Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, NWS (Joint) |
2021-01-22 14:20 |
Online |
Online |
An Aggregation Approach for Improving Network Scan Failure and Delay Estimation of IoT Wireless Equipment Babatunde Ojetunde, Kenta Suzuki, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-118 |
Recently we proposed a method for identifying the network scan response state that is needed to estimate the cause of ne... [more] |
NS2020-118 pp.43-52 |
ICSS, IPSJ-SPT |
2020-03-03 09:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85 |
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] |
ICSS2019-85 pp.103-108 |
AI |
2019-07-22 16:30 |
Hokkaido |
|
Modeling of Cyber Attack Based on POMDP Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15 |
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] |
AI2019-15 pp.77-82 |
ICTSSL |
2017-07-13 15:40 |
Kagawa |
Kagawa Univ. |
A think of Correspondence Exercise Management at the Multiple Organizations' Emergency Management of Widespread Cyber-attack using information sharing system
-- Application of Comprehensive Emergency Management Support System,"KADAN(R)" -- Yoshihiro Yoshida, Koji Kishi, Tsuneko Kura, Naoko Kosaka (NTT) ICTSSL2017-23 |
In crisis response work in the cyber field of large scale and multiple organizations, efficient information gathering an... [more] |
ICTSSL2017-23 pp.33-38 |
LOIS |
2017-03-03 14:55 |
Okinawa |
N.Ohama Memorial Hall |
Study of Comprehensive Emergency Management Support System for Multiple Organizations
-- Application to Emergency Management of Widespread Cyber-attack -- Yoshihiro Yoshida, Koji Kishi, Naoko Kosaka, Tsuneko Kura, Yuji Maeda (NTT) LOIS2016-98 |
In response to the crisis response business in response to natural disasters in local governments and crisis response wo... [more] |
LOIS2016-98 pp.201-204 |
IA, IN (Joint) |
2016-12-15 16:20 |
Hiroshima |
Hiroshima city university |
Generation of Dropping Request Message by Identifying Source Addresses and Attributes of Attacking Packets Mamoru Yogosawa, Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Tsuyoshi Ishikawa, Teruaki Tsutsumi, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno, Hiroyuki Kimiyama, Naoki Yonezaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) IA2016-69 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. It naturally lead us to switching ... [more] |
IA2016-69 pp.35-40 |
IA |
2016-11-04 10:35 |
Overseas |
Taipei (Taiwan) |
Deep Learning for Ransomware Detection Aragorn Tseng, YunChun Chen, YiHsiang Kao, Tsungnan Lin (NTU) IA2016-46 |
Ransomware is malware that installs covertly on a victim's computer or smartphone, executes a cryptovirology attack and ... [more] |
IA2016-46 pp.87-92 |
ICSS, IA |
2016-06-07 10:35 |
Saga |
Saga University |
An Experiment to Shut off DDoS Attacks on Testbed Simulating Autonomous Internet Security Infrastructure Kishi Yuya, Eguchi Ken, Ishikawa Tsuyoshi, Suzuki Ryusei, Miyaguchi Yuki, Ohsawa Kazuo, Yogosawa Mamoru, Sano Kaoru, Yamaki Hiroshi, Ueno Yoichirou, Sasaki Ryoichi, Kobayashi Hiroshi (Tokyo Denki Univ) IA2016-9 ICSS2016-9 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. A shift in thinking is required fr... [more] |
IA2016-9 ICSS2016-9 pp.45-50 |
IA |
2016-01-29 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room |
Neutralization of malware-polluted IoT by limiting communications partners using MLB router Yuto Yamamoto, Soushu Kawashita, Shingo Tanaka, Hiroshi Yamaki, Hiroshi kobayashi (Tokyo Denki Univ) IA2015-86 |
Security measures of IoT devices and social infrastructure have become urgent issues. A bidirectional white list to limi... [more] |
IA2015-86 pp.43-48 |
LOIS, ISEC, SITE |
2015-11-06 16:20 |
Kanagawa |
Kanagawa Univ. |
A Feasibility Study of Autonomous Security Infrastructure in the Internet Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] |
ISEC2015-46 SITE2015-33 LOIS2015-40 pp.67-74 |
ICSS |
2015-03-03 13:50 |
Okinawa |
Meio Univiersity |
Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router
-- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow -- Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) ICSS2014-65 |
There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems, and ... [more] |
ICSS2014-65 pp.13-18 |
ICSS |
2015-03-03 15:40 |
Okinawa |
Meio Univiersity |
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69 |
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, c... [more] |
ICSS2014-69 pp.37-42 |
ICSS |
2015-03-04 11:15 |
Okinawa |
Meio Univiersity |
A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-81 |
The integrated malware detection service is a web service that analyzes suspicious files, domains and URLs which are pos... [more] |
ICSS2014-81 pp.109-114 |
IA |
2014-09-12 10:00 |
Tokyo |
Tokyo Tech Front |
A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attack Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-14 |
An architecture of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets... [more] |
IA2014-14 pp.1-6 |
IA |
2014-09-12 10:30 |
Tokyo |
Tokyo Tech Front |
An Implementation and Evaluation of Multi-Layer-Binding Router using OpenFlow Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-15 |
A prototype of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets to ... [more] |
IA2014-15 pp.7-12 |