Online edition: ISSN 2432-6380
[TOP] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [Japanese] / [English]
ICSS2018-53
Development of remote LAN monitoring system
Katsuya Matsuoka, Masaya Mizutani, Hideya Ochiai, Hiroshi Esaki (UT)
pp. 1 - 6
ICSS2018-54
Investigation of Security-Related Factors of Satisfactions in Internet Services
Yukiko Sawaya, Akira Yamada, Ayumu Kubota (KDDI Research)
pp. 7 - 12
ICSS2018-55
[Invited Talk]
Advanced R&D Required at the Leading Edge of Cybersecurity
Takeshi Yagi (NTT Security Japan)
pp. 13 - 18
ICSS2018-56
Spoofed Website Detection using Machine Learning
Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto (Institute of Information Security)
pp. 19 - 24
ICSS2018-57
Malware Analysis Method Using Conditional Generative Adversarial Network
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT)
pp. 25 - 30
ICSS2018-58
(See Japanese page.)
pp. 31 - 36
ICSS2018-59
[Invited Talk]
Security Countermeasure at ShowNet in Interop Tokyo 2018
Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum)
p. 37
ICSS2018-60
(See Japanese page.)
pp. 39 - 44
ICSS2018-61
(See Japanese page.)
pp. 45 - 48
ICSS2018-62
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
pp. 49 - 54
ICSS2018-63
[Invited Talk]
An Overview of Cyber Security for Connected Vehicles
Junko Takahashi (NTT)
pp. 55 - 59
ICSS2018-64
(See Japanese page.)
pp. 61 - 66
ICSS2018-65
(See Japanese page.)
pp. 67 - 72
ICSS2018-66
Part II: Calculating Similarity between IoT Malware over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT)
pp. 73 - 78
ICSS2018-67
(See Japanese page.)
pp. 79 - 84
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.