IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 40  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS 2024-03-14
13:40
Okinawa Okinawa Pref Danjyo-Kyoudou-Sankaku Center
(Primary: On-site, Secondary: Online)
LOIS2023-64 Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] LOIS2023-64
pp.96-101
SIS 2023-03-02
13:30
Chiba Chiba Institute of Technology
(Primary: On-site, Secondary: Online)
An image watermarking method using adversarial perturbations
Sei Takano, Mitsuji Muneyasu, Soh Yoshida (Kansai Univ.) SIS2022-43
The performance of convolutional neural networks (CNNs) has been dramatically improved in recent years, and they have at... [more] SIS2022-43
pp.15-20
ICSS, IPSJ-SPT 2022-03-08
15:30
Online Online Verifying concept of personalized malware by investigating end-user environments
Daigo Ichikawa, Rui Tanabe, XU Haoyuan, Yoshioka Katsunari, Matsumoto Tsutomu (YNU) ICSS2021-83
Personalized malware conducts malicious activities only when it is running on the target environment. Previous studies h... [more] ICSS2021-83
pp.147-152
ICSS, IPSJ-SPT 2021-03-01
11:30
Online Online Method of Similarity Evaluation among Incidents for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] ICSS2020-31
pp.31-36
ICSS, IPSJ-SPT 2021-03-01
11:55
Online Online Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] ICSS2020-32
pp.37-42
ICSS, IPSJ-SPT 2021-03-02
10:25
Online Online Proof of concept of sandbox evasion attack using email address stored in target machine
Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] ICSS2020-57
pp.184-189
ICSS 2020-11-26
15:00
Online Online Initial Study of Incident Response Support System for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] ICSS2020-22
pp.17-20
ICSS 2020-11-26
15:25
Online Online Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more]
ICSS2020-23
pp.21-25
CS, IN, NS, NV
(Joint)
2020-09-11
09:25
Online Online A virtual-network replacing scheme for achieving a metabolic network
Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2020-24
A future targeted attacks would infect a network with a malware program and then tampers packet-forwarding routes. As a ... [more] IN2020-24
pp.13-18
CS, IN, NS, NV
(Joint)
2020-09-11
09:50
Online Online An edge-router replacing scheme for achieving a metabolic network
Yuta Miyaoka, Yu Tamura, Junichi Murayama (Tokai Univ.) IN2020-25
A future cyber attack would tampers packet-forwarding routes of a target network using malware programs. As a solution a... [more] IN2020-25
pp.19-24
NS, IN
(Joint)
2020-03-05
11:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
An inheritance scheme of dynamic routing information for achieving successive replacing of virtual routers
Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2019-93
In future targeted attacks, malware programs infected in routers may cause various problems. Thus, we have proposed a sc... [more] IN2019-93
pp.103-108
NS, ICM, CQ, NV
(Joint)
2019-11-21
16:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Trends and Countermeasures of Cyber Attacks -- Introduction to Cyber Security for Network Engineers --
Yukiko Yano (NEC) CQ2019-93
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] CQ2019-93
p.27
NS, IN, CS, NV
(Joint)
2019-09-06
11:15
Miyagi Research Institute of Electrical Communication, Tohoku Univ. A Study on Features Derived from Cache Property for DNS Tunneling Detection
Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] NS2019-93
pp.25-30
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
10:20
Kochi Kochi University of Technology An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
pp.7-14
AI 2019-07-22
16:30
Hokkaido   Modeling of Cyber Attack Based on POMDP
Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] AI2019-15
pp.77-82
ICSS 2018-11-21
16:05
Kagoshima   [Invited Talk] Security Countermeasure at ShowNet in Interop Tokyo 2018
Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) ICSS2018-59
Cyber attacks become emerging threats on the Internet.We held an exhibition in ICT called Interop Tokyo every June. In t... [more] ICSS2018-59
p.37
ICSS, IPSJ-SPT 2018-03-07
15:40
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Preliminary Study on Defining Malignant Activity by Linking in-System Elements
Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-60
In recent years, cyber-attacks have become large-scale and complicated, and the impact on society continues to become in... [more] ICSS2017-60
pp.55-60
ICSS, IPSJ-SPT 2018-03-08
11:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Classification for Important Decoy Documents Based on Supervised Learning
Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-72
In recent targeted e-mail attacks, attackers often send their target organization an email with a malware disguised as a... [more] ICSS2017-72
pp.127-132
NS, IN
(Joint)
2018-03-01
09:20
Miyazaki Phoenix Seagaia Resort A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] IN2017-90
pp.5-10
RCS, IN, NV
(Joint)
2017-05-12
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] IN2017-5
pp.21-24
 Results 1 - 20 of 40  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan