting net banking against illegal access
-- How to prevent Man-In-The-Middle/Browser Attack -- Haruhiko Fujii (NTT) IA2014-1 ICSS2014-1 |
(To be available after the conference date) [more] |
IA2014-1 ICSS2014-1 pp.1-5 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 13:25 |
Shizuoka |
Shizuoka University |
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ) ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21 |
Security holes (vulnerabilities) in web applications causes security
incidents like personal information leakage and vi... [more] |
ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21 pp.123-129 |
IN |
2010-02-04 13:00 |
Okinawa |
|
Development of Invasion Prevention System with NIDS and Honeypot Tetsuya Higa, Tomokazu Nagata, Yuji Taniguchi, Shiro Tamaki (Univ. of Ryukyu) IN2009-126 |
In recent years, the Internet becomes necessary to social and business infrastructure. Moreover, the Internet in spread,... [more] |
IN2009-126 pp.1-4 |
CPM |
2009-08-11 13:55 |
Aomori |
Hirosaki Univ. |
FPGA implementation of a Wave-Pipelined Firewall Unit Keisuke Saito, Kei Ito, Shuya Imaruoka, Tomoaki Sato, Masa-aki Fukase (Hirosaki Univ.) CPM2009-48 |
We have been working on the development of H-HIPS by using a FPGA. A FPGA can change circuits information easily. But, i... [more] |
CPM2009-48 pp.77-81 |
SITE |
2007-11-02 15:05 |
Tokyo |
University of Electro-Communications |
Legal consideration on cryptographic research-groups' actions in case of finding vulnerability Yusuke Inomata, Kazuo Ohta, Noboru Kunihiro (UEC) SITE2007-42 |
We consider a research-group’s action in a case of finding a vulnerability of cryptographic protocol and/or products. W... [more] |
SITE2007-42 pp.15-20 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:20 |
Hokkaido |
Future University-Hakodate |
Orthogonal expansion of port-scan packets Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitachi) |
Observation of port-scan packets performed over the Internet is involved with so many parameters including time,
port ... [more] |
ISEC2007-51 pp.43-49 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:45 |
Hokkaido |
Future University-Hakodate |
Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai) |
We try to analyze access logs from multiple sensors to get information about distribution of malicious hosts. We use the... [more] |
ISEC2007-52 pp.51-56 |
R |
2007-05-18 14:00 |
Hiroshima |
Hiroshima University |
Proposal of the cyber attack detection model based on multivariate analysis Yuto Sakai (Hiroshima Univ), Koichiro Rinsaka (Kobe Gakuin Univ), Tadashi Dohi (Hiroshima Univ) R2007-8 |
In many computer network systems, in order to secure an information security, the intrusion detection systems (IDS) are ... [more] |
R2007-8 pp.1-6 |
CS, IN, NS (Joint) |
2005-09-15 10:15 |
Miyagi |
Tohoku Univ. |
A Detection Technique of Epidemic Worms using Clustering of Packet Payload Yuji Waizumi, Masashi Tsuji, Yoshiaki Nemoto (Tohoku Univ.) |
Global damages of information systems by epidemic worms
have been reported because the spreading speed of worms has be... [more] |
CS2005-19 pp.19-24 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 09:30 |
Iwate |
Iwate Prefectural University |
A Proposal of Worm Detection System by Taking a Statistics of Series of Packets to Honeypot Maki Kataoka, Yumiko Ishige (NTT Data Corporation), Nobutaka Mantani, Humiharu Ohashi (National Police Agency) |
A worm detection system tells us when an unknown worm occurs as well as its attributes. In the proposed system, traffic ... [more] |
ISEC2005-9 SITE2005-7 pp.1-6 |
NS |
2005-04-21 14:25 |
Aichi |
Nanzan-Univ. |
Design and Implementation of Anomaly Detection System with Classified Packet Counting Kunio Goto, Koji Kojima (Nanzan Univ.) |
In this research, practical application for quasi-realtime intrusion and network failure detection was designed and impl... [more] |
NS2005-4 pp.13-16 |