Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2020-03-02 13:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model Moritoshi Aoyanagi, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2019-75 |
Binary code similarity comparison plays an important role in binary code analysis, vulnerability detection, and stolen c... [more] |
ICSS2019-75 pp.43-48 |
ICSS |
2018-11-21 14:50 |
Kagoshima |
|
Spoofed Website Detection using Machine Learning Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto (Institute of Information Security) ICSS2018-56 |
In recent years, the damage by fake site has been rapidly increasing. Because fake sites are ceremonious as if they are ... [more] |
ICSS2018-56 pp.19-24 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Preliminary Study on Defining Malignant Activity by Linking in-System Elements Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-60 |
In recent years, cyber-attacks have become large-scale and complicated, and the impact on society continues to become in... [more] |
ICSS2017-60 pp.55-60 |
ICSS, IPSJ-SPT |
2018-03-08 10:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Research on an Evaluation Method for Memory Forensics Tools Makoto Ashitsu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-70 |
[more] |
ICSS2017-70 pp.115-120 |
ICSS, IPSJ-SPT |
2018-03-08 10:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Malware Detection Method by Machine Learning Focused on Malignant Activity Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-71 |
In recent years, many researches on detection and classification of malware have been done. Among them, researches on te... [more] |
ICSS2017-71 pp.121-126 |
ICSS |
2015-11-27 14:15 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language Masaki Hashimoto, Minetoshi Takizawa (IISEC), Fumihiko Takayama (IIT), Hidenori Tsuji, Hidehiko Tanaka (IISEC) ICSS2015-44 |
SELinux is an effective MAC system for preventing damage from spreading after security breaches.
In this paper, we repl... [more] |
ICSS2015-44 pp.55-60 |
CPSY, IPSJ-ARC |
2015-10-08 10:00 |
Chiba |
Makuhari-messe |
A quick and secure method for connecting the wireless LAN by using a lazer pointing device Shuntaro Takahara (Tokyo Univ.), Fumihiko Takayama, Wataru Kitada, Hidenori Tsuji (IIT Inc.), Hidetsugu Irie, Shuichi Sakai (Tokyo Univ.) CPSY2015-56 |
Today, it is essential to connect to the Wireless LAN because portable terminals which can be connected to the networks ... [more] |
CPSY2015-56 pp.53-57 |
CPSY |
2014-10-10 11:20 |
Chiba |
Meeting Room 303, International Conference Hall, Makuhari-Messe |
Verification of a comprehensive injection attack detection with dynamic information tracking Hidenori Tsuji, Fumihiko Takayama, Wataru Kitada (IIT), Ryota Shioya (Nagoya Univ.), Masahiro Goshima (NII) CPSY2014-49 |
To detect injection attacks for Web applications, DTP (Dynamic Taint Propagation) has been researched. However conventio... [more] |
CPSY2014-49 pp.13-18 |
DE |
2012-06-05 13:25 |
Tokyo |
NII、12F Room1208, 1210 |
Supporting Remote Communication by Multi-media Processing based-on the Development Platform "IwaCam"
-- Discussions about the Role of Image and Speech Information for Synchronized Cooking by Two People -- Yoko Yamakata, Atsushi Hashimoto, Takuya Funatomi, Hiromi Hiramatsu (Kyoto Univ.), Hidenori Tsuji (IIT/IISEC), Shinsuke Mori (Kyoto Univ.) DE2012-2 |
(To be available after the conference date) [more] |
DE2012-2 pp.7-12 |
MVE |
2010-05-14 14:45 |
Kyoto |
Kyoto Sangyo University |
Remote Cooperative Cooking Experiments Using a Live Video Cooking Communication Software: IwaCam Hidenori Tsuji (IIT), Yoko Yamakata, Takuya Funatomi (Kyoto Univ.), Kazuaki Kondo (Kyouto Univ.), Daisuke Deguchi, Ichiro Ide (Nagoya Univ.), Kenzaburo Miyawaki, Mutsuo Sano (OIT) MVE2010-9 |
This report introduces the architecture and results of preliminary experiments of a live video cooking communication sof... [more] |
MVE2010-9 pp.33-34 |
MVE |
2009-11-13 11:30 |
Osaka |
Osaka Institute of Technology |
IwaCam: Cooking vision communication platform software Hidenori Tsuji, Fumihiko Takayama, Tomohiro Matsuzaki (Inst. of Information Tech, Inc.) MVE2009-74 |
As a common platform for cooking media processing involves communication through the network, we developed the IwaCam a ... [more] |
MVE2009-74 pp.59-63 |
CPSY |
2009-10-20 16:20 |
Tokyo |
212, 1F, Bldg.E-2, The University of Tokyo |
[Panel Discussion]
The Future of Infomation Technology and its Experts Hidetsugu Irie (Toyo Univ.), Hidenori Tsuji (Inst. of Info. security), Masaaki Kondo (UEC), Takashi Toyoshima (Fujitsu), Kazuyuki Shudo (Tokyo Inst. of Tech), Koji Ara (Advanced Research Laboratory, Hitachi, Ltd) |
[more] |
|
ISEC, SITE, IPSJ-CSEC |
2007-07-20 16:10 |
Hokkaido |
Future University-Hakodate |
Preliminary studies of secure OS as application platform Hidenori Tsuji (IISEC/Institute of Information Tech.), Masaki Hashimoto, Mira Kim, Hidehiko Tanaka (IISEC) |
Today, ensuring security for information systems is very important. However, ensuring security depends on the individual... [more] |
ISEC2007-71 pp.173-178 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 17:00 |
Hokkaido |
Future University-Hakodate |
Capability-Based System for Distributed Environment Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka (IISEC) |
This paper describes the use of operating system for the realization of distributed secure computing infrastructure. In ... [more] |
ISEC2007-73 pp.185-192 |