Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Analyzing Cybersecurity Datasets
-- Enhancing Security throughout the Data Life Cycle -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63 |
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] |
IA2023-63 pp.37-39 |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Strengthening Cybersecurity with Data Analytics
-- A Web Tool for Secure Exploration of CVE Data -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68 |
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] |
IA2023-68 pp.48-51 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Study on the Application of Nudge to Improve Cybersecurity Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 |
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] |
ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 pp.232-238 |
IA, ICSS |
2023-06-20 16:00 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Cybersecurity education and the role of universities Hiroshi Koide (Kyushu Univ.) IA2023-6 ICSS2023-6 |
In this presentation, the speaker will first discuss his experiences in the cybersecurity human resource development pro... [more] |
IA2023-6 ICSS2023-6 p.31 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-17 10:25 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
[Invited Talk]
Dual-Use of Cybersecurity
-- From the Threat Landscape in Cyberspace with a Focus on IoT Security -- Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85 |
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] |
SITE2022-62 IA2022-85 pp.45-52 |
IA |
2023-01-25 15:25 |
Osaka |
Osaka Umeda Campus, Kwansei Gakuin University (Osaka) (Primary: On-site, Secondary: Online) |
Cybersecurity Analysis of Internet Banking in Developing and Developed countries, a case study of Tanzania and Japan Ndalama Festus Edward, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2022-72 |
Over the last few years, internet banking has become the primary way of accessing banking services for many bank custome... [more] |
IA2022-72 pp.28-35 |
MSS, SS |
2021-01-27 13:25 |
Online |
Online |
Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22 |
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] |
MSS2020-37 SS2020-22 pp.49-53 |
IA, IN (Joint) |
2020-12-15 10:50 |
Online |
Online |
Development of an Intrusion Detection System Utilizing Social Network Analysis Principles James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29 |
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] |
IA2020-29 pp.18-21 |
IA |
2020-10-01 14:45 |
Online |
Online |
[Poster Presentation]
Cybersecurity Inventory of Autonomous Intelligent Drones Applying IEC 62443 Standard Shih-Yuan Ku, Yu-Lun Wu (National Taiwan University of Science and Technology), Yung-Chiao Chen (National Taiwan University), Jiann-Liang Chen (National Taiwan University of Science and Technology) IA2020-5 |
With the deepening of the computerization and intelligence of various systems, Industrial Control System (ICS) cybersecu... [more] |
IA2020-5 pp.18-21 |
SITE, IPSJ-EIP [detail] |
2020-06-04 10:55 |
Online |
Online |
Reconsideration of 'Risk' in information security/cybersecurity governance
-- Based on the discussion in Science, Technology and Society (STS) -- Takumi Kimura (NRI SecureTechnologies) SITE2020-2 |
As information security/cybersecurity has been increasing, so is the importance of (Information) Security Governance. Ho... [more] |
SITE2020-2 pp.7-12 |
SS, MSS |
2020-01-14 15:25 |
Hiroshima |
|
Sensor Attack Detection in Control Systems Using Moving Horizon Estimation Kei Isono, Koichi Kobayashi (Hokkaido Univ.), Ryosuke Adachi (Yamaguchi Univ.), Yuh Yamashita (Hokkaido Univ.) MSS2019-46 SS2019-30 |
The sensor attack detection problem in control systems is important in cybersecurity. In this paper, we propose a method... [more] |
MSS2019-46 SS2019-30 pp.31-36 |
KBSE, SC |
2019-11-08 13:30 |
Nagano |
Shinshu University |
Malicious Domain Names Detection Based on TF-IDE and Variational Autoencoder: Classification with Quantum-enhanced Support Vector Machine Yuwei Sun (UTokyo), Ng S. T. Chong (UNU), Hideya Ochiai (UTokyo) KBSE2019-26 SC2019-23 |
With the development of network technology, the use of domain name system (DNS) becomes common. However, the attacks on ... [more] |
KBSE2019-26 SC2019-23 pp.19-23 |
ISEC, SITE, LOIS |
2019-11-02 13:30 |
Osaka |
Osaka Univ. |
Consideration regarding Critical Infrastructure Protection Policies in Cybersecurity
-- Approach from the "Science and Technology Studies (STS)" -- Hideyuki Fujii, Takumi Kimura (NRI Secure) ISEC2019-80 SITE2019-74 LOIS2019-39 |
A comparison of critical infrastructure protection strategies in each country's cyber security policy reveals that there... [more] |
ISEC2019-80 SITE2019-74 LOIS2019-39 pp.115-120 |
ISEC |
2018-05-16 14:25 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Survey on Tracking of Leaked NEM by Coincheck Incident Teppei Sato (Univ. of Tsukuba), Mitsuyoshi Imamura (Univ. of Tsukuba/NomuraAM), Kazumasa Omote (Univ. of Tsukuba) ISEC2018-7 |
Some volunteers had performed tracking a huge amount of NEM leaked from CoinCheck by sending specific mosaics which no o... [more] |
ISEC2018-7 pp.35-41 |
CQ |
2016-08-29 13:55 |
Ibaraki |
Tsukubasan |
Impact Assessment of Tamper Signal Characteristics in Secure Control Systems with Tamper Detection Observer Jin Hoshino, Hitoshi Kojima, Takahiro Funakoshi, Ryusuke Imai, Ryogo Kubo (Keio Univ.) CQ2016-55 |
Today, networked control systems (NCSs) have become popular in many areas of studies, due to the growth of information a... [more] |
CQ2016-55 pp.39-44 |
ICSS, IPSJ-SPT |
2016-03-03 16:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) ICSS2015-53 |
Organization introducing ICT systems needs to properly respond to the information security incidents. In contrast, recen... [more] |
ICSS2015-53 pp.35-40 |
ICSS, IPSJ-SPT |
2014-03-28 10:15 |
Okinawa |
Meio Univiersity |
MATATABI: Multi-layer Threat Analysis Platform with Hadoop Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77 |
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] |
ICSS2013-77 pp.113-118 |
DE |
2012-12-13 13:00 |
Kyoto |
Campus Plaza Kyoto |
[Invited Talk]
State-of-the-art Cybersecurity Technologies and Challenges for Security Big Data Daisuke Inoue (NICT) DE2012-32 |
We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter) in order to fight ... [more] |
DE2012-32 p.105 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:05 |
Hokkaido |
|
A Study on Cybersecurity Information Discovery Mechanisms over the Internet Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT) ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11 |
This paper prposes a scheme that links assorted structured cybersecurity information over networks and discovers them in... [more] |
ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11 pp.71-76 |
ICSS |
2010-11-05 13:50 |
Hiroshima |
Hiroshima City University |
Ontological Approach toward Cybersecurity in Cloud Computing Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ICSS2010-49 |
Following the immense development of cloud computing, various standardization activities have been taken place.
However... [more] |
ICSS2010-49 pp.29-34 |