Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Analyzing Cybersecurity Datasets
-- Enhancing Security throughout the Data Life Cycle -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63 |
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] |
IA2023-63 pp.37-39 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Multiple Vantage Point-based Concept for Open-Source Information Space Awareness Blumbergs Bernhards (NAIST) ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34 |
The proposed concept bolsters visibility and provides context to cyber incident response teams countering malicious acti... [more] |
ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34 pp.133-140 |
WPT, AP (Joint) |
2021-01-21 13:30 |
Online |
Online |
[Invited Lecture]
[Invited Lecture]Proposal of a simple outdoor to indoor penetration propagation loss model considering horizontal and vertical incident angles in the 0.9/2.3/5.1GHz band Yuta Mizuno, Kentaro Nishimori, Ryotaro Taniguchi, Yuki Igarashi (Niigata Univ.) AP2020-104 |
Recently, the next generation (5-th generation: 5G) mobile communication systems have been actively investigated all ove... [more] |
AP2020-104 pp.7-12 |
ICSS |
2020-11-26 15:00 |
Online |
Online |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
US |
2019-08-28 15:20 |
Tokyo |
|
Study on the estimation of seismic wave velocity of seafloor surface and the localization of low frequency sound source on sea surface around Japan Trench
-- Analysis of the received waveform of airgun by accelerometer at S-net station -- Ryoichi Iwase (JAMSTEC) US2019-42 |
A submarine cabled observatory "S-net" (Seafloor observation network for earthquakes and tsunamis along the Japan Trench... [more] |
US2019-42 pp.27-31 |
SITE, ISEC, LOIS |
2018-11-04 11:00 |
Fukuoka |
|
Development of named entity recognition and polarity analysis function for security incidents. Shinta Nakano, Daisuke Uto, Yuichiro Kurosawa, Masaki Hanada, Yoichi Murakami, Eiji Nunohiro (TUIS) ISEC2018-74 SITE2018-52 LOIS2018-34 |
The authors focused on analyzing the information related to security incidents from articles on news sites published on ... [more] |
ISEC2018-74 SITE2018-52 LOIS2018-34 pp.57-62 |
ICTSSL |
2018-07-17 13:25 |
Tokyo |
NTT Musashino R&D Center |
Study on Estimating Risk in Incident Response by Analyzing Flows of Communication logs Naoko Kosaka, Akira Koyama, Tsuneko Kura, Yoshihiro Yoshida, Koji Kishi (NTT) ICTSSL2018-17 |
The emergency management handled by the staffs in decision making and planning layers of the organization can be broadly... [more] |
ICTSSL2018-17 pp.7-12 |
KBSE |
2018-03-02 16:30 |
Okinawa |
|
Analysis of “Hiyari-Hatto” Incidents Reported by Maintenance Service Engineers Nobuhiko Mizusawa (Fujitsu Fsas), Takako Nakatani (OUJ) KBSE2017-63 |
The purpose of the research is to reduce “Hiyari-Hatto” incidents of hardware maintenance service engineers (hereinafter... [more] |
KBSE2017-63 pp.145-150 |
IN |
2018-01-23 14:50 |
Aichi |
WINC AICHI |
BPM Estimation of Anime Incidental Music by Multiple Regression Analysis of Spoken Lines Yuta Ito, Komei Arasawa, Shun Hattori (Muroran Inst. of Tech.) IN2017-88 |
Incidental music is background music of TV drama, anime, films, Plays, and so forth, and it is an important element to d... [more] |
IN2017-88 pp.97-102 |
MoNA, LOIS, IPSJ-DC |
2017-07-06 14:30 |
Tokyo |
|
Information sharing and interorganizational collaboration on management of large-scale international sports tournaments and incident response Naoko Kosaka, Akira Koyama, Tsuneko Kura, Koji Kishi (NTT), Tadayoshi Maruyama, Koichi Takamatsu (Organising Committee) MoNA2017-11 LOIS2017-9 |
Various risks are assumed at large international sporting events depending on the environment of the venue. The main tas... [more] |
MoNA2017-11 LOIS2017-9 pp.21-26 |
ICSS, IPSJ-SPT |
2017-03-13 13:25 |
Nagasaki |
University of Nagasaki |
Modeling of Attack Activity for Integrated Analysis of Threat Information Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47 |
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] |
ICSS2016-47 pp.7-12 |
KBSE |
2017-03-04 13:20 |
Ishikawa |
|
Analysis and Consideration on Human Errors Using Text-Mining Techniques Based on Reported Incidents Nobuhiko Mizusawa (Fujitsu Fsas/OUJ), Takeo Tatsumi (OUJ), Yuko Murakami (Tohoku Univ.), Takako Nakatani (OUJ) KBSE2016-48 |
Recently, information systems as part of important social infrastructure used to support human lives are highly complexe... [more] |
KBSE2016-48 pp.55-60 |
ICSS, IPSJ-SPT |
2016-03-03 16:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) ICSS2015-53 |
Organization introducing ICT systems needs to properly respond to the information security incidents. In contrast, recen... [more] |
ICSS2015-53 pp.35-40 |
ICSS |
2015-11-26 14:10 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Traffic Analysis to Identify Unintended Impact on Business Caused by an Incident Response Minori Shiota, Yukiko Yamaguchi, Hajime Shiimada (Nagoya Univ), Hiroki Takakura (NII) ICSS2015-36 |
To confront recent sophisticated targeted attacks, we have to prevent the theft of information and the destruction of th... [more] |
ICSS2015-36 pp.7-12 |
MW (2nd) |
2014-11-26 - 2014-11-28 |
Overseas |
King Mongkut's Institute of Technology Ladkrabang (KMITL), Bangkok |
Analysis of Electromagnetic Diffraction from Planar Material Junction by Using an Approximate UTD Ray Solution Montree Saowadee, Titipong Lertwiriyaprapa, Suramate Chalermwisutkul (KMUTNB) |
An approximate UTD ray solution of an oblique incident wave for analyzing an electromagnetic (EM) wave diffracted by a p... [more] |
|
ICSS |
2011-03-25 10:45 |
Tokyo |
Suspended |
Proposal of an Order Preserving Encryption for Anonymity Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) ICSS2010-57 |
The study of Order Preserving Encryption (OPE) is focusing much attention by researchers. OPE is able to anonymize the n... [more] |
ICSS2010-57 pp.5-10 |
ICSS |
2010-11-05 11:20 |
Hiroshima |
Hiroshima City University |
Proposal of Time-limited Key Management Scheme Using One-way Functions Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46 |
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] |
ICSS2010-46 pp.11-15 |
IA, ICSS |
2010-06-17 15:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II) Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6 |
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] |
IA2010-6 ICSS2010-6 pp.31-36 |
ICSS |
2010-03-26 16:20 |
Fukuoka |
The University of Kitakyushu |
Relative Analysis of Malware Behavior based on Function Calls in Parallel Threads Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-68 |
The Internet has been surrounded by various security threats. Malwares, such as computer virus, worm and bot, always pla... [more] |
ICSS2009-68 pp.35-39 |
NLC |
2010-01-26 11:15 |
Hiroshima |
Machizukuri Shimin Kouryu Plaza, Hiroshima City |
Analytical system of incident reports by concept lattice Takahiro Baba, ChunLing Liu, Sachio Hirokawa (Kyushu Univ) NLC2009-46 |
It is known that a lot of incidents has happened ahead of a serious
accident. Such experiences have been collected in m... [more] |
NLC2009-46 pp.79-83 |