Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Analyzing Cybersecurity Datasets
-- Enhancing Security throughout the Data Life Cycle -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63 |
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] |
IA2023-63 pp.37-39 |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Strengthening Cybersecurity with Data Analytics
-- A Web Tool for Secure Exploration of CVE Data -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68 |
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] |
IA2023-68 pp.48-51 |
ICSS |
2023-11-16 13:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Real time detection for replay-attack communication in control system Koushi Nishi, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu University) ICSS2023-52 |
Attacks on control system in factory and power plant are increasing every year. Therefore, System that monitor communica... [more] |
ICSS2023-52 pp.7-14 |
MW, EMCJ, EST, IEE-EMC [detail] |
2023-10-19 13:10 |
Yamagata |
Yamagata University (Primary: On-site, Secondary: Online) |
An Application of Genetic Algorithms for XSS Attack Payload Generation and WAF Evaluation Yu Funahashi, Hideaki Kimura (Chubu Univ) EMCJ2023-43 MW2023-97 EST2023-70 |
We propose a method of generating and evolving malicious scripts (payloads) used in cross-site scripting (XSS) attacks b... [more] |
EMCJ2023-43 MW2023-97 EST2023-70 pp.42-45 |
IN, ICTSSL, IEE-SMF |
2023-10-20 14:40 |
Fukuoka |
Fukuoka University |
A Study on Applying Digital Twin-Assisted Security Platform for Cyber-Physical Systems to Supply Chain Keizo Sugiyama (KDDI Research) ICTSSL2023-32 |
The convergence of cyberspace and physical space is becoming more significant towards Beyond 5G. The impact of attacks, ... [more] |
ICTSSL2023-32 pp.42-46 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Study on the Application of Nudge to Improve Cybersecurity Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 |
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] |
ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 pp.232-238 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 14:50 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Anomaly detection with dataset including replay-attack communication Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 |
General-purpose devices and communications are increasingly introduced to control systems in factories and power plants ... [more] |
ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 pp.247-254 |
MSS, CAS, SIP, VLD |
2023-07-07 10:10 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Notion of Current-State Opacity and Its Verification for Discrete-Time Piecewise Linear Systems Taiga Matsumae, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) CAS2023-17 VLD2023-17 SIP2023-33 MSS2023-17 |
Opacity is one of the security concepts against cyber-attacks, and is frequently formulated for discrete event systems (... [more] |
CAS2023-17 VLD2023-17 SIP2023-33 MSS2023-17 pp.84-87 |
IA, ICSS |
2023-06-20 16:00 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Cybersecurity education and the role of universities Hiroshi Koide (Kyushu Univ.) IA2023-6 ICSS2023-6 |
In this presentation, the speaker will first discuss his experiences in the cybersecurity human resource development pro... [more] |
IA2023-6 ICSS2023-6 p.31 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-17 10:25 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
[Invited Talk]
Dual-Use of Cybersecurity
-- From the Threat Landscape in Cyberspace with a Focus on IoT Security -- Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85 |
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] |
SITE2022-62 IA2022-85 pp.45-52 |
IN, NS (Joint) |
2023-03-03 09:50 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Cyber-Attack Detection Method for Closed Network
-- A study of the detection technique of network-bridged equipment -- Nobuyuki Nakamura (OKI) IN2022-100 |
Cyber-Attacks in closed network occur recently. As closed network is not connected to the internet and may contain equip... [more] |
IN2022-100 pp.205-210 |
IA |
2023-01-25 15:25 |
Osaka |
Osaka Umeda Campus, Kwansei Gakuin University (Osaka) (Primary: On-site, Secondary: Online) |
Cybersecurity Analysis of Internet Banking in Developing and Developed countries, a case study of Tanzania and Japan Ndalama Festus Edward, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2022-72 |
Over the last few years, internet banking has become the primary way of accessing banking services for many bank custome... [more] |
IA2022-72 pp.28-35 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 15:10 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
FPGA Implementation and Area Evaluation of JTAG Access Mechanism Using Lightweight One-Time Password Authentication Scheme Hisashi Okamoto, Jun Ma, Senling Wang, Hiroshi Kai, Hiroshi Takahashi (Ehime Univ), Akihiro Shimizu (Kochi Univ. of Technology) VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71 |
When building a cyber-physical system (CPS), it is essential to guarantee the fault tolerance and security of edge devic... [more] |
VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71 pp.168-173 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:35 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Design and Trial of Cyber Security Exercise for Basic CISO Skillset Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104 |
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] |
NS2022-104 pp.23-28 |
ISEC, SITE, LOIS |
2022-11-18 09:25 |
Online |
Online |
Analysis of EU Cyber Resilience Act
-- from a Perspective of Cyber Supply Chain Security -- Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16 |
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] |
ISEC2022-32 SITE2022-36 LOIS2022-16 pp.16-19 |
CS |
2022-10-27 11:30 |
Hiroshima |
Hiroshima City University Satellite campus (Primary: On-site, Secondary: Online) |
Implementation of a large-scale evaluation platform in a BACnet/IP environment Kohei Miyazawa, Tetsuya Yokotani, Hiroaki Mukai, Yuki Hatanaka, Satoru Murakami (KIT) CS2022-45 |
In deploying BACnet/IP on large buildings, it is necessary to analyze the impact of unauthorized access on the facilitie... [more] |
CS2022-45 pp.11-14 |
HWS, ICD |
2022-10-25 17:05 |
Shiga |
(Primary: On-site, Secondary: Online) |
How to Identify the Physical Direction of CAN Message Transmission Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35 |
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] |
HWS2022-43 ICD2022-35 pp.76-81 |
ICSS, IPSJ-SPT |
2022-03-07 12:50 |
Online |
Online |
am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2021-58 |
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] |
ICSS2021-58 pp.1-6 |
IN, NS, CS, NV (Joint) |
2021-09-09 14:05 |
Online |
Online |
A Machine Learning Based Network Intrusion Detection System with Appling Different Algorithms in Multiple Stages Seiichi Sasa, Hiroyuki Suzuki, Akio Koyama (Yamagata Univ.) NS2021-63 |
In recent years, the rapid development of Information and Communication Technology (ICT) has led to the provision of a w... [more] |
NS2021-63 pp.36-41 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 14:00 |
Online |
Online |
[Invited Talk]
Cyber security of the Open University of Japan's courses of literacy in mathematical aspects, data science, and AI Takeo Tatsumi (Open Univ. Japan) ISEC2021-17 SITE2021-11 BioX2021-18 HWS2021-17 ICSS2021-22 EMM2021-22 |
With incorporating the introduction of mathematical aspects, data science, and AI to university education, many universi... [more] |
ISEC2021-17 SITE2021-11 BioX2021-18 HWS2021-17 ICSS2021-22 EMM2021-22 pp.47-49 |