Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
TL |
2022-03-13 17:25 |
Online |
Online |
Semiotic and Cognitive Interactions in Cyberspace/Heterotopia
-- Cultural Appropriation, Cultural Aggression and Cultural Wars -- Yasunari Harada (Waseda U.) |
Ignorance and negligence of linguistic, cultural and behavioral differences may lead to misunderstandings and unwanted c... [more] |
TL2021-46 pp.80-85 |
ICSS, IPSJ-SPT |
2022-03-07 12:50 |
Online |
Online |
am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] |
ICSS2021-58 pp.1-6 |
IPSJ-AVM, CS, IE, ITE-BCT [detail] |
2021-11-25 13:00 |
Online |
Online |
[Special Invited Talk]
Beyond 5G Architecture and Technologies for Beyond 5G to Support Future Society in 2035
-- A White Paper on Beyond 5G Published from NICT and its Background -- Kentaro Ishizu (NICT) CS2021-64 IE2021-23 |
Beyond 5G is expected to be a system composed of variety of functions where dynamic system reconfiguration of the functi... [more] |
CS2021-64 IE2021-23 pp.25-30 |
RCS, SR, NS, SeMI, RCC (Joint) |
2021-07-14 13:25 |
Online |
Online |
Angular-Frequency Wideband Spectrum Sensing based on Multi-Coset Sampling Azril Haniz, Takeshi Matsumura, Fumihide Kojima (NICT) SR2021-21 |
For future 5G and Beyond 5G (B5G) networks employed in mmWave spectrum that use beamforming with massive MIMO arrays, it... [more] |
SR2021-21 pp.9-15 |
IA, ICSS |
2021-06-22 09:50 |
Online |
Online |
Etherpot: A honeypot for observing cyberattacks on Ethereum client Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11 |
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] |
IA2021-11 ICSS2021-11 pp.56-61 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
ICSS |
2020-11-26 15:25 |
Online |
Online |
Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23 |
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more] |
ICSS2020-23 pp.21-25 |
SR |
2020-11-20 10:50 |
Online |
Online |
Advanced Radio Emulation System toward B5G Network Based on Cyber Physical Fusion
-- Large-scale Virtual Radio Evaluation Testbed with Cyber and Physical Radio Nodes -- Takeshi Matsumura, Hirokazu Sawada, Fumihide Kojima, Toshiyuki Miyachi, Hiroaki Harai, Iwao Hosako (NICT), Jun-ichi Takada (Tokyo Tech), Hiroshi Harada (Kyoto Univ) SR2020-41 |
In the Society5.0 era, spectrum shortage and spectrum efficiency degradation will become more serious. To solve these pr... [more] |
SR2020-41 pp.120-127 |
SANE |
2020-04-22 09:45 |
Online |
Online |
Technical Trends
-- MILCOM2019 Report etc. -- Haruko Kawahigashi (Mitsubishi Electric Corp.) SANE2020-1 |
We present oversea technical trends concerning the Electronic Warfare and the defense communication, based on the outlin... [more] |
SANE2020-1 pp.1-5 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 10:20 |
Kochi |
Kochi University of Technology |
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 |
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] |
ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 pp.7-14 |
AI |
2019-07-22 16:30 |
Hokkaido |
|
Modeling of Cyber Attack Based on POMDP Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15 |
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] |
AI2019-15 pp.77-82 |
CS, CQ (Joint) |
2019-04-18 09:20 |
Osaka |
Osaka Univ. Library |
Dynamic Redundancy Switching Method of Network Paths for Tamper-Tolerant Networked Control Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CS2019-1 |
According to the growing of information and communication technology (ICT), various kinds of things are connected to the... [more] |
CS2019-1 pp.1-6 |
SANE |
2019-04-16 09:15 |
Kanagawa |
Defense Academy; Defense Training Institute |
55th Annual AOC International Symposium and Convention Report Haruko Kawahigashi (Mitsubishi Electric Corp.) SANE2019-1 |
We present the outline of the 55th Annual AOC International Symposium and Convention held at Washington, DC, U.S.A. in N... [more] |
SANE2019-1 pp.1-6 |
SITE, ISEC, LOIS |
2018-11-04 10:00 |
Fukuoka |
|
Introduction of PKI Electronic Authentication for Important IoT Devices
-- For Establishment of Secure IoT Platform -- Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32 |
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] |
ISEC2018-72 SITE2018-50 LOIS2018-32 pp.45-50 |
CS |
2018-07-12 17:00 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
[Special Invited Talk]
Cyber Security: Lessons Learned from Actual Cases
-- Recent Trends of Cyber Attacks and Effective Approaches -- Hiroo Suzuki, Tetsushi Morita (NTT) CS2018-34 |
In 5G/IoT era, cyber security is an indispensable element for the sound development of digital economy utilizing informa... [more] |
CS2018-34 p.109 |
SANE |
2018-05-14 10:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
54th Annual AOC International Symposium and Convention Report Haruko Kawahigashi (Mitsubishi Electric Corp.) SANE2018-1 |
We present the outline of the 54th Annual AOC International Symposium and Convention held at Washington, DC, U.S.A. in N... [more] |
SANE2018-1 pp.1-6 |
NS, IN (Joint) |
2018-03-02 14:40 |
Miyazaki |
Phoenix Seagaia Resort |
Development of an Emulation System for Autonomous and Distributed Internet Security Infrastructure Masaya Shimode, Tomohiro Akasaki, Hiroyuki Kimiyama, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-236 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" for protecting our resources on the Inte... [more] |
NS2017-236 pp.385-390 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:15 |
Tokyo |
|
A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 |
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] |
ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 pp.33-38 |
SANE |
2017-05-22 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Special Talk]
Recent Trends of EW
-- EMS Domain and the Third Offset Strategy -- Kinya Sasaki (TSL) SANE2017-10 |
In this manuscript, we took a major modern warfare ,CSBA papers, the Third Offset Strategy paper, and highlight the sign... [more] |
SANE2017-10 pp.45-50 |
IA, IN (Joint) |
2016-12-15 16:20 |
Hiroshima |
Hiroshima city university |
Generation of Dropping Request Message by Identifying Source Addresses and Attributes of Attacking Packets Mamoru Yogosawa, Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Tsuyoshi Ishikawa, Teruaki Tsutsumi, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno, Hiroyuki Kimiyama, Naoki Yonezaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) IA2016-69 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. It naturally lead us to switching ... [more] |
IA2016-69 pp.35-40 |