IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 26  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
14:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] ICSS2023-81
pp.87-92
ICSS, IPSJ-SPT 2024-03-22
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection.
Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] ICSS2023-90
pp.153-159
ICSS, IPSJ-SPT 2023-03-13
17:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more]
ICSS2022-66
pp.109-114
ICSS, IPSJ-SPT 2023-03-14
10:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] ICSS2022-74
pp.157-162
IA, ICSS 2021-06-22
09:25
Online Online Analtsis of cost-effectiveness in malicious site detection using VirusTotal
Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more]
IA2021-10 ICSS2021-10
pp.50-55
WBS, IT, ISEC 2021-03-05
14:45
Online Online Consideration of embedding methods and machine learning models for detecting malicious URLs
Qisheng Chen, Kazumasa omote (Univ. of Tsukuba) IT2020-157 ISEC2020-87 WBS2020-76
Nowadays, Internet access is becoming more and more popular, which makes the harm of malicious websites more and more se... [more] IT2020-157 ISEC2020-87 WBS2020-76
pp.281-287
ICSS, IPSJ-SPT 2021-03-02
09:35
Online Online An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log
Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] ICSS2020-55
pp.172-177
IA 2019-11-15
13:15
Tokyo Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) Malicious URL Classification using Machine Learning Techniques
Yu-Chen Chen, Li-Dong Chen, Yan-Ju Chen, Jiann-Liang Chen (NTUST) IA2019-41
The Website security is an important research topic that must be pursued to protect internet users. Traditionally, black... [more] IA2019-41
pp.79-83
ICSS 2019-11-13
14:55
Miyazaki MRT Terrace(Miyazaki) ICSS2019-63 E-mail has been one of the most widely used tools for computer-based communication since the early days of the Internet.... [more] ICSS2019-63
pp.19-23
IN, NS
(Joint)
2019-03-05
11:30
Okinawa Okinawa Convention Center A study on Maliciousness Measurement in Cyber Threat Intelligence Using Graph Convolutional Networks
Yuta Kazato, Yoshihide Nakagawa, Yuichi Nakatani (NTT) IN2018-128
Cyber threat information (CTI) sharing is one of the important functions to protect end-users and services from cyber-at... [more] IN2018-128
pp.265-270
ICTSSL, IN
(Joint)
2017-10-10
14:50
Shizuoka   A Verification of Effect of Malicious User on Delay Tolerant Network
Naoya Mikamoto, Yoichi Utsunomiya, Takashi Okuda (Aichi Prefectural Univ.) IN2017-36
Delay Tolerant Networking (DTN) system provides communication services under the challenging network condition where a c... [more] IN2017-36
pp.7-12
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
13:25
Tokyo   A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download
Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
pp.81-86
IA, ICSS 2017-06-08
14:50
Kochi Kochi University of Technolo, Eikokuji Campus Study on Email address harvesting by free service
Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) IA2017-5 ICSS2017-5
The cyberattack for which an e-mail was used in recent years is a big problem socially. An indefinite point keeps also h... [more] IA2017-5 ICSS2017-5
pp.25-29
IN, ICTSSL, NWS
(Joint)
2016-10-20
13:55
Osaka Osaka Uinv. Malicious Wifi AP Detection Using Similarity of Relay Traffic
Toshiaki Harada, Tatsuya Mori (Waseda Univ.) IN2016-52
The spread of public WiFi service causes the threat of malicious wireless access points (APs). Malicious APs pretends to... [more] IN2016-52
pp.19-24
NLC, TL 2016-06-04
16:25
Hokkaido Otaru University of Commerce A SVM-based Method of Victim Representation Extraction from Bad-mouth Comments in Social Media
Yuki Nakano, Yuki Kawahara, Takashi Inui (Tsukuba Univ.) TL2016-6 NLC2016-6
Bad-mouth comments found on the Social media are negative side of information-oriented society. In this paper, we discus... [more] TL2016-6 NLC2016-6
pp.23-28
ICSS, IPSJ-SPT 2016-03-04
10:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Static Detection of ROP Chain Based on Hidden Markov Model
Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada (NTT) ICSS2015-59
Threats of targeted attacks have been widely observed. The targeted attacks generally utilize malicious documents that c... [more] ICSS2015-59
pp.71-76
ICSS 2014-11-28
11:10
Miyagi Tohoku Gakuin University (Tagajo Campus) searching malicious URL from vast webspace
Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more]
ICSS2014-61
pp.61-66
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more]
ICSS2013-71
pp.53-58
ICSS 2013-03-25
13:00
Kanagawa Yokohama National University Finding Malicious Authoritative DNS Servers
Yin Minn Pa Pa, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-61
This study proposes an approach to find authoritative DNS servers that are heavily involved with
malicious online activ... [more]
ICSS2012-61
pp.25-30
NS, IN
(Joint)
2012-03-08
11:40
Miyazaki Miyazaki Seagia Proposal and Evaluation of Distributed Management Method for Preventing Malicious Use of Game Information in P2P Massively Multi-player Online Role Playing Game
Kotaro Yamazaki, Yuzo Taenaka, Yasushi Wakahara (Univ. of Tokyo) IN2011-150
Recently an online game MMORPG has been explosively spread. However, MMORPG has a problem that the load of the server is... [more] IN2011-150
pp.79-84
 Results 1 - 20 of 26  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan