IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 96 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-19
14:00
Online Online [Invited Talk] Cyber security of the Open University of Japan's courses of literacy in mathematical aspects, data science, and AI
Takeo Tatsumi (Open Univ. Japan) ISEC2021-17 SITE2021-11 BioX2021-18 HWS2021-17 ICSS2021-22 EMM2021-22
With incorporating the introduction of mathematical aspects, data science, and AI to university education, many universi... [more] ISEC2021-17 SITE2021-11 BioX2021-18 HWS2021-17 ICSS2021-22 EMM2021-22
pp.47-49
IA, ICSS 2021-06-22
09:00
Online Online Feature analysis of phishing website and phishing detection based on machine learning algorithms
Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] IA2021-9 ICSS2021-9
pp.44-49
IN, NS
(Joint)
2021-03-05
11:20
Online Online Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it
Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] NS2020-153
pp.179-184
ICSS, IPSJ-SPT 2021-03-01
10:25
Online Online Design and implementation of a cyber security exercise rewinding mechanism
Yuma Kodera, Chinen Kenichi (JAIST) ICSS2020-37
 [more] ICSS2020-37
pp.66-71
MSS, SS 2021-01-27
13:25
Online Online Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks
Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] MSS2020-37 SS2020-22
pp.49-53
IN 2021-01-18
15:50
Online Online [Invited Talk] Risk Analysis Methods and Actual Conditions in Cyber Security
Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] IN2020-49
p.37
IA, IN
(Joint)
2020-12-15
10:50
Online Online Development of an Intrusion Detection System Utilizing Social Network Analysis Principles
James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] IA2020-29
pp.18-21
IA 2020-10-01
14:45
Online Online [Poster Presentation] Cybersecurity Inventory of Autonomous Intelligent Drones Applying IEC 62443 Standard
Shih-Yuan Ku, Yu-Lun Wu (National Taiwan University of Science and Technology), Yung-Chiao Chen (National Taiwan University), Jiann-Liang Chen (National Taiwan University of Science and Technology) IA2020-5
With the deepening of the computerization and intelligence of various systems, Industrial Control System (ICS) cybersecu... [more] IA2020-5
pp.18-21
SITE, IPSJ-EIP [detail] 2020-06-04
10:55
Online Online Reconsideration of 'Risk' in information security/cybersecurity governance -- Based on the discussion in Science, Technology and Society (STS) --
Takumi Kimura (NRI SecureTechnologies) SITE2020-2
As information security/cybersecurity has been increasing, so is the importance of (Information) Security Governance. Ho... [more] SITE2020-2
pp.7-12
COMP, IPSJ-AL 2020-05-09
09:30
Online Online On Power and limitation of adversarial example attacks
Kouichi Sakurai (Kyushu Univ.) COMP2020-5
A risk of adversarial example attacks which cause deep learning to make wrong decisions is getting serious even from a c... [more] COMP2020-5
pp.33-36
NS, IN
(Joint)
2020-03-06
10:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
[Technology Exhibit] Machine learning pipeline for analyzing Large-scale traffic
Morikawa Akira, Bo Hu (NTT) NS2019-212 IN2019-103
Recently, machine learning becomes promising to automatically extract intelligence from network traffic for cybersecurit... [more] NS2019-212 IN2019-103
p.191(NS), p.151(IN)
ICSS, IPSJ-SPT 2020-03-03
09:50
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] ICSS2019-85
pp.103-108
IN 2020-01-23
16:40
Aichi WINC AICHI [Invited Talk] Protecting Security and Creating Security
Shinichi Hirata (NTT) IN2019-71
NTT Secure Platform Laboratories is engaged in research and development on digital security that will be required for th... [more] IN2019-71
pp.37-40
SS, MSS 2020-01-14
15:25
Hiroshima   Sensor Attack Detection in Control Systems Using Moving Horizon Estimation
Kei Isono, Koichi Kobayashi (Hokkaido Univ.), Ryosuke Adachi (Yamaguchi Univ.), Yuh Yamashita (Hokkaido Univ.) MSS2019-46 SS2019-30
The sensor attack detection problem in control systems is important in cybersecurity. In this paper, we propose a method... [more] MSS2019-46 SS2019-30
pp.31-36
NS, ICM, CQ, NV
(Joint)
2019-11-21
16:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Trends and Countermeasures of Cyber Attacks -- Introduction to Cyber Security for Network Engineers --
Yukiko Yano (NEC) CQ2019-93
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] CQ2019-93
p.27
KBSE, SC 2019-11-08
13:30
Nagano Shinshu University Malicious Domain Names Detection Based on TF-IDE and Variational Autoencoder: Classification with Quantum-enhanced Support Vector Machine
Yuwei Sun (UTokyo), Ng S. T. Chong (UNU), Hideya Ochiai (UTokyo) KBSE2019-26 SC2019-23
With the development of network technology, the use of domain name system (DNS) becomes common. However, the attacks on ... [more] KBSE2019-26 SC2019-23
pp.19-23
ISEC, SITE, LOIS 2019-11-02
13:30
Osaka Osaka Univ. Consideration regarding Critical Infrastructure Protection Policies in Cybersecurity -- Approach from the "Science and Technology Studies (STS)" --
Hideyuki Fujii, Takumi Kimura (NRI Secure) ISEC2019-80 SITE2019-74 LOIS2019-39
A comparison of critical infrastructure protection strategies in each country's cyber security policy reveals that there... [more] ISEC2019-80 SITE2019-74 LOIS2019-39
pp.115-120
ICTSSL, IN 2019-10-17
16:10
Oita   [Invited Talk] Buildings and Cyber Security in the IoT X AI era
Takeshi Watanabe (NTT FACILITIES CHUO), Shingo Kashima (NTT Communications) ICTSSL2019-27 IN2019-41
(To be available after the conference date) [more] ICTSSL2019-27 IN2019-41
pp.63-67
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
10:20
Kochi Kochi University of Technology An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
pp.7-14
AI 2019-07-22
16:30
Hokkaido   Modeling of Cyber Attack Based on POMDP
Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] AI2019-15
pp.77-82
 Results 21 - 40 of 96 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan