Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SC |
2023-03-17 15:15 |
Tokyo |
NII (Primary: On-site, Secondary: Online) |
Simple Display System of Indoor Crowding Status for Restraint of Infection Yuzuki Kato, Kento Abe, Yuya Aoki, Kosuke Tashiro, Haruki Nagasawa, Keita Hishiya, Sosuke Fujisawa, Naoto Hoshikawa (NIT,Oyama Col.) SC2022-47 |
In modern times, the novel coronavirus has been spreading and to prevent the spread, entry restrictions are being impose... [more] |
SC2022-47 pp.50-54 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66 |
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more] |
ICSS2022-66 pp.109-114 |
SC |
2022-05-27 11:20 |
Online |
Online |
Developing a Secure Streaming System of Clinic Site for Medical Education Sinan Chen, Masahide Nakamura, Kenji Sekiguchi (Kobe Univ.) SC2022-5 |
Clinical practice in the outpatient consultation room is restricted due to the COVID-19 control measures, resulting in t... [more] |
SC2022-5 pp.25-30 |
IA, ICSS |
2021-06-22 09:00 |
Online |
Online |
Feature analysis of phishing website and phishing detection based on machine learning algorithms Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9 |
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] |
IA2021-9 ICSS2021-9 pp.44-49 |
IA, ICSS |
2021-06-22 09:25 |
Online |
Online |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
ICM |
2021-03-19 11:15 |
Online |
Online |
A Proposal for Improving the Accuracy of Anomaly Detection by Focusing on Response Time in Web Services Tatsuo Kumano, Naoyoshi Ohkawa, Hiroshi Fujita (Fujitsu Labs), Takuya Yoshikawa (Cybozu), Hitoshi Ueno (Fujitsu Labs) ICM2020-70 |
In web services, usability decreases and user satisfaction declines when the response time is longer than usual. Operato... [more] |
ICM2020-70 pp.58-63 |
KBSE |
2021-03-05 13:35 |
Online |
Online |
A Method to Visualize Log Files for Analyzing Unexpected Behavior of Web Applications Hiroki Kasai (Shinshu Univ), Satoshi Yazawa (VR), Shinpei Ogata, Kozo Okano (Shinshu Univ) KBSE2020-35 |
In order for developers and maintainers to understand the situation in which their Web applications behaved unexpectedly... [more] |
KBSE2020-35 pp.7-12 |
ICSS, IPSJ-SPT |
2021-03-02 09:35 |
Online |
Online |
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55 |
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] |
ICSS2020-55 pp.172-177 |
ICSS, IPSJ-SPT |
2020-03-03 09:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A research of HTTP request and an identification method of fake User-Agent values Masato Inoue, Masaki Hashimoto (IISEC) ICSS2019-83 |
Almost all websites that are open to the public are subject to scan and attack, and have received a lot of anomaly reque... [more] |
ICSS2019-83 pp.91-96 |
HCS |
2018-01-27 12:20 |
Kagoshima |
Daiichi Institute of Technology |
Manifestations of user personality in behavior on Web surfing Akihiro Kobayashi, Atsunori Minamikawa, Chihiro Ono (KDDI) HCS2017-84 |
It is useful to estimate psychographic information such as personality and preference from the Web access log in order t... [more] |
HCS2017-84 pp.101-106 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:15 |
Tokyo |
|
A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 |
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] |
ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 pp.33-38 |
ET |
2017-05-27 11:05 |
Tokyo |
Soka Univ. |
Support Environnment and Practices of Hacking Competition with Attack and Defense Style on a Game Website
-- Functions of a Trial Version and Discussions about the Result -- Makoto Nakaya (Kagawa Univ.), Masahiro Okawa (JAIST), Masahiro Nakajima (Irvine Systems), Hiroyuki Tominaga (Kagawa Univ.) ET2017-2 |
Practical education about information security is needed for system developers and administrators in Web service supplie... [more] |
ET2017-2 pp.7-12 |
ICSS, IPSJ-SPT |
2017-03-14 10:20 |
Nagasaki |
University of Nagasaki |
Assignment and Solution regarding Access Control of a Camera on a Computer Yuri Yoshino, Masaki Inamura (TDU) ICSS2016-63 |
Since macOS does not display a confirmation dialog to the user when applications access a webcam, an attacker can watch ... [more] |
ICSS2016-63 pp.141-146 |
SC |
2016-11-04 11:05 |
Hyogo |
Takigawa Memorial Hall, Kobe Univ. |
On Eliciting RESTful API Resources from Existing Applications Shridhar Choudhary, Kosaku Kimura, Atsuji Sekiguchi (Fujitsu Labs) SC2016-20 |
Restful API is the modern approach for exposing service data to use for applications.
But deciding restful API URIs fro... [more] |
SC2016-20 pp.7-12 |
CS, CQ, NV (Joint) |
2016-04-22 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Flash Crowd Mitigation via Feedback to Users on Web services Harumasa Tada (Kyoto Univ. of Education), Masayuki Murata (Osaka Univ.), Masaki Aida (Tokyo Metropolitan Univ.) CQ2016-10 |
A flash crowd is a sudden surge in accesses to a web service. Conventional ways to manage flash crowds, such as dropping... [more] |
CQ2016-10 pp.55-60 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2016-03-08 09:45 |
Okinawa |
|
Diagnosing Performance of WEB Applications on PaaS Cloud Environments Tatsuma Matsuki, Naoki Matsuoka (Fujitsu Labs Ltd.) CQ2015-136 |
Cloud servies have made large contributions to the agile WEB application developments. The performance of WEB applicatio... [more] |
CQ2015-136 pp.159-164 |
WIT, HI-SIGACI |
2015-12-09 09:50 |
Tokyo |
AIST Tokyo Waterfront |
Enhancing Web Accessibility for Low Vision Users using Eye Tracking Rie Kamikubo, Keita Higuchi, Ryo Yonetani (UTokyo), Hideki Koike (TITECH), Yoichi Sato (UTokyo) WIT2015-75 |
Low vision users with limited peripheral visual field are significantly challenged in making efficient scan path over a ... [more] |
WIT2015-75 pp.65-70 |
IE, ITE-ME, ITE-AIT [detail] |
2015-11-12 15:20 |
Kumamoto |
|
Browser Visualization using PNGs Generated by HTML5 Workers on Multicore Marat Zhanikeev (Kyutech) IE2015-76 |
Earlier research has discussed two related technologies, namely (1) multisource content aggregation method and its brows... [more] |
IE2015-76 pp.19-22 |
WIT |
2015-08-25 15:15 |
Nagano |
Shinshu University Faculty of Engineering |
A Survey of Web Accessibility in the National Colleges of Technology Kazue Hiranaka (NIT, Ube College), Akihiro Motoki (Tsurumi Univ.) WIT2015-39 |
In this paper, we evaluated the web accessibility of 58 organizations, including the National Institute of Technology an... [more] |
WIT2015-39 pp.19-22 |
WIT |
2014-09-12 17:00 |
Hyogo |
Kobe Univ. Kusunoki Campus |
A Survey of the Longitudinal Changes of Web Accessibility in the Public Libraries Akihiro Motoki, Yuuri Suzuki, Mika Kitamura (Tsurumi Univ.) WIT2014-25 |
While accessibility surveys have been conducted for a number of organizational websites, continuous accessibility evalua... [more] |
WIT2014-25 pp.35-38 |