IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 33  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Router Security Assessment Using CAPEC Vulnerability Assessment Criteria
Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] IA2023-62
pp.30-36
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services
Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] ICSS2022-62
pp.85-90
MSS, NLP 2022-03-29
10:45
Online Online A proposal of method for defending against cyber attacks by combining honeypots and IPS
Yudai Yamamoto, Shingo Yamaguchi (Yamaguchi Univ.) MSS2021-71 NLP2021-142
We propose a defense system that makes it possible to detect and prevent attacks targeting web applications and IoT devi... [more] MSS2021-71 NLP2021-142
pp.83-88
ICSS, IPSJ-SPT 2022-03-07
13:10
Online Online A Method for Identifying IoT Devices Using Features from WebUI Contents and Images
Kosuke Murakami (NICT/KDDI), Takahiro Kasama, Akira Fujita (NICT), Jumpei Urakawa (KDS), Daisuke Inoue (NICT) ICSS2021-59
Cyber attacks on IoT devices have caused damage such as information theft and malware infection.
In order to identify I... [more]
ICSS2021-59
pp.7-12
ICSS 2021-11-30
09:30
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Real-time detection of Distributed Slow HTTP DoS attacks using communication analysis
Koki Tamura, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp) ICSS2021-54
At ICSS in this March, we proposed a detection method of Slow HTTP DoS Attacks with
distinguishment between communicat... [more]
ICSS2021-54
pp.49-54
ICSS, IPSJ-SPT 2020-03-03
09:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] ICSS2019-84
pp.97-102
IT, ISEC, WBS 2019-03-07
09:55
Tokyo University of Electro-Communications Exploring Malicious URL in Dark Web Using Tor Crawler
Yuki Kawaguchi, Seiichi Ozawa (Kobe Univ.) IT2018-76 ISEC2018-82 WBS2018-77
In recent years, various web-based attacks such as Drive-by-Download attacks are becoming serious. To protect legitimate... [more] IT2018-76 ISEC2018-82 WBS2018-77
pp.7-12
IN, NS
(Joint)
2019-03-05
14:10
Okinawa Okinawa Convention Center Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack
Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2018-271
pp.455-460
ASN, NS, RCS, SR, RCC
(Joint)
2018-07-11
13:10
Hokkaido Hakodate Arena [Encouragement Talk] Proposal of Automatic Data Collection and Repository Generation for Statistical Analysis and Visualization of Dark Web Markets
Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2018-41
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2018-41
pp.25-30
ICSS, IPSJ-SPT 2018-03-08
12:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Analyzing web application vulnerability reports by machine learning
Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com) ICSS2017-74
Web application vulnerability testing is important for preventing cyberattacks. However, it is difficult to test all URL... [more] ICSS2017-74
pp.139-144
NS, IN
(Joint)
2018-03-01
11:30
Miyazaki Phoenix Seagaia Resort Statistical Analysis on Dark Web Market Focusing on DDoS/Botnet
Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2017-182
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2017-182
pp.85-90
TL 2017-12-10
11:35
Ehime Ehime University A study on web page tamper detection method using natural language processing.
Shotaro Aikawa, Masaki Inamura (TDU) TL2017-49
Web page attack methods diversify just like daily updated vulnerability information, it is difficult to detect attacks b... [more] TL2017-49
pp.31-36
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
10:15
Tokyo   A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments
Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
pp.33-38
ICSS, IPSJ-SPT 2017-03-14
09:55
Nagasaki University of Nagasaki Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications
Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-59
A host-based intrusion detection is an approach for detecting critical web attacks. Because anomaly detection is leverag... [more] ICSS2016-59
pp.117-122
ICSS, IPSJ-SPT 2017-03-14
10:20
Nagasaki University of Nagasaki Attack Pattern Extraction by Clustering Parameters
Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-60
Web Application Firewall (WAF) is widely used to detect attacks against Web applications. New sorts of attacks occurs da... [more] ICSS2016-60
pp.123-128
ICSS, IA 2016-06-07
13:00
Saga Saga University On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis
Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] IA2016-11 ICSS2016-11
pp.57-62
ICSS, IPSJ-SPT 2016-03-03
13:10
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Actual Survey on Web Scanning by URI Co-occurrence Detection
Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more]
ICSS2015-51
pp.25-30
ICSS, IPSJ-SPT 2016-03-03
15:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots
Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] ICSS2015-55
pp.47-52
ICSS 2015-03-03
16:15
Okinawa Meio Univiersity Link Structural Analysis of Drive-by-Download Attacks
Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] ICSS2014-70
pp.43-48
ICSS 2014-11-28
11:10
Miyagi Tohoku Gakuin University (Tagajo Campus) searching malicious URL from vast webspace
Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more]
ICSS2014-61
pp.61-66
 Results 1 - 20 of 33  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan