{"id":3557,"date":"2021-02-03T12:01:45","date_gmt":"2021-02-03T03:01:45","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=3557"},"modified":"2021-12-20T16:25:40","modified_gmt":"2021-12-20T07:25:40","slug":"results2020","status":"publish","type":"page","link":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/results-final\/results2020\/","title":{"rendered":"Research Results\uff5cin 2020"},"content":{"rendered":"<p><a href=\"#paper\">Paper Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/a>\u3000\u3000<a href=\"#presentation\">Conference Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/a>\u3000<a id=\"paper\"><\/a><\/p>\n<h2>Paper Presentation<\/h2>\n<h4>Collaborative Papers with Japan &#8211; India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #ababab\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Author<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 87px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Publisher<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Volume<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Number<\/td>\n<td style=\"width: 3%;border-style: solid;border-color: #ababab;height: 87px\">Page<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Published year<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Geeta Yadav,<br \/>\nKolin Paul,<br \/>\nAlaa Allakany,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">IoT-PEN: An E2E Penetration Testing Framework for IoT<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Journal of Information Processing (IPSJ)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">28<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 3%;border-style: solid;border-color: #ababab;vertical-align: top\">633-642<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Sep<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Chenguang Ma,<br \/>\nSrishti Kulshrestha,<br \/>\nWei Shi,<br \/>\nKosuke Kaneko,<br \/>\nAkira Haga,<br \/>\nYoshihiro Okada,<br \/>\nRanjan Bose,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Integrated Development Frameworks Based on Linked Data for Web-Based Interactive Educational Materials<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Journal of Computer &amp; Software Engineering (IJCSE)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">5<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">2<\/td>\n<td style=\"width: 3%;border-style: solid;border-color: #ababab;vertical-align: top\">160<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Dec<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Single-Authored Papers of Japan research team<\/h4>\n<p>&nbsp;<\/p>\n<table style=\"width: 100%;border-style: solid;border-color: #ababab;height: 387px\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Author<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 87px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 87px\">Publisher<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Volume<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Number<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Page<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;height: 87px\">Published year<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;height: 87px\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Ariel Rodriguez,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Enhancing data quality in real-time threat intelligence systems using machine learning<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Social Network Analysis and Mining (SNAM),Springer<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">10<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">1<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">1-22<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Nov<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Yan Naung Soe,<br \/>\nYaokai Feng,<br \/>\nPaulus Insap Santosa,<br \/>\nRudy Hartanto,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sensors<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">20<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">16<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">4372<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Aug<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Hao Zhao,<br \/>\nYaokai Feng,<br \/>\nHiroshi Koide,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">International Symposium on Computing and Networking(CANDAR)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">10<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">2<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">213-226<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Hikaru Yamamura,<br \/>\nReihaneh Morid,<br \/>\nNuren Abedin,<br \/>\nFirouzeh Javadi,<br \/>\nDaisuke Ikeda,<br \/>\nWei Shi,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">A Development Framework for RP-type Serious Games in a 3D Virtual Environment<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 11th International Workshop on Virtual Environment and Network-Oriented Applications (VENOA-2020) in Proceedings of CISIS-2020<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">166-176<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Jun<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Kosuke Kaneko,<br \/>\nKe Yan,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Simulation System of Autonomous Vehicles for Overtaking Service Using Smart Contract<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 11th International Workshop on Virtual Environment and Network-Oriented Applications (VENOA-2020) in Proceedings of CISIS-2020<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">199-209<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Jun<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Wei Shi,<br \/>\nAkira Haga,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Web-based 3D and 360\u00b0VR Materials for IoT Security Education Supporting Learning Analytics<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 9-th International Conference on<br \/>\nEmerging Internet, Data &amp; Web Technologies(EIDWT-2021)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Piyush Ghasiya,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Investigating COVID-19 News Across Four Nations: A Topic Modeling and Sentiment Analysis Approach<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Journal of IEEE Access<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">9<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">36645-36656<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2021<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Mar<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Piyush Ghasiya,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Understanding the Middle East through the eyes of Japan\u2019s Newspapers: A topic modelling and sentiment analysis approach<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Journal of Digital Scholarship in the Humanities<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2021<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Mar<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Haibo Zhang,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">A Survey of Software Clone Detection\u3000from Security Perspective<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Journal of IEEE Access<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">9<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">48157-48173<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2021<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Mar<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Tao Wang,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">The 15th International Conference on Ubiquitous Information Management and Communication(IMCOM2021)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">1-7<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2021<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Jan<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Ishak Meraouche,<br \/>\nSabyasachi Dutta,<br \/>\nHaowen Tan,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Neural Networks-Based Cryptography: A Survey<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Journal of IEEE Access<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">9<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">124727-124740<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2021<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Mar<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Single-Authored Papers of India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Author<\/td>\n<td style=\"width: 34.0%;border-style: solid;border-color: #ababab\">Title<\/td>\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Publisher<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab\">Volume<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab\">Number<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab\">Page<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab\">Published year<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab\">Published month<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Sanjiva Prasad,<br \/>\nR. Madhukar Yerraguntla,<br \/>\nSubodh Sharma,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Security Types for Synchronous Data Flow Systems<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">18th International Conference on Formal Methods and Models for System Design(MEMOCODE2020)<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">1-12<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\">Dec<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Chandrika Bhardwaj,<br \/>\nSanjiva Prasad,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Secure Information Flow Connections<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">ArXiv<\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 6%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 4%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Conference Presentation<a id=\"presentation\"><\/a><\/h2>\n<h4>Collaborative Presentation with Japan &#8211; India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Presenter<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 47px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Conference<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;height: 47px\">Venue<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Presented year<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Presented date<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Alaa Allakany,<br \/>\nGeeta Yadav,<br \/>\nKolin Paul,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top\">Detection and Mitigation of LFA Attack in SDN-IoT Network<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top\">Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top\"><\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top\">4\/<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Presentation of Japan research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Presenter<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;height: 47px\">Title<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;height: 47px\">Conference<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;height: 47px\">Venue<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Presented year<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;height: 47px\">Presented date<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 84px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Piyush Ghasiya,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Comparative Analysis of Japan and the US Cybersecurity Related Newspaper Articles: A Content and Sentiment Analysis Approach<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Proceedings of of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\"><\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">4<\/td>\n<\/tr>\n<tr style=\"height: 105px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Ariel Rodriguez,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Cybersecurity Text Data Classification and Optimization for CTI Systems<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\"><\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">4<\/td>\n<\/tr>\n<tr style=\"height: 105px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Yiyi Wang,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Implementation and Evaluation on Automated E-Learning Contents Creation Based on Natural Language Processing Techniques<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\"><\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">4<\/td>\n<\/tr>\n<tr style=\"height: 147px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 147px\">Hikaru Yamamura,<br \/>\nReihaneh Morid,<br \/>\nNuren Abedin,<br \/>\nFirouzeh Javadi,<br \/>\nDaisuke Ikeda,<br \/>\nWei Shi,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 147px\">A Development Framework for RP-type Serious Games in a 3D Virtual Environment<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 147px\">The 11th International Workshop on Virtual Environment and Network-Oriented Applications (VENOA-2020) in CISIS-2020<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 147px\"><\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 147px\">2021<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 147px\">7\/2-3<\/td>\n<\/tr>\n<tr style=\"height: 84px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Wentao Tang,<br \/>\nKenji Hisazumi,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">IoT Devices Sharing System Using Smart Contract<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Proceedings of the Asia Pacific Conference on Robot IoT System Development and Platform (APRIS2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">11\/9-10<\/td>\n<\/tr>\n<tr style=\"height: 63px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Kohei Kubota,<br \/>\nWai Kyi Kyi Oo,<br \/>\nHiroshi Koide,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">A New Feature to Secure Web Applications<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">The 8th International Symposium on Computing and Networking(CANDAR 2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">11\/24-27<\/td>\n<\/tr>\n<tr style=\"height: 63px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Piyush Ghasiya,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">A Comparative Analysis of Japan and India COVID-19 News Using Topic Modeling Approach<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Proceedings of 2nd International Conference on Communication and Intelligent Systems(ICCIS 2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">12\/26-27<\/td>\n<\/tr>\n<tr style=\"height: 84px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Tao Wang,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">The 15th International Conference on Ubiquitous Information Management and Communication(IMCOM2021)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2021<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">1\/4-6<\/td>\n<\/tr>\n<tr style=\"height: 84px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Piyush Ghasiya,<br \/>\nKoji Okamura,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Investigating Cybersecurity News Articles by Applying Topic Modeling Method<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Proceedings of the 35th International Conference on Information Networking (ICOIN 2021)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2021<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">1\/13-16<\/td>\n<\/tr>\n<tr style=\"height: 105px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Daisuke Yamagata,<br \/>\nSatoshi Kawakami,<br \/>\nTeruo Tanimoto,<br \/>\nKoji Inoue,<br \/>\nTakatsugu Ono,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Reducing a position map size of Oblivious RAM for implementing on microprocessors<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">The 38th Symposium on Cryptography and Information Security(SCIS2021)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">2021<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 105px\">1\/19-22<\/td>\n<\/tr>\n<tr style=\"height: 63px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Fupei Lyu,<br \/>\nYaokai Feng,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Detecting DDoS Attack in SDN Environment\u00a0Using Automatic Thresholding Method<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">The 38th Symposium on Cryptography and Information Security(SCIS2021)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2021<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">1\/19-22<\/td>\n<\/tr>\n<tr style=\"height: 63px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Haibo Zhang,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Zero Trust Security Model for Modern Supply Chain Towards Society 5.0<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">The 38th Symposium on Cryptography and Information Security(SCIS2021)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2021<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">1\/19-22<\/td>\n<\/tr>\n<tr style=\"height: 63px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Zhuowei Deng,<br \/>\nKosuke Kaneko,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Privacy Protection for Electricity Transaction Information on Blockchain-based Virtual Power Plant<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">The 38th Symposium on Cryptography and Information Security(SCIS2021)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2021<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">1\/19-22<\/td>\n<\/tr>\n<tr style=\"height: 84px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Wei Shi,<br \/>\nAkira Haga,<br \/>\nYoshihiro Okada,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Web-based 3D and 360\u00b0VR Materials for IoT Security Education Supporting Learning Analytics<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">The 9-th International Conference on<br \/>\nEmerging Internet, Data &amp; Web Technologies(EIDWT-2021)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2021<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 84px\">2\/25-27<\/td>\n<\/tr>\n<tr style=\"height: 63px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Li Heming,<br \/>\nKosuke Kaneko,<br \/>\nKoichi Sakurai,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Security Mechanism in Volunteer Computing System by Using Blockchain and Smart Contract<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2021 IEICE General Conference<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">Online<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">2021<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 63px\">3\/9-12<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Presentation of India research team<\/h4>\n<table style=\"width: 100%;border-style: solid;border-color: #e5e5e5\" border=\"1px\" cellspacing=\"0px\" cellpadding=\"0px\">\n<thead>\n<tr style=\"background-color: #e5e5e5\">\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Presenter<\/td>\n<td style=\"width: 34.0%;border-style: solid;border-color: #ababab\">Title<\/td>\n<td style=\"width: 20.0%;border-style: solid;border-color: #ababab\">Conference<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab\">Venue<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab\">Presented year<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab\">Presented date<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 21px\">\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 21px\">Sanjiva Prasad,<br \/>\nR. Madhukar Yerraguntla,<br \/>\nSubodh Sharma,<\/td>\n<td style=\"width: 34%;border-style: solid;border-color: #ababab;vertical-align: top;height: 21px\">Security Types for Synchronous Data Flow Systems<\/td>\n<td style=\"width: 20%;border-style: solid;border-color: #ababab;vertical-align: top;height: 21px\">The 18th ACM-IEEE International Conference on Formal Methods and Models for System Design(MEMOCODE 2020)<\/td>\n<td style=\"width: 10%;border-style: solid;border-color: #ababab;vertical-align: top;height: 21px\">Virtual<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 21px\">2020<\/td>\n<td style=\"width: 8%;border-style: solid;border-color: #ababab;vertical-align: top;height: 21px\">12\/2-4<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paper Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]\u3000\u3000Conference Presentation[icon name=&#8221;arrow-circle-right&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]\u3000 Paper Presentation Collaborative Papers with Japan &#8211; India research team Author Title Publisher Volume Number Page Published year Published month Geeta Yadav, Kolin Paul, Alaa Allakany, Koji Okamura, IoT-PEN: An E2E Penetration Testing Framework for IoT Journal of Information Processing (IPSJ) 28 633-642 2020 Sep Chenguang [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"parent":3270,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"_g2\/page-onecolumn.php","meta":{"_locale":"en_US","_original_post":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=3550"},"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3557"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/comments?post=3557"}],"version-history":[{"count":13,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3557\/revisions"}],"predecessor-version":[{"id":4004,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3557\/revisions\/4004"}],"up":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3270"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/media?parent=3557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}