Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2017-03-14 11:20 |
Nagasaki |
University of Nagasaki |
Graph based Detection of Advanced Persistent Threat on LAN Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT) ICSS2016-65 |
Recently the countermeasures against continuously increasing Advanced Persistent Threats(APT) are urgently necessary.
I... [more] |
ICSS2016-65 pp.153-158 |
ICSS, IPSJ-SPT |
2017-03-14 11:45 |
Nagasaki |
University of Nagasaki |
Representation for Attack Activity to Associate Threat Information Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64 |
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] |
ICSS2016-64 pp.147-152 |
IA, IN (Joint) |
2016-12-16 13:20 |
Hiroshima |
Hiroshima city university |
A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82 |
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] |
IN2016-82 pp.91-96 |
ICSS |
2016-11-25 14:40 |
Kanagawa |
Institute of Information Security |
A fuzz testing method cooperated with threat modeling Yasuhiko Nishio, Tadashi Shiroma (CCDS), Hiroyuki Inoue (CCDS/HCU) ICSS2016-41 |
The purpose of this study is to develop a fuzz testing method that can ensure the IoT security especially automotive sys... [more] |
ICSS2016-41 pp.15-20 |
ASN |
2016-05-12 13:00 |
Tokyo |
|
[Invited Talk]
IoT Hiroyuki Baba (Tokyo University) |
Challenges for the prompt realization of IoT will be shown at this presentation which is based on study of HEMS, a use c... [more] |
|
ICSS, IPSJ-SPT |
2016-03-04 10:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) ICSS2015-62 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
ICSS2015-62 pp.89-94 |
IA |
2015-11-12 16:00 |
Chiba |
NARITA VIEW HOTEL |
Enhancing performance of cardinality analysis for faster network Shinichi Mori, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2015-52 |
Cardinality in network flow data gives useful information for network administrators about suspicious communication on t... [more] |
IA2015-52 pp.81-85 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 13:50 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Study on Application of Measure Behavior Intention Model for Information Security into Security Action Cyc Noriaki Yoshikai (Nihon Univ.) ISEC2015-16 SITE2015-14 ICSS2015-26 EMM2015-24 |
In order to operate information security system safely and normally, it is necessary to realize the information security... [more] |
ISEC2015-16 SITE2015-14 ICSS2015-26 EMM2015-24 pp.81-86 |
IA, ICSS |
2015-06-12 10:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Experimental Results on an Attack Detection System for Advanced Persistent Threats Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9 |
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] |
IA2015-9 ICSS2015-9 pp.45-50 |
IA |
2014-10-07 16:55 |
Osaka |
Grand Front OSAKA Tower-B 10F |
Recent cyber attack methodology and protection
-- The Consideration based on Interop Tokyo 2014 ShowNet Security -- Ken Hashimoto (FireEye), Takashi Tomine (NICT), Yuji Sekiya (Univ. of Tokyo) IA2014-33 |
In social activities and daily life, a share of activities from the Internet has been gotten higher. Due to that changes... [more] |
IA2014-33 pp.51-56 |
ICSS, IPSJ-SPT |
2014-03-28 10:15 |
Okinawa |
Meio Univiersity |
MATATABI: Multi-layer Threat Analysis Platform with Hadoop Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77 |
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] |
ICSS2013-77 pp.113-118 |
ICSS, IPSJ-SPT |
2014-03-28 11:15 |
Okinawa |
Meio Univiersity |
Timeline-Based Event Log Viewer over Multi-Host Environment Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79 |
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more] |
ICSS2013-79 pp.125-130 |
ISEC, IT, WBS |
2014-03-10 10:35 |
Aichi |
Nagoya Univ., Higashiyama Campus |
An XML Based Document Management Framework to Prevent Data Leakage Kamran Morovati (Univ. of pune), Sanjay Kadam (C-DAC) IT2013-58 ISEC2013-87 WBS2013-47 |
This paper proposes a secure document management framework to reduce the risk of unauthorized data disclosure in an orga... [more] |
IT2013-58 ISEC2013-87 WBS2013-47 pp.27-34 |
LOIS |
2014-03-08 16:20 |
Okinawa |
|
Linkable System Using Encrypted Personal Identification Information for Clinical Research Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79 |
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] |
LOIS2013-79 pp.149-154 |
KBSE |
2013-09-13 15:00 |
Tokyo |
The University of Electro-Communications |
A classification method in identifying security patterns for a dependable Security Case
-- From Security Patterns to D-Case -- Vaise Patu, Nada Olayan, Shuichiro Yamamoto (Nagoya Univ.) KBSE2013-52 |
Today's software systems are facing new and complicated challenges in confronting with security issues. There are lots o... [more] |
KBSE2013-52 pp.91-96 |
SITE, IPSJ-EIP |
2013-05-16 11:00 |
Kanagawa |
Institute of Infomation Security |
Empirical study on cognitive effect about threat data for information security Noriaki Yoshikai, Hiroaki Kanda, Sho Hamatsu, Mayako Sato, Shun-ichi Kurino (Nihon Univ.) SITE2013-2 |
We have collected the data on psychology and action of a person under a virus infection environment, by a questionnaire ... [more] |
SITE2013-2 pp.5-10 |
SS |
2013-05-09 14:40 |
Kagawa |
Kagawa University (Saiwaimachi) |
Detection of Security Threats Using Patterns of Sequence Diagrams Tatsuya Abe, Shinpei Hayashi, Motoshi Saeki (Tokyo Inst. of Tech.) SS2013-1 |
Detecting security threats of information system in design phase helps to develop secure systems. However, the more thre... [more] |
SS2013-1 pp.1-6 |
IMQ |
2012-07-27 13:00 |
Aichi |
Nagoya University, Venture Business Laboratory |
[Special Talk]
An innate threat detection system in the human brain
-- Scale is the key to fear for snake -- Nobuyuki Kawai (Nagoya Univ.) IMQ2012-7 |
Humans are afraid of specific stimuli, such as angry faces and snakes. It has been a long debate on whether such fear re... [more] |
IMQ2012-7 pp.1-6 |
HIP |
2009-12-17 16:10 |
Miyagi |
RIEC |
The influence of darkness on recognition of facial expressions Satoshi Nakashima, Yuko Morimoto, Sakiko Yoshikawa (Kyoto Univ.) HIP2009-103 |
We examined the effects of darkness on recognition of facial expression. Participants were shown a set of unfamiliar fac... [more] |
HIP2009-103 pp.41-46 |
ICM |
2009-05-28 13:25 |
Kagawa |
Kagawa University |
Security management for university network in distributed environment
-- An Approach of Kagawa University for Security-based Computer Network Management in Distributed Campus Environment -- Kazuyoshi Kawauchi, Kazutoshi Sone, Masahide Kawaguchi, Takanori Doi, Yoshiro Imai, Zengo Furukawa (Kagawa Univ.) ICM2009-2 |
This report presents an approach of security measures for Kagawa University and its results during a few months monitori... [more] |
ICM2009-2 pp.7-10 |