Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, IN (Joint) |
2020-12-15 10:50 |
Online |
Online |
Development of an Intrusion Detection System Utilizing Social Network Analysis Principles James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29 |
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] |
IA2020-29 pp.18-21 |
ICSS |
2020-11-26 15:25 |
Online |
Online |
Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23 |
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more] |
ICSS2020-23 pp.21-25 |
COMP, IPSJ-AL |
2020-05-09 09:30 |
Online |
Online |
On Power and limitation of adversarial example attacks Kouichi Sakurai (Kyushu Univ.) COMP2020-5 |
A risk of adversarial example attacks which cause deep learning to make wrong decisions is getting serious even from a c... [more] |
COMP2020-5 pp.33-36 |
ICSS, IPSJ-SPT |
2020-03-03 09:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85 |
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] |
ICSS2019-85 pp.103-108 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 16:00 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Trends and Countermeasures of Cyber Attacks
-- Introduction to Cyber Security for Network Engineers -- Yukiko Yano (NEC) CQ2019-93 |
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] |
CQ2019-93 p.27 |
KBSE, SC |
2019-11-08 13:30 |
Nagano |
Shinshu University |
Malicious Domain Names Detection Based on TF-IDE and Variational Autoencoder: Classification with Quantum-enhanced Support Vector Machine Yuwei Sun (UTokyo), Ng S. T. Chong (UNU), Hideya Ochiai (UTokyo) KBSE2019-26 SC2019-23 |
With the development of network technology, the use of domain name system (DNS) becomes common. However, the attacks on ... [more] |
KBSE2019-26 SC2019-23 pp.19-23 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 10:20 |
Kochi |
Kochi University of Technology |
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 |
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] |
ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 pp.7-14 |
AI |
2019-07-22 16:30 |
Hokkaido |
|
Modeling of Cyber Attack Based on POMDP Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15 |
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] |
AI2019-15 pp.77-82 |
CS, CQ (Joint) |
2019-04-18 09:20 |
Osaka |
Osaka Univ. Library |
Dynamic Redundancy Switching Method of Network Paths for Tamper-Tolerant Networked Control Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CS2019-1 |
According to the growing of information and communication technology (ICT), various kinds of things are connected to the... [more] |
CS2019-1 pp.1-6 |
IBISML |
2019-03-05 17:00 |
Tokyo |
RIKEN AIP |
A Study on Automatic Generation of False Data Injection Attack against Connected Car Service Based on Reinforcement Learning Yuichiro Dan, Keita Hasegawa, Takafumi Harada, Tomoaki Washio, Yoshihito Oshima (NTT) IBISML2018-109 |
While the connected car is predicted to prevail by 2025, the appearance of novel cyber attacks is concerned. In this pap... [more] |
IBISML2018-109 pp.31-38 |
IN, NS (Joint) |
2019-03-05 11:30 |
Okinawa |
Okinawa Convention Center |
A study on Maliciousness Measurement in Cyber Threat Intelligence Using Graph Convolutional Networks Yuta Kazato, Yoshihide Nakagawa, Yuichi Nakatani (NTT) IN2018-128 |
Cyber threat information (CTI) sharing is one of the important functions to protect end-users and services from cyber-at... [more] |
IN2018-128 pp.265-270 |
IN, NS (Joint) |
2019-03-05 14:10 |
Okinawa |
Okinawa Convention Center |
Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2018-271 pp.455-460 |
ICSS |
2018-11-21 16:05 |
Kagoshima |
|
[Invited Talk]
Security Countermeasure at ShowNet in Interop Tokyo 2018 Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) ICSS2018-59 |
Cyber attacks become emerging threats on the Internet.We held an exhibition in ICT called Interop Tokyo every June. In t... [more] |
ICSS2018-59 p.37 |
ICSS |
2018-11-22 11:15 |
Kagoshima |
|
[Invited Talk]
An Overview of Cyber Security for Connected Vehicles Junko Takahashi (NTT) ICSS2018-63 |
This paper presents an overview of cyber security for connected vehicles based on the recent previous studies of vehicle... [more] |
ICSS2018-63 pp.55-59 |
SITE, ISEC, LOIS |
2018-11-04 10:00 |
Fukuoka |
|
Introduction of PKI Electronic Authentication for Important IoT Devices
-- For Establishment of Secure IoT Platform -- Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32 |
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] |
ISEC2018-72 SITE2018-50 LOIS2018-32 pp.45-50 |
CS |
2018-07-12 17:00 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
[Special Invited Talk]
Cyber Security: Lessons Learned from Actual Cases
-- Recent Trends of Cyber Attacks and Effective Approaches -- Hiroo Suzuki, Tetsushi Morita (NTT) CS2018-34 |
In 5G/IoT era, cyber security is an indispensable element for the sound development of digital economy utilizing informa... [more] |
CS2018-34 p.109 |
ASN, NS, RCS, SR, RCC (Joint) |
2018-07-11 13:10 |
Hokkaido |
Hakodate Arena |
[Encouragement Talk]
Proposal of Automatic Data Collection and Repository Generation for Statistical Analysis and Visualization of Dark Web Markets Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2018-41 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2018-41 pp.25-30 |
NS, OCS, PN (Joint) |
2018-06-14 13:00 |
Fukushima |
Koriyama-Shoko-Kaigisho |
[Invited Talk]
Cyber security defense techniques for IoT systems Hiroaki Mukai, Testuya Yokotani (KIT) NS2018-27 OCS2018-10 PN2018-10 |
n recent years, with the development of AI technology, IoT technique is adopted in various fields such as plant, logisti... [more] |
NS2018-27 OCS2018-10 PN2018-10 p.1(NS), p.1(OCS), p.37(PN) |
NS, IN (Joint) |
2018-03-01 11:30 |
Miyazaki |
Phoenix Seagaia Resort |
Statistical Analysis on Dark Web Market Focusing on DDoS/Botnet Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2017-182 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2017-182 pp.85-90 |
NS, IN (Joint) |
2018-03-02 14:40 |
Miyazaki |
Phoenix Seagaia Resort |
Development of an Emulation System for Autonomous and Distributed Internet Security Infrastructure Masaya Shimode, Tomohiro Akasaki, Hiroyuki Kimiyama, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-236 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" for protecting our resources on the Inte... [more] |
NS2017-236 pp.385-390 |