Online edition: ISSN 2432-6380
[TOP] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [Japanese] / [English]
ICSS2018-68
Performance survey for IoT security function on smartphone
Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT)
pp. 1 - 6
ICSS2018-69
How to build malware sandbox using real IoT devices
Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 7 - 12
ICSS2018-70
A Method for Realizing Traceability of Security Requirements for Information Systems deployed in Public Cloud using GSN
Ryo Hase, Yohei Matsuura (Mitsubishi Electric)
pp. 13 - 18
ICSS2018-71
Regulatory Compliance Monitoring on the Web Using Paragraph Vector
Mitsuharu Sasaki (NTT EAST), Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya (NTT)
pp. 19 - 24
ICSS2018-72
On Improvement of a White-box Cryptographic Scheme
Masakazu Soshi (Hiroshima City Univ.)
pp. 25 - 27
ICSS2018-73
Implementation and evaluation of aggregate message authentication method
Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU)
pp. 29 - 33
ICSS2018-74
A User Participation Type Web Security Platform and Its Real World Evaluation
Akira Yamada, Yukiko Sawaya, Takashi Matsunaka, Shoma Tanaka, Ayumu Kubota (KDDI Research)
pp. 35 - 40
ICSS2018-75
An experiment design of security notification to users of IoT devices through dedicated client software
Shin Nishida, Takuya Hoizumi, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 41 - 46
ICSS2018-76
Analyzing Deceptive Internationalized Domain Names
Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT)
pp. 47 - 52
ICSS2018-77
Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data
Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security)
pp. 53 - 58
ICSS2018-78
(See Japanese page.)
pp. 89 - 94
ICSS2018-79
(See Japanese page.)
pp. 95 - 100
ICSS2018-80
(See Japanese page.)
pp. 101 - 104
ICSS2018-81
Threat Information Analysis Using Conditional Generative Adversarial Network
Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT)
pp. 105 - 110
ICSS2018-82
A proposal of detection method of singed malicious program
Hiroyuki Sakakibara, Kiyoto Kawauchi (Mitsubishi Electric)
pp. 139 - 144
ICSS2018-83
Report on 35th Chaos Computer Congress(35C3)
Keisuke Kito (Mitsubishi Electric)
pp. 145 - 148
ICSS2018-84
Authentication with hash chain computation model
Shinta Hirai, Masakazu Soshi (Hiroshima City Univ.)
pp. 149 - 153
ICSS2018-85
(See Japanese page.)
pp. 155 - 160
ICSS2018-86
(See Japanese page.)
pp. 161 - 166
ICSS2018-87
Traffic analysis to detect abnormal smartphone application behavior
Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT)
pp. 167 - 172
ICSS2018-88
Period Analysis for Visualization of Industrial Network
Hiroki Nagayama, Hu Bo, Kazunori Kamiya, Shingo Kashima, Masaki Tanikawa (NTT)
pp. 173 - 178
ICSS2018-89
Understanding DNS over TLS: Performance Evaluation and Large-scale Measurement Study
Masahiro Maki, Tatsuya Mori (Waseda Univ.)
pp. 179 - 184
ICSS2018-90
Proposal of a Non-Technical Skills Map for Computer Security Incident Responses
Takahiro Kasama, Shingo Yasuda, Hironobu Satoh (NICT), Masaki Kamizono, Emi Kojima (PwC), Takao Yamaguchi, Kazuharu Nara (JAMSS)
pp. 185 - 190
ICSS2018-91
(See Japanese page.)
pp. 191 - 196
ICSS2018-92
A Trouble Ticket System Specialized for Incident Response
Yu Tsuda, Takashi Tomine (NICT), Masato Jingu (NICT/HISYS), Keisuke Iwasaki (NTT-AT), Kenjiro Terada, Daisuke Inoue (NICT)
pp. 197 - 202
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.