Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE |
2019-03-02 10:00 |
Kyoto |
Doshisha University Kambaikan |
Effectiveness and efficiency evaluation based on operation logs of learned Web site Ryota Aoki, Shinpei Ogata, Kozo Okano (Shinshu Univ) KBSE2018-64 |
Web usability in business applications is crucial for enhancing productivity.
We have proposed an evaluation framework ... [more] |
KBSE2018-64 pp.63-68 |
TL |
2018-07-28 16:40 |
Tokyo |
Keio University |
JESPR: An open-source library for web-based self-paced reading tasks Ralph L. Rose (Waseda Univ.) TL2018-23 |
JESPR is a freely-available open-source library for administering self-paced reading task experiments through a web brow... [more] |
TL2018-23 pp.53-58 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Predicting Website Abuse Using Update Histories Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) ICSS2017-73 |
Threats of abusing websites that webmasters abandoned updates has increased.
In this paper, we propose a method of pred... [more] |
ICSS2017-73 pp.133-138 |
ICSS, IPSJ-SPT |
2018-03-08 12:00 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Analyzing web application vulnerability reports by machine learning Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com) ICSS2017-74 |
Web application vulnerability testing is important for preventing cyberattacks. However, it is difficult to test all URL... [more] |
ICSS2017-74 pp.139-144 |
IA |
2017-11-16 14:15 |
Overseas |
KMITL, Bangkok, Thailand |
Xilara: XSS audItor using htmL templAte restoRAtion Keitaro Yamazaki, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-49 |
Mitigating Cross Site Scripting (XSS) is important to protect user's sensitive data in the web applications.
XSS mitiga... [more] |
IA2017-49 pp.89-94 |
ICSS, IPSJ-SPT |
2017-03-14 09:55 |
Nagasaki |
University of Nagasaki |
Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-59 |
A host-based intrusion detection is an approach for detecting critical web attacks. Because anomaly detection is leverag... [more] |
ICSS2016-59 pp.117-122 |
ICSS, IPSJ-SPT |
2017-03-14 10:20 |
Nagasaki |
University of Nagasaki |
Attack Pattern Extraction by Clustering Parameters Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-60 |
Web Application Firewall (WAF) is widely used to detect attacks against Web applications. New sorts of attacks occurs da... [more] |
ICSS2016-60 pp.123-128 |
ICSS, IPSJ-SPT |
2017-03-14 10:20 |
Nagasaki |
University of Nagasaki |
Assignment and Solution regarding Access Control of a Camera on a Computer Yuri Yoshino, Masaki Inamura (TDU) ICSS2016-63 |
Since macOS does not display a confirmation dialog to the user when applications access a webcam, an attacker can watch ... [more] |
ICSS2016-63 pp.141-146 |
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2017-02-20 10:15 |
Hokkaido |
Hokkaido Univ. |
Development and Management of Voice Reading Web site for the Visually Impaired Azusa Fujita, Mizuki Shimakage, Nobuo Ezaki (NIT Toba), Mitsuhide Ishikawa, Tomoaki Yamazaki (Tils) |
Gathering information has become easy for visually impaired people due to the screen reader that reads contents on displ... [more] |
|
MSS, SS |
2017-01-26 16:20 |
Kyoto |
Kyoto Institute of Technology |
A system for autocompleting a partial Web GUI testing code with user interaction capturing Manabu Nakajima, Yoshiaki Takata (Kochi Univ. of Tech.) MSS2016-66 SS2016-45 |
Programmable testing and capture-replay testing are two main categories of Web GUI testing. In the programmable testing,... [more] |
MSS2016-66 SS2016-45 pp.53-57 |
NS, RCS (Joint) |
2016-12-21 10:15 |
Ishikawa |
|
A Proposal of Radio Resource Control in LTE Base Stations Based on Predicting QoE Degradation. Motoki Morita, Taichi Kumagai, Takahiro Nobukiyo (NEC) RCS2016-209 |
It is important to maintain quality of user experience (QoE) in order to continuously use applications such as web or vi... [more] |
RCS2016-209 pp.13-18 |
IN, MoNA, CNR (Joint) |
2016-11-17 16:00 |
Kagoshima |
Kirishima-kanko Hotel |
[Invited Talk]
Trends of Web technology towards the IoT era and its applications to device Tomoyuki Shimizu (KDDI Research) IN2016-63 |
As HTML5 implementation of modern browsers had moved forward, web technology became a major platform as general-purpose ... [more] |
IN2016-63 pp.19-24 |
ISEC, LOIS, SITE |
2016-11-08 15:00 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
Data Output UI Specification Extraction using Differences of Texts in HTML Documents Daisuke Tashiro, Ryota Mibe (Hitachi) ISEC2016-67 SITE2016-57 LOIS2016-45 |
In a enterprise system redevelopment project, it is important to get correct specification of an existing system. Howev... [more] |
ISEC2016-67 SITE2016-57 LOIS2016-45 pp.89-94 |
SC |
2016-11-04 11:05 |
Hyogo |
Takigawa Memorial Hall, Kobe Univ. |
On Eliciting RESTful API Resources from Existing Applications Shridhar Choudhary, Kosaku Kimura, Atsuji Sekiguchi (Fujitsu Labs) SC2016-20 |
Restful API is the modern approach for exposing service data to use for applications.
But deciding restful API URIs fro... [more] |
SC2016-20 pp.7-12 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2016-03-08 09:45 |
Okinawa |
|
Diagnosing Performance of WEB Applications on PaaS Cloud Environments Tatsuma Matsuki, Naoki Matsuoka (Fujitsu Labs Ltd.) CQ2015-136 |
Cloud servies have made large contributions to the agile WEB application developments. The performance of WEB applicatio... [more] |
CQ2015-136 pp.159-164 |
ICSS, IPSJ-SPT |
2016-03-03 13:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Actual Survey on Web Scanning by URI Co-occurrence Detection Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51 |
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more] |
ICSS2015-51 pp.25-30 |
WIT, HI-SIGACI |
2015-12-09 15:50 |
Tokyo |
AIST Tokyo Waterfront |
Function enhancement of a versatile communication supporting Web system, VCAN Kento Hasegawa, Toyohiko Hayashi, Sigehito Tanahashi, Ryo Hatakeyama (Niigata Univ.), Satsuki Aoki (Shirone Ohdori HP), Nariyasu Fujikawa (Ginzado Ltd.) WIT2015-84 |
In order to support persons with communication disabilities, we have been developing a versatile voice-output communicat... [more] |
WIT2015-84 pp.131-136 |
LOIS, IE, EMM, IEE-CMN, ITE-ME [detail] |
2015-09-11 13:30 |
Aichi |
Nagoya University, Higashiyama Campus |
A Proposal of Recipe Conversion Algorithm for Cooking-Step Schedule Optimization Yukiko Matsushima, Nobuo Funabiki (Okayama Univ.) LOIS2015-27 IE2015-59 EMM2015-42 |
Previously, we proposed the cooking-step scheduling algorithm to minimize the required time for cooking multiple dishes ... [more] |
LOIS2015-27 IE2015-59 EMM2015-42 pp.67-72 |
IN, NS, CS, NV (Joint) |
2015-09-04 16:05 |
Iwate |
Iwate-ken Kokaido |
A Study on Network Architecture based on Architecture Evolution of the Internet Tetsuya Hishiki, Hiroshi Waki, Takumi Ohba, Arata Koike (NTT) IN2015-52 |
We focus on “middle entity”, which provides values to applications at the middle of end-to-end communication. We discuss... [more] |
IN2015-52 pp.69-74 |
CQ, CS (Joint) |
2015-04-22 14:25 |
Fukuoka |
Fukuoka Institute of Technology |
Analysis of User's Consciousness for video delivery applications Noriko Yoshimura, Hideki Nojiri, Akira Takahashi (NTT) CQ2015-15 |
Service design and management based on user's quality of experience (QoE) are important to offer high-user-satisfaction ... [more] |
CQ2015-15 pp.81-85 |