IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 48  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SC 2023-03-17
15:15
Tokyo NII
(Primary: On-site, Secondary: Online)
Simple Display System of Indoor Crowding Status for Restraint of Infection
Yuzuki Kato, Kento Abe, Yuya Aoki, Kosuke Tashiro, Haruki Nagasawa, Keita Hishiya, Sosuke Fujisawa, Naoto Hoshikawa (NIT,Oyama Col.) SC2022-47
In modern times, the novel coronavirus has been spreading and to prevent the spread, entry restrictions are being impose... [more] SC2022-47
pp.50-54
ICSS, IPSJ-SPT 2023-03-13
17:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more]
ICSS2022-66
pp.109-114
SC 2022-05-27
11:20
Online Online Developing a Secure Streaming System of Clinic Site for Medical Education
Sinan Chen, Masahide Nakamura, Kenji Sekiguchi (Kobe Univ.) SC2022-5
Clinical practice in the outpatient consultation room is restricted due to the COVID-19 control measures, resulting in t... [more] SC2022-5
pp.25-30
IA, ICSS 2021-06-22
09:00
Online Online Feature analysis of phishing website and phishing detection based on machine learning algorithms
Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] IA2021-9 ICSS2021-9
pp.44-49
IA, ICSS 2021-06-22
09:25
Online Online Analtsis of cost-effectiveness in malicious site detection using VirusTotal
Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more]
IA2021-10 ICSS2021-10
pp.50-55
ICM 2021-03-19
11:15
Online Online A Proposal for Improving the Accuracy of Anomaly Detection by Focusing on Response Time in Web Services
Tatsuo Kumano, Naoyoshi Ohkawa, Hiroshi Fujita (Fujitsu Labs), Takuya Yoshikawa (Cybozu), Hitoshi Ueno (Fujitsu Labs) ICM2020-70
In web services, usability decreases and user satisfaction declines when the response time is longer than usual. Operato... [more] ICM2020-70
pp.58-63
KBSE 2021-03-05
13:35
Online Online A Method to Visualize Log Files for Analyzing Unexpected Behavior of Web Applications
Hiroki Kasai (Shinshu Univ), Satoshi Yazawa (VR), Shinpei Ogata, Kozo Okano (Shinshu Univ) KBSE2020-35
In order for developers and maintainers to understand the situation in which their Web applications behaved unexpectedly... [more] KBSE2020-35
pp.7-12
ICSS, IPSJ-SPT 2021-03-02
09:35
Online Online An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log
Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] ICSS2020-55
pp.172-177
ICSS, IPSJ-SPT 2020-03-03
09:10
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
A research of HTTP request and an identification method of fake User-Agent values
Masato Inoue, Masaki Hashimoto (IISEC) ICSS2019-83
Almost all websites that are open to the public are subject to scan and attack, and have received a lot of anomaly reque... [more] ICSS2019-83
pp.91-96
HCS 2018-01-27
12:20
Kagoshima Daiichi Institute of Technology Manifestations of user personality in behavior on Web surfing
Akihiro Kobayashi, Atsunori Minamikawa, Chihiro Ono (KDDI) HCS2017-84
It is useful to estimate psychographic information such as personality and preference from the Web access log in order t... [more] HCS2017-84
pp.101-106
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
10:15
Tokyo   A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments
Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
pp.33-38
ET 2017-05-27
11:05
Tokyo Soka Univ. Support Environnment and Practices of Hacking Competition with Attack and Defense Style on a Game Website -- Functions of a Trial Version and Discussions about the Result --
Makoto Nakaya (Kagawa Univ.), Masahiro Okawa (JAIST), Masahiro Nakajima (Irvine Systems), Hiroyuki Tominaga (Kagawa Univ.) ET2017-2
Practical education about information security is needed for system developers and administrators in Web service supplie... [more] ET2017-2
pp.7-12
ICSS, IPSJ-SPT 2017-03-14
10:20
Nagasaki University of Nagasaki Assignment and Solution regarding Access Control of a Camera on a Computer
Yuri Yoshino, Masaki Inamura (TDU) ICSS2016-63
Since macOS does not display a confirmation dialog to the user when applications access a webcam, an attacker can watch ... [more] ICSS2016-63
pp.141-146
SC 2016-11-04
11:05
Hyogo Takigawa Memorial Hall, Kobe Univ. On Eliciting RESTful API Resources from Existing Applications
Shridhar Choudhary, Kosaku Kimura, Atsuji Sekiguchi (Fujitsu Labs) SC2016-20
Restful API is the modern approach for exposing service data to use for applications.
But deciding restful API URIs fro... [more]
SC2016-20
pp.7-12
CS, CQ, NV
(Joint)
2016-04-22
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. Flash Crowd Mitigation via Feedback to Users on Web services
Harumasa Tada (Kyoto Univ. of Education), Masayuki Murata (Osaka Univ.), Masaki Aida (Tokyo Metropolitan Univ.) CQ2016-10
A flash crowd is a sudden surge in accesses to a web service. Conventional ways to manage flash crowds, such as dropping... [more] CQ2016-10
pp.55-60
IE, IMQ, MVE, CQ
(Joint) [detail]
2016-03-08
09:45
Okinawa   Diagnosing Performance of WEB Applications on PaaS Cloud Environments
Tatsuma Matsuki, Naoki Matsuoka (Fujitsu Labs Ltd.) CQ2015-136
Cloud servies have made large contributions to the agile WEB application developments. The performance of WEB applicatio... [more] CQ2015-136
pp.159-164
WIT, HI-SIGACI 2015-12-09
09:50
Tokyo AIST Tokyo Waterfront Enhancing Web Accessibility for Low Vision Users using Eye Tracking
Rie Kamikubo, Keita Higuchi, Ryo Yonetani (UTokyo), Hideki Koike (TITECH), Yoichi Sato (UTokyo) WIT2015-75
Low vision users with limited peripheral visual field are significantly challenged in making efficient scan path over a ... [more] WIT2015-75
pp.65-70
IE, ITE-ME, ITE-AIT [detail] 2015-11-12
15:20
Kumamoto   Browser Visualization using PNGs Generated by HTML5 Workers on Multicore
Marat Zhanikeev (Kyutech) IE2015-76
Earlier research has discussed two related technologies, namely (1) multisource content aggregation method and its brows... [more] IE2015-76
pp.19-22
WIT 2015-08-25
15:15
Nagano Shinshu University Faculty of Engineering A Survey of Web Accessibility in the National Colleges of Technology
Kazue Hiranaka (NIT, Ube College), Akihiro Motoki (Tsurumi Univ.) WIT2015-39
In this paper, we evaluated the web accessibility of 58 organizations, including the National Institute of Technology an... [more] WIT2015-39
pp.19-22
WIT 2014-09-12
17:00
Hyogo Kobe Univ. Kusunoki Campus A Survey of the Longitudinal Changes of Web Accessibility in the Public Libraries
Akihiro Motoki, Yuuri Suzuki, Mika Kitamura (Tsurumi Univ.) WIT2014-25
While accessibility surveys have been conducted for a number of organizational websites, continuous accessibility evalua... [more] WIT2014-25
pp.35-38
 Results 1 - 20 of 48  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan