Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
OPE, MW, IEE-EMT, MWP, EST, EMT, THz [detail] |
2021-07-16 09:30 |
Online |
Online |
Comparison of 2D-FDTD/Ray-tracing Hybrid Method suitable for Airport Surface with Full-wave Analysis Megumi Watanabe, Masaki Hashimoto, Ryosuke Suga (Aoyama Gakuin Univ.), Atsushi Kezuka (ENRI), Osamu Hashimoto (Aoyama Gakuin Univ.) EMT2021-17 MW2021-22 OPE2021-11 EST2021-18 MWP2021-19 |
Ground based augmentation system (GBAS) using GPS has been developed as a next generation landing guidance system. GBAS ... [more] |
EMT2021-17 MW2021-22 OPE2021-11 EST2021-18 MWP2021-19 pp.54-58 |
ICSS, IPSJ-SPT |
2020-03-02 13:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model Moritoshi Aoyanagi, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2019-75 |
Binary code similarity comparison plays an important role in binary code analysis, vulnerability detection, and stolen c... [more] |
ICSS2019-75 pp.43-48 |
ICSS, IPSJ-SPT |
2020-03-03 09:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A research of HTTP request and an identification method of fake User-Agent values Masato Inoue, Masaki Hashimoto (IISEC) ICSS2019-83 |
Almost all websites that are open to the public are subject to scan and attack, and have received a lot of anomaly reque... [more] |
ICSS2019-83 pp.91-96 |
ICSS, IPSJ-SPT |
2020-03-03 10:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Development of an expert system for automatic classification of illegal and harmful information on the dark web Hanae Kobayashi, Masaki Hashimoto (IISEC) ICSS2019-87 |
(To be available after the conference date) [more] |
ICSS2019-87 pp.113-118 |
ICSS |
2018-11-21 14:50 |
Kagoshima |
|
Spoofed Website Detection using Machine Learning Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto (Institute of Information Security) ICSS2018-56 |
In recent years, the damage by fake site has been rapidly increasing. Because fake sites are ceremonious as if they are ... [more] |
ICSS2018-56 pp.19-24 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Preliminary Study on Defining Malignant Activity by Linking in-System Elements Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-60 |
In recent years, cyber-attacks have become large-scale and complicated, and the impact on society continues to become in... [more] |
ICSS2017-60 pp.55-60 |
ICSS, IPSJ-SPT |
2018-03-08 10:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Research on an Evaluation Method for Memory Forensics Tools Makoto Ashitsu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-70 |
[more] |
ICSS2017-70 pp.115-120 |
ICSS, IPSJ-SPT |
2018-03-08 10:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Malware Detection Method by Machine Learning Focused on Malignant Activity Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-71 |
In recent years, many researches on detection and classification of malware have been done. Among them, researches on te... [more] |
ICSS2017-71 pp.121-126 |
ICSS, IPSJ-SPT |
2017-03-13 16:15 |
Nagasaki |
University of Nagasaki |
Evaluation of memory image acquisition/analysis function in forensics tools Ikuo Tanaka, Masaki Hashimoto (IISEC) ICSS2016-53 |
Currently, the information system is established as a social infrastructure, and accompanying it, the types and occurren... [more] |
ICSS2016-53 pp.79-84 |
ICSS |
2016-11-25 14:15 |
Kanagawa |
Institute of Information Security |
Study of behavior each malware function from the API calls Nobuki Suetsugu, Masaki Hashimoto (IISEC) ICSS2016-40 |
In recent years, there are various studies to malicious behavior detection. In particular, for the detection, much techn... [more] |
ICSS2016-40 pp.9-14 |
ICSS, IPSJ-SPT |
2016-03-04 11:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) ICSS2015-61 |
Recently, there are many malware measures such as targeted attacks, communicate with C&C servers, file creation, executi... [more] |
ICSS2015-61 pp.83-88 |
ICSS |
2015-11-27 14:15 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language Masaki Hashimoto, Minetoshi Takizawa (IISEC), Fumihiko Takayama (IIT), Hidenori Tsuji, Hidehiko Tanaka (IISEC) ICSS2015-44 |
SELinux is an effective MAC system for preventing damage from spreading after security breaches.
In this paper, we repl... [more] |
ICSS2015-44 pp.55-60 |
ED |
2012-04-18 13:00 |
Yamagata |
Yamagata University |
Carrier mobility measurement at a grain boundary in polycrystalline silicon using an organic gate thin-film transistor Fumihiko Hirose, Masaki Hashimoto, Kensaku Kanomata, Katsuaki Momiyama (Yamagata Univ.) ED2012-1 |
[more] |
ED2012-1 pp.1-4 |
ED |
2010-04-23 10:45 |
Yamagata |
|
Organic gate FETs for charactrizing carrier transport in polycrystalline Si Masaki Hashimoto, Takahiko Suzuki, Fumihiko Hirose (Yamagata Univ.) ED2010-14 |
We fabricated organic gate Si FETs with Schottky contacts with a temperature of less than 150ºC to extract carrier ... [more] |
ED2010-14 pp.61-65 |
CPM |
2009-10-29 14:50 |
Toyama |
Toyama Prefectural University |
Low temperature fabrication of Si TFTs by using organic insulator Masaki Hashimoto, Takahiko Suzuki, Yuzuru Narita, Fumihiko Hirose (Yamagata Univ.) CPM2009-91 |
(To be available after the conference date) [more] |
CPM2009-91 pp.9-11 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 16:10 |
Hokkaido |
Future University-Hakodate |
Preliminary studies of secure OS as application platform Hidenori Tsuji (IISEC/Institute of Information Tech.), Masaki Hashimoto, Mira Kim, Hidehiko Tanaka (IISEC) |
Today, ensuring security for information systems is very important. However, ensuring security depends on the individual... [more] |
ISEC2007-71 pp.173-178 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 17:00 |
Hokkaido |
Future University-Hakodate |
Capability-Based System for Distributed Environment Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka (IISEC) |
This paper describes the use of operating system for the realization of distributed secure computing infrastructure. In ... [more] |
ISEC2007-73 pp.185-192 |