Paper Presentation Conference Presentation
Paper Presentation
Co-authored papers with India research team
Author | Title | Publisher | Volume | Number | Page | Published year | Published month |
Chenguang Ma, Srishti Kulshrestha, Wei Shi, Yoshihiro Okada, Ranjan Bose, |
E-Learning Material Development Framework Supporting VR/AR Based on Linked Data for IoT Security Education | Lecture Notes on Data Engineering and Communications Technologies (LNDECT) | 2017 | Nov | |||
Chenguang Ma, Srishti Kulshrestha, Wei Shi, Yoshihiro Okada, Ranjan Bose, |
EDUCATIONAL MATERIAL DEVELOPMENT FRAMEWORK BASED ON LINKED DATA FOR IOT SECURITY | Proceedings of International Conference of Education, Research and Innovation (ICERI2017) | 8048-8057 | 2017 | Nov | ||
Chenguang Ma, Srishti Kulshrestha, Wei Shi, Yoshihiro Okada, Ranjan Bose, |
LEARNING ANALYTICS FRAMEWORK FOR IOT SECURITY EDUCATION | Proceedings of International Technology, Education and Development Conference (INTED2018) | 9181-9191 | 2018 | Mar |
Co-authored papers with Japan research team
Author | Title | Publisher | Volume | Number | Page | Published year | Published month |
Xiang You, Yaokai Feng, Koichi Sakurai, |
Packet In message based DDoS attack detection in SDN network using OpenFlow | IPSJ SIG Technical Report | 2017 | ||||
Xiang You, Yaokai Feng, Koichi Sakurai, |
Packet In message based DDoS attack detection in SDN network using OpenFlow | International Symposium on Computing and Networking (CANDAR) | 522-528 | 2017 | Nov | ||
Ikuta Tanigawa, Kenji Hisazumi, Harumi Watanabe, Nobuhiko Ogura, Akira Fukuda, |
IoT Robot Simulator and Framework for Context-Oriented Programming | International Workshop on Context-Oriented Programming (COP 2017) | 2017 | Jun | |||
Mihiro Sonoyama, Takatsugu Ono, Osamu Muta, Haruichi Kanaya, Koji Inoue, |
Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics | International Conference on Dependable, Autonomic and Secure Computing (DASC) | 502-510 | 2017 | Nov | ||
Tianxiang Zou, Kenji Hisazumi, Akira Fukuda, |
Toward Security and Privacy Policy Enforcement System for IoT Applications | Proceedings of Embedded System Workshop (ESW2017) | 2017 | 11-13 | 2017 | Nov | |
Fumiya Tanaka, Kenji Hisazumi, Shigemi Ishida, Akira Fukuda, |
A Methodology to Develop Energy Adaptive Software Using Model-Driven Development | IEEE Region 10 International Conference (TENCON) | 769-774 | 2017 | Dec |
Single-authored papers of India research team
Author | Title | Publisher | Volume | Number | Page | Published year | Published month |
Sukrit Kalra, Seep Goel, Mohan Dhawan, Subodh Sharma, |
ZEUS: Analyzing Safety of Smart Contracts | Network and Distributed System Security Symposium (NDSS) | 2018 | ||||
Geeta Yadav, Kolin Paul, |
Architecture and Security of SCADA Systems: A Review | ACM Computing Survey |
Conference Presentation
Collaborative Presentation with Japan – India research team
Presenter | Title | Conference | Venue | Presented year | Presented month |
Chenguang Ma, Srishti Kulshrestha, Wei Shi, Yoshihiro Okada, Ranjan Bose, |
EDUCATIONAL MATERIAL DEVELOPMENT FRAMEWORK BASED ON LINKED DATA FOR IOT SECURITY | 10th annual International Conference of Education, Research and Innovation (ICERI2017) | Seville, Spain, | 2017 | 11/16-18 |
Chenguang Ma, Srishti Kulshrestha, Wei Shi, Yoshihiro Okada, Ranjan Bose, |
LEARNING ANALYTICS FRAMEWORK FOR IOT SECURITY EDUCATION | 12th annual Technology, Education and Development Conference (INTED2018) | Valencia, Spain, | 2018 | 3/5-7 |
Chenguang Ma, Srishti Kulshrestha, Wei Shi, Yoshihiro Okada, Ranjan Bose, |
E-Learning Material Development Framework Supporting VR/AR Based on Linked Data for IoT Security Education | The 6th International Conference on Emerging Internet, Data & Web Technologies (EIDWT 2018) | Tirana, Albania, | 2018 | 3/15-17 |
Presentation of Japan research team
Presenter | Title | Conference | Venue | Presented year | Presented month |
Ikuta Tanigawa, Harumi Watanabe, Nobuhiko Ogura, Kenji Hisazumi, Akira Fukuda, |
IoT Robot Simulator for Context-Sensitive and Live-Adaptive Software Developments | Proceedings of Live Adaptation of Software Systems Workshop (LASSY 2017) | Brussels, Belgium, | 2017 | 4/3 |
Mihiro Sonoyama, Tatsuya Fujii, Takatsugu Ono, Osamu Muta, Koji Inoue, |
Evaluation of received signal strength device authentication method in noisy environment | Workshop for LSI and System in 2017 | The University of Tokyo, Tokyo, Japan, | 2017 | 5/15-16 |
Takatsugu Ono, Koyo Miyamura, Koji Inoue, |
Malware Attacks and Countermeasures in IoT Systems – From the perspective of processor architecture – | IEICE Technical Committee on Hardware Security (HWS) | Aomori, Japan, | 2017 | 6/12-13 |
Ikuta Tanigawa, Kenji Hisazumi, Harumi Watanabe, Nobuhiko Ogura, Akira Fukuda, |
IoT Robot Simulator and Framework for Context-Oriented Programming | International Workshop on Context-Oriented Programming (COP 2017) | Barcelona, Spain, | 2017 | 6/18-23 |
Takatsugu Ono, | Protecting an IoT Device from Malware – A Processor Architecture Perspective | Workshop on Architectural Implications of Security in IoT Processors | Aomori, Japan, | 2017 | 11/1 |
Fumiya Tanaka, Kenji Hisazumi, Shigemi Ishida, Akira Fukuda, |
A Methodology to Develop Energy Adaptive Software Using Model-Driven Development | The 2017 IEEE Region 10 Conference(TENCON) | Penang, Malaysia, | 2017 | 11/5-8 |
Mihiro Sonoyama, Takatsugu Ono, Osamu Muta, Haruichi Kanaya, Koji Inoue, |
Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics | The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing(DASC 2017) | Orlando, Florida, USA | 2017 | 11/6-10 |
Sanouphab Phomkeona, Yoshitatsu Ban, Koji Okamura, |
An Investigation and Analysis Method for Suspicious Zero-day Malicious Emails | Proceedings of International Conference on Internet (ICONI 2017) | Greece, | 2017 | 11/22-24 |
Rin-ichiro Taniguchi, | IoT Applications for Social Services | Workshop on Architectural Implications of Security in IoT Processors | Indian Institute of Technology Delhi, India, | 2017 | 11/28 |
Kazuya Nakayama, | Blockchain System Aiming for Effective Use of Computing Resources | The 79th Computer Security Research Presentation | Kyushu University, Fukuoka, Japan, | 2017 | 12/4 |
Jeanne Faurie, Atsushi Shimada, Maiya Hori, Akira Onoue, Keita Nakayama, Rin-ichiro Taniguchi, |
Behavior analysis of people around Wi-Fi spots | The 15th ITS Symposium in 2017 | Kyushu University, Fukuoka, Japan, | 2017 | 12/7 |
Tianxiang Zou, Kenji Hisazumi, Akira Fukuda, |
Toward Security and Privacy Policy Enforcement System for IoT Applications | Proceedings of Embedded Systems Workshop 2017 (ESW2017) | Tokyo, Japan, | 2017 | 12/9 |
Koji Okamura, | Study on effect about introduction of serious game into Cybersecurity Primary Education | 2017 Academic eXchange for Information Environment and Strategy (AXIES) | International Conference Center Hiroshima, Hiroshima, Japan, | 2017 | 12/13-15 |
Takatsugu Ono, | Secure Computing Platform for IoT Devices | The 6th International Workshop on Cybersecurity (IWCS) | Kyushu University, Fukuoka, Japan, | 2018 | 1/22 |
Takatsugu Ono, | Hardware Security Techniques in IoT era | Kyushu University Institute for Advanced Study Institute of Systems, Information Technologies anResearch Exchange Research Exchange Meeting | Kyushu University, Fukuoka, Japan, | 2018 | 1/29 |
Hiroki Nishida, Kosuke Kaneko, Shota Jojima, Kazuya Nakayama, Yusuke Tsutsumi, Koichi Sakurai, |
Proposal of Secure Information Sharing for Swarm Robot System using Blockchain Technology | 2018 “Hinokuni – Land of Fire” Information Processing Symposium | Nagasaki University, Nagasaki, Japan, | 2018 | 3/1-2 |
Shota Jojima, Kosuke Kaneko, Hiroki Nishida, Yusuke Tsutsumi, Koichi Sakurai, |
Implementation for Neural Network Executed in Secure Distributed Processing using Blockchain | 2018 “Hinokuni – Land of Fire” Information Processing Symposium | Nagasaki University, Nagasaki, Japan, | 2018 | 3/1-2 |
Shunsuke Komiya, Yaokai Feng, Koichi Sakurai, |
How to Prepare for Research on SDN Network | 2018 “Hinokuni – Land of Fire” Information Processing Symposium | Nagasaki University, Nagasaki, Japan, | 2018 | 3/1-2 |
Hitoshi Akimoto, Yaokai Feng, Koichi Sakurai, |
Comparison of detection performance of command & control communication by different feature selection | 2018 “Hinokuni – Land of Fire” Information Processing Symposium | Nagasaki University, Nagasaki, Japan, | 2018 | 3/1-2 |
Koji Okamura, | Security in the IOT Space (Joint-Project between Japan and India) | 45th Asia Pacific Advanced Network (APAN45) Meeting | Singapore, | 2018 | 3/25-29 |
Presentation of India research team
Presenter | Title | Conference | Venue | Presented year | Presented month |
Ismi Abidi, | Potential security threats in the IoT world | The 5th International Workshop on Cybersecurity | Kyushu University, Fukuoka, Japan, | 2017 | 7/14 |
Smruti Ranjan Sarangi, Ismi Abidi, |
Framework for evaluating the cost of security in IoT processors | Workshop on Architectural Implications of Security in IoT Processors | Indian Institute of Technology Delhi, India, | 2017 | 11/28 |
Ismi Abidi, | Framework for evaluating the cost of security in IoT Processors | The 6th International Workshop on Cybersecurity (IWCS) | Kyushu University, Fukuoka, Japan, | 2018 | 1/22 |
Sanjiva Prasad, | Formal foundations of routing in networks | Estonian Winter School in Computer Science (EWSCS’18) | Palmse, Estonia, | 2018 | 3/4-9 |
Sanjiva Prasad, | A LitTLe logic for Mobility | The University of Sheffield, UK | 2018 | 3/5 |