IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-22
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection.
Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] ICSS2023-90
pp.153-159
ICSS, IPSJ-SPT 2023-03-13
17:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more]
ICSS2022-66
pp.109-114
IA, ICSS 2021-06-22
09:25
Online Online Analtsis of cost-effectiveness in malicious site detection using VirusTotal
Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more]
IA2021-10 ICSS2021-10
pp.50-55
WBS, IT, ISEC 2021-03-05
14:45
Online Online Consideration of embedding methods and machine learning models for detecting malicious URLs
Qisheng Chen, Kazumasa omote (Univ. of Tsukuba) IT2020-157 ISEC2020-87 WBS2020-76
Nowadays, Internet access is becoming more and more popular, which makes the harm of malicious websites more and more se... [more] IT2020-157 ISEC2020-87 WBS2020-76
pp.281-287
ICSS, IPSJ-SPT 2021-03-02
09:35
Online Online An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log
Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] ICSS2020-55
pp.172-177
IA 2020-10-01
11:15
Online Online Malicious URLs Detection Using an Integrated AI Framework
Bo-Xiang Wang, Ren-Feng Deng, Yi-Wei Ma, Jiann-Liang Chen (NTUST) IA2020-1
Malicious attacks on computer networks are quite common, and the internet attacks are even more widespread, such as Malv... [more] IA2020-1
pp.1-5
IA 2019-11-15
13:15
Tokyo Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) Malicious URL Classification using Machine Learning Techniques
Yu-Chen Chen, Li-Dong Chen, Yan-Ju Chen, Jiann-Liang Chen (NTUST) IA2019-41
The Website security is an important research topic that must be pursued to protect internet users. Traditionally, black... [more] IA2019-41
pp.79-83
ICSS 2019-11-13
14:55
Miyazaki MRT Terrace(Miyazaki) ICSS2019-63 E-mail has been one of the most widely used tools for computer-based communication since the early days of the Internet.... [more] ICSS2019-63
pp.19-23
IN, NS
(Joint)
2019-03-05
11:30
Okinawa Okinawa Convention Center A study on Maliciousness Measurement in Cyber Threat Intelligence Using Graph Convolutional Networks
Yuta Kazato, Yoshihide Nakagawa, Yuichi Nakatani (NTT) IN2018-128
Cyber threat information (CTI) sharing is one of the important functions to protect end-users and services from cyber-at... [more] IN2018-128
pp.265-270
ICSS 2014-11-28
11:10
Miyagi Tohoku Gakuin University (Tagajo Campus) searching malicious URL from vast webspace
Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more]
ICSS2014-61
pp.61-66
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more]
ICSS2013-71
pp.53-58
ICSS 2010-11-05
16:00
Hiroshima Hiroshima City University Determining granularity of URL filtering based on tree structure of malicious website URL
Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) ICSS2010-53
A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious we... [more] ICSS2010-53
pp.53-58
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan