Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 14:00 |
Online |
Online |
[Invited Talk]
Cyber security of the Open University of Japan's courses of literacy in mathematical aspects, data science, and AI Takeo Tatsumi (Open Univ. Japan) ISEC2021-17 SITE2021-11 BioX2021-18 HWS2021-17 ICSS2021-22 EMM2021-22 |
With incorporating the introduction of mathematical aspects, data science, and AI to university education, many universi... [more] |
ISEC2021-17 SITE2021-11 BioX2021-18 HWS2021-17 ICSS2021-22 EMM2021-22 pp.47-49 |
IA, ICSS |
2021-06-22 09:00 |
Online |
Online |
Feature analysis of phishing website and phishing detection based on machine learning algorithms Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9 |
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] |
IA2021-9 ICSS2021-9 pp.44-49 |
IN, NS (Joint) |
2021-03-05 11:20 |
Online |
Online |
Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153 |
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] |
NS2020-153 pp.179-184 |
ICSS, IPSJ-SPT |
2021-03-01 10:25 |
Online |
Online |
Design and implementation of a cyber security exercise rewinding mechanism Yuma Kodera, Chinen Kenichi (JAIST) ICSS2020-37 |
[more] |
ICSS2020-37 pp.66-71 |
MSS, SS |
2021-01-27 13:25 |
Online |
Online |
Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22 |
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] |
MSS2020-37 SS2020-22 pp.49-53 |
IN |
2021-01-18 15:50 |
Online |
Online |
[Invited Talk]
Risk Analysis Methods and Actual Conditions in Cyber Security Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49 |
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] |
IN2020-49 p.37 |
IA, IN (Joint) |
2020-12-15 10:50 |
Online |
Online |
Development of an Intrusion Detection System Utilizing Social Network Analysis Principles James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29 |
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] |
IA2020-29 pp.18-21 |
IA |
2020-10-01 14:45 |
Online |
Online |
[Poster Presentation]
Cybersecurity Inventory of Autonomous Intelligent Drones Applying IEC 62443 Standard Shih-Yuan Ku, Yu-Lun Wu (National Taiwan University of Science and Technology), Yung-Chiao Chen (National Taiwan University), Jiann-Liang Chen (National Taiwan University of Science and Technology) IA2020-5 |
With the deepening of the computerization and intelligence of various systems, Industrial Control System (ICS) cybersecu... [more] |
IA2020-5 pp.18-21 |
SITE, IPSJ-EIP [detail] |
2020-06-04 10:55 |
Online |
Online |
Reconsideration of 'Risk' in information security/cybersecurity governance
-- Based on the discussion in Science, Technology and Society (STS) -- Takumi Kimura (NRI SecureTechnologies) SITE2020-2 |
As information security/cybersecurity has been increasing, so is the importance of (Information) Security Governance. Ho... [more] |
SITE2020-2 pp.7-12 |
COMP, IPSJ-AL |
2020-05-09 09:30 |
Online |
Online |
On Power and limitation of adversarial example attacks Kouichi Sakurai (Kyushu Univ.) COMP2020-5 |
A risk of adversarial example attacks which cause deep learning to make wrong decisions is getting serious even from a c... [more] |
COMP2020-5 pp.33-36 |
NS, IN (Joint) |
2020-03-06 10:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
[Technology Exhibit]
Machine learning pipeline for analyzing Large-scale traffic Morikawa Akira, Bo Hu (NTT) NS2019-212 IN2019-103 |
Recently, machine learning becomes promising to automatically extract intelligence from network traffic for cybersecurit... [more] |
NS2019-212 IN2019-103 p.191(NS), p.151(IN) |
ICSS, IPSJ-SPT |
2020-03-03 09:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85 |
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] |
ICSS2019-85 pp.103-108 |
IN |
2020-01-23 16:40 |
Aichi |
WINC AICHI |
[Invited Talk]
Protecting Security and Creating Security Shinichi Hirata (NTT) IN2019-71 |
NTT Secure Platform Laboratories is engaged in research and development on digital security that will be required for th... [more] |
IN2019-71 pp.37-40 |
SS, MSS |
2020-01-14 15:25 |
Hiroshima |
|
Sensor Attack Detection in Control Systems Using Moving Horizon Estimation Kei Isono, Koichi Kobayashi (Hokkaido Univ.), Ryosuke Adachi (Yamaguchi Univ.), Yuh Yamashita (Hokkaido Univ.) MSS2019-46 SS2019-30 |
The sensor attack detection problem in control systems is important in cybersecurity. In this paper, we propose a method... [more] |
MSS2019-46 SS2019-30 pp.31-36 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 16:00 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Trends and Countermeasures of Cyber Attacks
-- Introduction to Cyber Security for Network Engineers -- Yukiko Yano (NEC) CQ2019-93 |
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] |
CQ2019-93 p.27 |
KBSE, SC |
2019-11-08 13:30 |
Nagano |
Shinshu University |
Malicious Domain Names Detection Based on TF-IDE and Variational Autoencoder: Classification with Quantum-enhanced Support Vector Machine Yuwei Sun (UTokyo), Ng S. T. Chong (UNU), Hideya Ochiai (UTokyo) KBSE2019-26 SC2019-23 |
With the development of network technology, the use of domain name system (DNS) becomes common. However, the attacks on ... [more] |
KBSE2019-26 SC2019-23 pp.19-23 |
ISEC, SITE, LOIS |
2019-11-02 13:30 |
Osaka |
Osaka Univ. |
Consideration regarding Critical Infrastructure Protection Policies in Cybersecurity
-- Approach from the "Science and Technology Studies (STS)" -- Hideyuki Fujii, Takumi Kimura (NRI Secure) ISEC2019-80 SITE2019-74 LOIS2019-39 |
A comparison of critical infrastructure protection strategies in each country's cyber security policy reveals that there... [more] |
ISEC2019-80 SITE2019-74 LOIS2019-39 pp.115-120 |
ICTSSL, IN |
2019-10-17 16:10 |
Oita |
|
[Invited Talk]
Buildings and Cyber Security in the IoT X AI era Takeshi Watanabe (NTT FACILITIES CHUO), Shingo Kashima (NTT Communications) ICTSSL2019-27 IN2019-41 |
(To be available after the conference date) [more] |
ICTSSL2019-27 IN2019-41 pp.63-67 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 10:20 |
Kochi |
Kochi University of Technology |
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 |
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] |
ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 pp.7-14 |
AI |
2019-07-22 16:30 |
Hokkaido |
|
Modeling of Cyber Attack Based on POMDP Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15 |
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] |
AI2019-15 pp.77-82 |