IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 91  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
pp.332-336
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Analyzing Cybersecurity Datasets -- Enhancing Security throughout the Data Life Cycle --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] IA2023-63
pp.37-39
IA 2024-01-25
16:40
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Strengthening Cybersecurity with Data Analytics -- A Web Tool for Secure Exploration of CVE Data --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] IA2023-68
pp.48-51
ICSS 2023-11-16
13:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Real time detection for replay-attack communication in control system
Koushi Nishi, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu University) ICSS2023-52
Attacks on control system in factory and power plant are increasing every year. Therefore, System that monitor communica... [more] ICSS2023-52
pp.7-14
MW, EMCJ, EST, IEE-EMC [detail] 2023-10-19
13:10
Yamagata Yamagata University
(Primary: On-site, Secondary: Online)
An Application of Genetic Algorithms for XSS Attack Payload Generation and WAF Evaluation
Yu Funahashi, Hideaki Kimura (Chubu Univ) EMCJ2023-43 MW2023-97 EST2023-70
We propose a method of generating and evolving malicious scripts (payloads) used in cross-site scripting (XSS) attacks b... [more] EMCJ2023-43 MW2023-97 EST2023-70
pp.42-45
IN, ICTSSL, IEE-SMF 2023-10-20
14:40
Fukuoka Fukuoka University A Study on Applying Digital Twin-Assisted Security Platform for Cyber-Physical Systems to Supply Chain
Keizo Sugiyama (KDDI Research) ICTSSL2023-32
The convergence of cyberspace and physical space is becoming more significant towards Beyond 5G. The impact of attacks, ... [more] ICTSSL2023-32
pp.42-46
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
14:50
Hokkaido Hokkaido Jichiro Kaikan Anomaly detection with dataset including replay-attack communication
Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52
General-purpose devices and communications are increasingly introduced to control systems in factories and power plants ... [more] ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52
pp.247-254
MSS, CAS, SIP, VLD 2023-07-07
10:10
Hokkaido
(Primary: On-site, Secondary: Online)
Notion of Current-State Opacity and Its Verification for Discrete-Time Piecewise Linear Systems
Taiga Matsumae, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) CAS2023-17 VLD2023-17 SIP2023-33 MSS2023-17
Opacity is one of the security concepts against cyber-attacks, and is frequently formulated for discrete event systems (... [more] CAS2023-17 VLD2023-17 SIP2023-33 MSS2023-17
pp.84-87
IA, SITE, IPSJ-IOT [detail] 2023-03-17
10:25
Gunma Maebashi Institute of Technology
(Primary: On-site, Secondary: Online)
[Invited Talk] Dual-Use of Cybersecurity -- From the Threat Landscape in Cyberspace with a Focus on IoT Security --
Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] SITE2022-62 IA2022-85
pp.45-52
IN, NS
(Joint)
2023-03-03
09:50
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Cyber-Attack Detection Method for Closed Network -- A study of the detection technique of network-bridged equipment --
Nobuyuki Nakamura (OKI) IN2022-100
Cyber-Attacks in closed network occur recently. As closed network is not connected to the internet and may contain equip... [more] IN2022-100
pp.205-210
IA 2023-01-25
15:25
Osaka Osaka Umeda Campus, Kwansei Gakuin University (Osaka)
(Primary: On-site, Secondary: Online)
Cybersecurity Analysis of Internet Banking in Developing and Developed countries, a case study of Tanzania and Japan
Ndalama Festus Edward, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2022-72
Over the last few years, internet banking has become the primary way of accessing banking services for many bank custome... [more] IA2022-72
pp.28-35
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-30
15:10
Kumamoto  
(Primary: On-site, Secondary: Online)
FPGA Implementation and Area Evaluation of JTAG Access Mechanism Using Lightweight One-Time Password Authentication Scheme
Hisashi Okamoto, Jun Ma, Senling Wang, Hiroshi Kai, Hiroshi Takahashi (Ehime Univ), Akihiro Shimizu (Kochi Univ. of Technology) VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71
When building a cyber-physical system (CPS), it is essential to guarantee the fault tolerance and security of edge devic... [more] VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71
pp.168-173
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
HWS, ICD 2022-10-25
17:05
Shiga
(Primary: On-site, Secondary: Online)
How to Identify the Physical Direction of CAN Message Transmission
Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] HWS2022-43 ICD2022-35
pp.76-81
MSS, NLP 2022-03-29
10:45
Online Online A proposal of method for defending against cyber attacks by combining honeypots and IPS
Yudai Yamamoto, Shingo Yamaguchi (Yamaguchi Univ.) MSS2021-71 NLP2021-142
We propose a defense system that makes it possible to detect and prevent attacks targeting web applications and IoT devi... [more] MSS2021-71 NLP2021-142
pp.83-88
CQ, CBE
(Joint)
2022-01-27
16:30
Ishikawa Kanazawa(Ishikawa Pref.)
(Primary: On-site, Secondary: Online)
Anomaly Detection Using Statistical Processing in Building Automation and Control Systems
Takeshi Okuda, Kohei Miyazawa, Tetsuya Yokotani, Hiroaki Mukai (KIT) CQ2021-84
In building automation and control systems (BACS), systems such as air conditioning, lighting, and disaster prevention a... [more] CQ2021-84
pp.45-49
IN, NS, CS, NV
(Joint)
2021-09-09
14:05
Online Online A Machine Learning Based Network Intrusion Detection System with Appling Different Algorithms in Multiple Stages
Seiichi Sasa, Hiroyuki Suzuki, Akio Koyama (Yamagata Univ.) NS2021-63
In recent years, the rapid development of Information and Communication Technology (ICT) has led to the provision of a w... [more] NS2021-63
pp.36-41
IA, ICSS 2021-06-22
09:50
Online Online Etherpot: A honeypot for observing cyberattacks on Ethereum client
Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] IA2021-11 ICSS2021-11
pp.56-61
IN, NS
(Joint)
2021-03-05
11:20
Online Online Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it
Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] NS2020-153
pp.179-184
ICSS, IPSJ-SPT 2021-03-01
11:55
Online Online Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] ICSS2020-32
pp.37-42
 Results 1 - 20 of 91  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan