IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 118, Number 108

Internet Architecture

Workshop Date : 2018-06-25 - 2018-06-26 / Issue Date : 2018-06-18

[PREV] [NEXT]

[TOP] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IA2018-1
A Study on the structure and Its Classification
Naoya Nitta, Masakatu Morii (Kobe Univ.)
pp. 1 - 6

IA2018-2
Calculating Similarity between IoT Malware Samples over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT)
pp. 7 - 12

IA2018-3
Malware Classification Based on Data Compression Algorithm and Its Evaluation
Sohei Takechi, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ)
pp. 13 - 18

IA2018-4
Designing network control system for industrial IoT security
Yutaka Oiwa (AIST), Ray Atarashi (IIJ-II), Yoshifumi Atarashi, Toru Asahina (Alaxala)
pp. 19 - 26

IA2018-5
Survey on current situation of incorrect setting of DNS server
Akira Sato (Univ. of Tsukuba), Kazunori Fujiwara (JPRS), Takaho Omuro, Kodai Watanabe, Kenichi Yoshida (Univ. of Tsukuba)
pp. 27 - 31

IA2018-6
The Existence of the QR Code Guiding to a Malicious Web Site and a Counterfeit Attack Using It
Okuma Hiroya, Makoto Takita, Masakatu Morii (Kobe Univ.)
pp. 33 - 38

IA2018-7
(See Japanese page.)
pp. 39 - 45

IA2018-8
(See Japanese page.)
pp. 47 - 54

IA2018-9
A consideration on the possibility of automatic classifying for anomalous posts on Twitter
Ryutaro Ushigome (NICT/Chuo Univ), Takeshi Matsuda (Univ of Nagasaki), Michio Sonoda, Takeshi Takahashi, Mio Suzuki (NICT), Jinhui Chao (Chuo Univ)
pp. 55 - 60

IA2018-10
Proposal of Sparse-Modeling based Approach for Betweenness Centrality Estimation
Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki (Kwansei Gakuin Univ.)
pp. 61 - 66

IA2018-11
A study of applying SDN to the operational challenges of multi-service wide-area IP network
Aki Fukuda, Hitoshi Irino, Yoshinori Koike, Hirotaka Yoshioka (NTT)
pp. 67 - 72

IA2018-12
[Invited Talk] Security Analysis with Formal Methods
Naoto Yanai (Osaka Univ.)
pp. 73 - 75

IA2018-13
A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT)
pp. 77 - 82

IA2018-14

Sho Minami, Takashi Nishide (The Univ. of Tsukuba)
pp. 83 - 89

IA2018-15
Datagram TLS extensions for multipath communication
Seiya Nuta, Takashi Nishide (Univ. of Tsukuba)
pp. 91 - 96

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan