Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
ICSS |
2020-11-26 15:25 |
Online |
Online |
Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23 |
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more] |
ICSS2020-23 pp.21-25 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 16:00 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Trends and Countermeasures of Cyber Attacks
-- Introduction to Cyber Security for Network Engineers -- Yukiko Yano (NEC) CQ2019-93 |
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] |
CQ2019-93 p.27 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 10:20 |
Kochi |
Kochi University of Technology |
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 |
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] |
ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 pp.7-14 |
NS, IN (Joint) |
2018-03-01 09:20 |
Miyazaki |
Phoenix Seagaia Resort |
A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90 |
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] |
IN2017-90 pp.5-10 |
IA |
2017-11-16 11:05 |
Overseas |
KMITL, Bangkok, Thailand |
A Proposal of Dynamic Access Control with SDN for Practical Network Separation Satoki Nakamura (NIT), Hirokazu Hasegawa (Nagoya Univ.), Yuichiro Tateiwa (NIT), Hiroki Takakura (NII), Yonghwan KIM, Yoshiaki Katayama (NIT) IA2017-45 |
As one of effective countermeasures against recent sophisticated cyber attacks, many researches have paid attention to n... [more] |
IA2017-45 pp.65-69 |
IA, IN (Joint) |
2016-12-16 13:20 |
Hiroshima |
Hiroshima city university |
A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82 |
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] |
IN2016-82 pp.91-96 |
ICSS, IPSJ-SPT |
2016-03-03 13:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents Natsuko Kawakami, Ryota kikkawa, Ying Tie, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
In recent targeted cyberattacks, targeted malware display embedded or downloaded decoy documents upon their execution as... [more] |
|
ICSS, IPSJ-SPT |
2016-03-04 11:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) ICSS2015-61 |
Recently, there are many malware measures such as targeted attacks, communicate with C&C servers, file creation, executi... [more] |
ICSS2015-61 pp.83-88 |
NS, IN (Joint) |
2016-03-04 13:10 |
Miyazaki |
Phoenix Seagaia Resort |
A Study of Data Leak Prevention Mechanism by Network Monitoring using SDN Kosa Sato, Yuji Sekiya (The Univ. of Tokyo) IN2015-139 |
Data leakage due to cyber attacks called targeted attacks and e-mail wrong transmission has become a major problem in re... [more] |
IN2015-139 pp.183-188 |
ICSS, IA |
2014-06-05 15:15 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
[Invited Talk]
Threat and Countermeasure Against the Targeted Attack Satoru Torii (Fujitsu Labs.) IA2014-2 ICSS2014-2 |
A lot of incidents by crafty cyber-attacks such as a targeted attack are made public. To confront such novel cyber-attac... [more] |
IA2014-2 ICSS2014-2 pp.7-8 |
SSS |
2012-03-16 15:40 |
Tokyo |
Meiji Univ. |
Targeted Email Attack Takehiko Nakayama (National Police Agency) SSS2011-29 |
Targeted e-mail attack is a form of attacks sending malicious e-mail to specific individual or company and it is very hu... [more] |
SSS2011-29 pp.17-18 |