Online edition: ISSN 2432-6380
[TOP] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [Japanese] / [English]
ICSS2019-60
Recovery method of execution environment infected with ransomware by analyzing time series data of system calls
Hirotaka Hiraki, Hideya Ochiai, Hiroshi Esaki (Tokyo Univ.)
pp. 1 - 5
ICSS2019-61
A Fast Algorithm for Constructing Phylogenetic Trees and Its Evaluation
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT)
pp. 7 - 12
ICSS2019-62
Issue on Adversarial Malware Sample Generation using Reinforcement Learning against Machine Learning Based Malware Detection System
Seiya Takagi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
pp. 13 - 18
ICSS2019-63
(See Japanese page.)
pp. 19 - 23
ICSS2019-64
Detecting Wi-Fi channel-based man-in-the-middle attacks by scanning access points
Sheng Gong, Hideya Ochiai, Hiroshi Esaki (UTokyo)
pp. 25 - 30
ICSS2019-65
Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment
Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
pp. 31 - 36
ICSS2019-66
A study on the side-channel attacks on IoT devices
Rikuta Furuta, Hideya Ochiai, Hiroshi Esaki (UTokyo)
pp. 37 - 40
ICSS2019-67
Study on evaluation system for aggregate message authentication and its application to IoT systems
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC)
pp. 41 - 46
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.