Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2015-05-15 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Path analysis method of anonymous communication system Tor Yukihiro Shibahara, Naoshi Sato (IISEC) ISEC2015-3 |
Anonymous communication system looks effective for the privacy protection because it could assure anonymity of path from... [more] |
ISEC2015-3 pp.15-22 |
ISEC, LOIS |
2013-11-29 13:30 |
Miyagi |
Tohoku Univ. |
The proposal on a vulnerability evaluation method according to information system environment Naoki Kamegai, Naoshi Sato (IISEC) ISEC2013-69 LOIS2013-35 |
It is essential to perform a vulnerability assessment to avoid for the security incident of own system because a lot of ... [more] |
ISEC2013-69 LOIS2013-35 pp.65-70 |
SITE, IPSJ-EIP |
2013-05-16 11:25 |
Kanagawa |
Institute of Infomation Security |
Proposal of SNS Membership Qualification System Using Security Information Database Yasuyoshi Okada, Kazuyuki Ishii, Naoshi Sato (Institute of Information Security) SITE2013-3 |
In order to assure information security of Social Networking Service (SNS), this paper proposes to introduce a membershi... [more] |
SITE2013-3 pp.11-16 |
MoNA, IE, ITE-CE, ITE-ME, IPSJ-AVM (Joint) [detail] |
2012-07-20 11:00 |
Ibaraki |
University Hall, University of Tsukuba |
Location Proof by GPS and WLAN Information Tadashi Yamaguchi, Naoshi Sato (IISEC) MoMuC2012-18 IE2012-43 |
Location-based services (LBS) of mobile phone have entered a period of expansion, as number of smartphones equipped with... [more] |
MoMuC2012-18 IE2012-43 pp.43-48 |
ICSS, IA |
2012-06-22 09:00 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
Proposed phishing countermeasures based on URL information analysis Shingo Matsugaya, Naoshi Sato (IISEC) IA2012-6 ICSS2012-6 |
Although phishing has been conducted from various countermeasures already, the number of victims are still more likely t... [more] |
IA2012-6 ICSS2012-6 pp.31-36 |
ICSS |
2012-03-16 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47 |
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] |
ICSS2011-47 pp.49-54 |
AN, MoNA, USN (Joint) |
2011-01-21 10:30 |
Hiroshima |
Hiroshima City University |
Computer Simulation on Rescueing Movement using Adhoc Network in case of a disaster Yuta Koide, Naoshi Sato, Kazuyuki Ishii (IISEC) USN2010-58 |
A variety of wireless networks were high-speed and steady and it came to be organizable as the wireless technology devel... [more] |
USN2010-58 pp.107-112 |
R |
2009-12-18 13:50 |
Tokyo |
|
An Investigation of Reliability Evaluation of Networks with Layer Structure Ayako Suzuki (Inst. of Information Security), Hitoshi Watanabe (Tokyo Univ. of Science), Naoshi Sato (Inst. of Information Security), Masaki Hanada (Tokyo Univ. of Science) R2009-48 |
There are many networks organized on an exist network by using appropriate network technologies. In these cases, the re... [more] |
R2009-48 pp.11-16 |
WBS, IT, ISEC |
2009-03-09 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Network Usage Control Based on Evaluation of User Security Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58 |
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] |
IT2008-45 ISEC2008-103 WBS2008-58 pp.15-22 |
WBS, IT, ISEC |
2009-03-09 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Anomaly detection based on the machine learning of the human behavior on home network Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-46 ISEC2008-104 WBS2008-59 |
The demand for home security is growing year by year in order to solve on problems at homes, according to surge of robbe... [more] |
IT2008-46 ISEC2008-104 WBS2008-59 pp.23-28 |
IA |
2009-01-29 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Method of Grouping Routers by Using Positional Addresses Shigetoshi Okazaki, Naoshi Sato (Graduate School of Info Sec.) IA2008-64 |
The packet network based on the internet protocol is infrastructure of highly-networked information society, but there a... [more] |
IA2008-64 pp.95-100 |
ICM, CQ, NS (Joint) |
2008-11-13 18:00 |
Fukushima |
Nihon University |
A plan of the method of controlling the NGN route using an indivisual security policy Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51 |
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] |
CQ2008-51 pp.33-38 |
R |
2008-05-30 15:50 |
Hyogo |
Kobe Gakuin Univ. |
An investigation of reliability of systems with latent failures Hitoshi Watanabe (Tokyo Univ. of Science), Naoshi Sato (Institute of Information Security) R2008-14 |
There are many systems with elements of which failures are not discovered immediately after their occurrences. In these... [more] |
R2008-14 pp.29-34 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 10:45 |
Hokkaido |
Future University-Hakodate |
A preference transmission method with information security database systems on the Internet Yasuyoshi Okada, Naoshi Sato (I.I.S.) ISEC2007-17 SITE2007-11 |
The number of computer viruses or illegal accesses on the Internet is rapidly increasing. According to information techn... [more] |
ISEC2007-17 SITE2007-11 pp.7-14 |
ISEC |
2007-05-18 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Spam-mail Filtering Based on Cooperation of Users and Providers Takashi Koike (Yahoo), Naoshi Sato (IISEC) ISEC2007-13 |
This study proposes a spam mail filtering method by cooperation of users and internet service providers. The proposed fi... [more] |
ISEC2007-13 pp.85-92 |
CQ |
2006-07-13 15:15 |
Hokkaido |
Future University-Hakodate |
A Relative Evaluation of Information Security Countermeasures Hirotoshi Oomura (FUJITSU FIP), Naoshi Sato (IISEC) CQ2006-25 |
(To be available after the conference date) [more] |
CQ2006-25 pp.47-52 |
MVE, CQ, MoNA (Joint) |
2006-01-26 10:55 |
Oita |
Beppu Onsen Spring (Resorpia Beppu Hotel) |
Evaluation and Control of Transmission Performance in use of Grading Bit Error Mode Naoshi Sato (IISEC) |
The author has proposed the method for determining both the beginning and ending times of a burst error duration and for... [more] |
CQ2005-83 pp.25-30 |
CS, CAS, SIP |
2005-03-15 09:30 |
Okayama |
Okayama Prefectural University |
Classification of Burst errors and Its Performance Naoshi Sato (IISEC) |
As a study on telecommunication service quality degradation due to burst errors, this report proposes a method for class... [more] |
CAS2004-97 SIP2004-140 CS2004-233 pp.1-6 |