Member
Professor : Atsuhiro Goto
Atsuhiro Goto currently serves as President and Professor, Graduate School of Information Security, Institute of Information Security (IISEC), Japan.
He is a leader of the nationwide graduate schools education program, enPiT-Security, which will bring up promising IT experts with the newest information security professional skills.
He also works as Program Director for SIP "Cybersecurity for Critical Infrastructures", Cabinet Office, Government of Japan.
He was a member of the Board of Governors IEEE Computer Society from 2011 to 2016.
Visiting Researcher
Name | Research Theme |
---|---|
Satoshi Agatsuma | Building an unified risk assessment model for Information Technology (IT) and Operational Technology (OT) |
Michihiko Anzai | A study of Instrumentation Security about measuring system connected the network |
Yoshifumi Itou | Analysis of security threats and proposal of protection methodologies in the public cloud use |
Yukari Kurosaki | A cross‐national comparison of Insider Threat Risk in Global Business Environment |
Shinya Sakata | Study on IT Governance in Corporate M & A |
Chiharu Sasaki | Human resources development for the labour force decline |
Toshiya Sugii | Study on system management method for malware detection |
Yasuyuki Sekimoto | Proposal of remote updating function software requirements in specified measuring instruments for related regulations and international standards |
Yasuyuki Tanaka | |
Jun Nakamoto | Research on automation and visualization of incident response |
Takahiro Nishimura | |
Masahito Hashimoto | consideration of various issues concerning Cloud Computing introduction in government information system |
Hiroki Hada | BinGrep: Proposing the efficient static analysis method by searching for the function from previously analyzed malware |
Takahiko Makino | Research on internet separation and communication sanitization |
Ichiro Mizukoshi | security issues in "the Internet of Things(IoT)" Vulnerability & Update |
Mamoru Mimura | Using Machine Learning Techniques for Intrusion Detection |
Yasuhiro Murasaki | A Study on Necessity and Limitation of Exceptional Rules Concerning the Information Security Policy |
Shigeo Mori | Study on Effective and Efficient Countermeasures against Cyber Attacks |
Kohei Watanabe | Study on Organizational Crossing and Incident Management |
D
Name | Research Theme |
---|---|
Taichi Aoki | Construction method of traffic analysis system for de-anonymize of Tor |
Kosuke Ito | Research on Secure Developmennt Framework for IoT System Industries |
Akiyoshi Kokaji | Systematization and proposal of governance concerning cyber security in financial institutions |
Seiichi Komura | A components model of information security incident management for deployment and collaboration in multiple organizations |
Yukio Shimamoto | A study of ICT risk reduction for middle-aged and elderly workers in an aging society with low birthrate ** Text Mining of Phishing Emails to Deceive Elderly People ** |
M 2
Name | Research Theme |
---|---|
Kiyomune Araki | Research on issues of attack detection technology for web applications |
Hideo Kamijyo | Proposal for establishing rules related to privacy in the digital age |
Kumi Sugimoto | Consideration of Security Risks from the Perspective of SDN Introduction Objectives |
M 1
Name | Research Theme |
---|---|
Mizuki Ueno | Keyword : Malware, IoT, Blockchain |
Keisuke Oki | Keyword : IoT security, Side Channel Attack |
Atsuki Omura | Keyword : CSIRT, SOC, EDR/MDR, OSINT, Zerotrust |
Soichiro Takahama | Keyword : Supply Chain Security, Zerotrust, Active Defence |
Rui Matsuda | Keyword : "Online + Offline" Combined Security |
Ei Morita | Keyword : Cyber Criminal Law, Cyber Administrative Law, Education and Information Security |
Graduates
March, 2021 Master's degree
Name | Research Theme |
---|---|
Kohei Watanabe | Study on Organizational Crossing and Incident Management |
September, 2020 Master's degree
Name | Research Theme |
---|---|
Michihiko Anzai | A study of Instrumentation Security about measuring system connected the network |
Akiyoshi Kokaji | Systematization and proposal of governance concerning cyber security in financial institutions |
March, 2020 Master's degree
Name | Research Theme |
---|---|
Satoshi Agatsuma | Building an unified risk assessment model for Information Technology (IT) and Operational Technology (OT) |
Yoshifumi Itou | Analysis of security threats and proposal of protection methodologies in the public cloud use |
Shinya Sakata | Study on IT Governance in Corporate M & A |
Chiharu Sasaki | Human resources development for the labour force decline |
Yasuyuki Sekimoto | Proposal of remote updating function software requirements in specified measuring instruments for related regulations and international standards |
Satoshi Nakagawa | TBD |
Jun Nakamoto | Research on automation and visualization of incident response |
March, 2019 Doctoral degree
Name | Research Theme |
---|---|
Shigeo Mori | Proposals of Checking Method and Tool for National Cybersecurity Capacity Enhancement |
Hiroki HADA | BinGrep: Proposing the efficient static analysis method by searching for the function from previously analyzed malware |
March, 2019 Master's degree
Name | Research Theme |
---|---|
Yukari Kurosaki | Methods to Enhance Information Security Controls for Internal Improprieties in Global Business Environments |
Kazunari Nojima | Enhancing enterprise network security by utilizing SD-WAN |
Masahito Hashimoto | consideration of Cloud Service introduction in government information system |
Tomoyuki Higuchi | Efficient and effective information security risk analysis in manufacturing companies |
Takahiko Makino | Impact Analysis and Newly Created Problems Solutions of "Local Government Security Toughening" and "Security Cloud" |
September, 2018 Master's degree
Name | Research Theme |
---|---|
Toshiya Sugii | Study on system management method for malware detection |
March, 2018 Doctoral degree
Name | Research Theme |
---|---|
Yasuyuki Tanaka | Malware Detection using Statistical Techniques |
March, 2018 Master's degree
Name | Research Theme |
---|---|
Hiroyuki Kinoshita | The Approach for the Information Ethics with Philosophy of Information |
Yuki Akama | study on tampering data detection method in big data system |
Masato Kawasaki | Study on corporate value fluctuation based on disclosure of security incident information |
Kana Nakashima | Semi-Internal Criminals in the Connected Manufacturing |
March, 2017 Master's degree
Name | Research Theme |
---|---|
Junichiro Amano | Proposal of automated OSINT acquisition amd tag generation system - Empowering threat intelligence for cyber-analysts - |
Yuki Ishii | Study on Detecting Indications of Cyber-Attacks using Pressure |
Shuhei Okada | Financial Cyber Kill Chain for countermeasures against financial frauds |
Masahiko Kuwata | Proposal and Evaluation on Context-based Access Control Scheme in Mobility IoT(Internet of Things) |
Masahiro Hasegawa | Consideration of corporate cloud service for managing OS update of smartphone |
Tsuyoshi Miyasaka | On efficient information gathering in small-scale CSIRT |
September, 2016 Master's degree
Name | Research Theme |
---|---|
Eiji Kamigauchi | A Study on Web access log utilization for understanding of organizational climate changes |
March, 2016 Master's degree
Name | Research Theme |
---|---|
Kazuya Nagahashi | A study about use of the smart devices in infrastructure maintenance |
Satoshi Iizuka | the optimal measure against network security when using the Cloud system |
Osamu Ueda | Vulnerability of information security software and development of verification solution for reliability evaluation Technology |
Shinya Hada | the optimal security countermeasures according to the information asset value at the time of cloud service use |
March, 2015 Master's degree
Name | Research Theme |
---|---|
Yukari Ishizaki | Research on the detection accuracy improvement of WAF |
Yasuyuki Tanaka | Research on an attack code |
March, 2014 Master's degree
Name | Research Theme |
---|---|
Takuma Iwabuchi | Reducing corporate ID management cost by fully utilizing cloud services |
Hitoshi Osanai | Information Security Exchange Architecture |
Yuichi Kimura | Web Application Security |
March, 2013 Master's degree
Name | Research Theme |
---|---|
Hiroki Hada | Malware Analysis |
Rika Hayashi | Visualization of Android security |
Takamichi Aso | Security of Sensor Data. |
September, 2012 Master's degree
Name | Research Theme |
---|---|
Takahiro Nishimura | Utilization Model and Issues for Smartphone on Remote Desktop |