Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM |
2020-03-03 10:20 |
Okinawa |
Ohama Nobumoto Memorial Hall (Cancelled but technical report was issued) |
Large-Scale NW Traffic Identification Technique with Domain Adaptation Shun Tobiyama, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Ltd.) ICM2019-51 |
[more] |
ICM2019-51 pp.55-60 |
ICSS, IPSJ-SPT |
2019-03-07 13:55 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Period Analysis for Visualization of Industrial Network Hiroki Nagayama, Hu Bo, Kazunori Kamiya, Shingo Kashima, Masaki Tanikawa (NTT) ICSS2018-88 |
Since communications of the industrial network have strong periodicity, profiling the period of communications between d... [more] |
ICSS2018-88 pp.173-178 |
ICSS, IPSJ-SPT |
2019-03-07 16:40 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security) ICSS2018-77 |
[more] |
ICSS2018-77 pp.53-58 |
ICSS, IPSJ-SPT |
2019-03-08 14:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Traffic analysis to detect abnormal smartphone application behavior Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2018-87 |
With the spread of smartphones, its security management has become important. For smartphones, it is also necessary to c... [more] |
ICSS2018-87 pp.167-172 |
ICSS, IPSJ-SPT |
2019-03-08 14:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Performance survey for IoT security function on smartphone Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) ICSS2018-68 |
Recently, IoT devices are wide spreading, and its security management has become more important. There are two kinds of ... [more] |
ICSS2018-68 pp.1-6 |
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] |
2019-02-20 11:55 |
Hokkaido |
Hokkaido Univ. |
Development and Verification of Full Body Driving Simulator for Beacon Type Pedestrian Notification System Masaki Tani, Haruki Kawanaka (Aichi Prefectural Univ.), Shintaro Ono (Tokyo Univ.), Yasuharu Asai (KICTEC), Koji Oguri (Aichi Prefectural Univ.) ITS2018-81 IE2018-102 |
[more] |
ITS2018-81 IE2018-102 pp.191-196 |
WBS, ITS, RCC |
2018-12-06 13:00 |
Okinawa |
Miyako Island Hirara Port Terminal Bldg. |
[Poster Presentation]
Verification of validity of Pedestrian notification application by Beacon at Non-Line-of-Sight intersections Masaki Tani, Haruki Kawanaka (Aichi Prefectural Univ.), Yasuharu Asai (KICTEC), Koji Oguri (Aichi Prefectural Univ.) WBS2018-40 ITS2018-23 RCC2018-71 |
[more] |
WBS2018-40 ITS2018-23 RCC2018-71 pp.69-74 |
ICSS, IPSJ-SPT |
2018-03-07 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-52 |
In recent years, the increase of unknown malware is remarkable and it is difficult to prevent malware infiltration by 10... [more] |
ICSS2017-52 pp.7-12 |
ICSS, IPSJ-SPT |
2018-03-07 14:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A study of decentralized IoT Security Controller Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2017-58 |
With the spread of IoT devices, IoT security management has become important to network administrators. It is hard to im... [more] |
ICSS2017-58 pp.43-48 |
ITS, IEE-ITS |
2018-03-08 10:00 |
Kyoto |
Kyoto Univ. |
Analysis of Driving Behavior and Driver Characteristics towards Accident Risk Assessment of Intersection Collision Masaki Tani, Haruki Kawanaka, Koji Oguri (Aichi Prefectural Univ.) ITS2017-88 |
There are no effective indicators to evaluate the risk of collision accident at an intersection. For example, PICUD whic... [more] |
ITS2017-88 pp.41-46 |
ICSS, IPSJ-SPT |
2018-03-08 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Response Signature Generation method for Detecting Malicious Destinations Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-77 |
Blacklist is frequently deployed for detecting malware-infected hosts. However, even when request traffic from one host ... [more] |
ICSS2017-77 pp.157-160 |
ICSS, IPSJ-SPT |
2018-03-08 14:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-79 |
[more] |
ICSS2017-79 pp.167-172 |
ICSS, IPSJ-SPT |
2017-03-13 15:15 |
Nagasaki |
University of Nagasaki |
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51 |
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] |
ICSS2016-51 pp.43-48 |
ICSS, IPSJ-SPT |
2017-03-13 15:40 |
Nagasaki |
University of Nagasaki |
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52 |
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] |
ICSS2016-52 pp.49-54 |
ICSS, IPSJ-SPT |
2017-03-14 09:55 |
Nagasaki |
University of Nagasaki |
Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-59 |
A host-based intrusion detection is an approach for detecting critical web attacks. Because anomaly detection is leverag... [more] |
ICSS2016-59 pp.117-122 |
ICSS, IPSJ-SPT |
2017-03-14 10:20 |
Nagasaki |
University of Nagasaki |
Attack Pattern Extraction by Clustering Parameters Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-60 |
Web Application Firewall (WAF) is widely used to detect attacks against Web applications. New sorts of attacks occurs da... [more] |
ICSS2016-60 pp.123-128 |
ICSS, IPSJ-SPT |
2016-03-03 13:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Actual Survey on Web Scanning by URI Co-occurrence Detection Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51 |
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more] |
ICSS2015-51 pp.25-30 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2015-09-15 15:00 |
Ehime |
|
Proposal of selection of training data using misdetected goodware for preventing misdetection of a static detector of malware Yasushi Okano, Atsutoshi Kumagai, Masaki Tanikawa, Yoshihito Oshima (NTT), Kenji Aiko, Kazumi Umehashi, Junichi Murakami (FFRI) PRMU2015-90 IBISML2015-50 |
A lot of variant and new malware is produced day by day, it is therefore the urgent need to countermeasure such as "unkn... [more] |
PRMU2015-90 IBISML2015-50 pp.163-170 |
KBSE |
2007-11-19 17:10 |
Fukuoka |
Kyushu Sangyo University |
A Case Study and Discussion on a Requirement Analysis Method of Unexpected Obstacles in Embedded Software by Combining Information Flow Diagram with Analysis Matrix Masaki Tanimoto, Toshiro Mise, Yasufumi Shinyashiki, Masaaki Hashimoto (KIT), Takako Nakatani (TUS), Naoyasu Ubayashi, Keiichi Katamine (KIT) KBSE2007-32 |
This paper describes a case study and discussion on a requirement analysis method of unexpected obstacles in embedded so... [more] |
KBSE2007-32 pp.31-36 |