Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IA |
2018-06-25 13:00 |
Ehime |
Ehime University |
A Study on the structure and Its Classification Naoya Nitta, Masakatu Morii (Kobe Univ.) IA2018-1 ICSS2018-1 |
[more] |
IA2018-1 ICSS2018-1 pp.1-6 |
ICSS, IA |
2018-06-25 13:25 |
Ehime |
Ehime University |
Calculating Similarity between IoT Malware Samples over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2 |
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more] |
IA2018-2 ICSS2018-2 pp.7-12 |
ICSS, IA |
2018-06-25 13:50 |
Ehime |
Ehime University |
Malware Classification Based on Data Compression Algorithm and Its Evaluation Sohei Takechi, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ) IA2018-3 ICSS2018-3 |
[more] |
IA2018-3 ICSS2018-3 pp.13-18 |
ICSS, IA |
2018-06-25 14:25 |
Ehime |
Ehime University |
Designing network control system for industrial IoT security Yutaka Oiwa (AIST), Ray Atarashi (IIJ-II), Yoshifumi Atarashi, Toru Asahina (Alaxala) IA2018-4 ICSS2018-4 |
[more] |
IA2018-4 ICSS2018-4 pp.19-26 |
ICSS, IA |
2018-06-25 14:50 |
Ehime |
Ehime University |
Survey on current situation of incorrect setting of DNS server Akira Sato (Univ. of Tsukuba), Kazunori Fujiwara (JPRS), Takaho Omuro, Kodai Watanabe, Kenichi Yoshida (Univ. of Tsukuba) IA2018-5 ICSS2018-5 |
It is necessary for the stable operation of the Internet that DNS (Domain Name System) can be used normally. Currently, ... [more] |
IA2018-5 ICSS2018-5 pp.27-31 |
ICSS, IA |
2018-06-25 15:25 |
Ehime |
Ehime University |
The Existence of the QR Code Guiding to a Malicious Web Site and a Counterfeit Attack Using It Okuma Hiroya, Makoto Takita, Masakatu Morii (Kobe Univ.) IA2018-6 ICSS2018-6 |
(To be available after the conference date) [more] |
IA2018-6 ICSS2018-6 pp.33-38 |
ICSS, IA |
2018-06-25 15:50 |
Ehime |
Ehime University |
IA2018-7 ICSS2018-7 |
[more] |
IA2018-7 ICSS2018-7 pp.39-45 |
ICSS, IA |
2018-06-25 16:20 |
Ehime |
Ehime University |
|
[more] |
|
ICSS, IA |
2018-06-26 09:00 |
Ehime |
Ehime University |
IA2018-8 ICSS2018-8 |
(To be available after the conference date) [more] |
IA2018-8 ICSS2018-8 pp.47-54 |
ICSS, IA |
2018-06-26 09:25 |
Ehime |
Ehime University |
A consideration on the possibility of automatic classifying for anomalous posts on Twitter Ryutaro Ushigome (NICT/Chuo Univ), Takeshi Matsuda (Univ of Nagasaki), Michio Sonoda, Takeshi Takahashi, Mio Suzuki (NICT), Jinhui Chao (Chuo Univ) IA2018-9 ICSS2018-9 |
A lot of information has been posted on the SNS, including not only erroneous information and inappropriate writing, but... [more] |
IA2018-9 ICSS2018-9 pp.55-60 |
ICSS, IA |
2018-06-26 09:50 |
Ehime |
Ehime University |
Proposal of Sparse-Modeling based Approach for Betweenness Centrality Estimation Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2018-10 ICSS2018-10 |
In recent years, a statistical approach for estimating unobserved model parameters from a small number of observations u... [more] |
IA2018-10 ICSS2018-10 pp.61-66 |
ICSS, IA |
2018-06-26 10:15 |
Ehime |
Ehime University |
A study of applying SDN to the operational challenges of multi-service wide-area IP network Aki Fukuda, Hitoshi Irino, Yoshinori Koike, Hirotaka Yoshioka (NTT) IA2018-11 ICSS2018-11 |
[more] |
IA2018-11 ICSS2018-11 pp.67-72 |
ICSS, IA |
2018-06-26 10:45 |
Ehime |
Ehime University |
[Invited Talk]
Security Analysis with Formal Methods Naoto Yanai (Osaka Univ.) IA2018-12 ICSS2018-12 |
For security analysis of information security researches, a method with a formal proof has attracted attention in recent... [more] |
IA2018-12 ICSS2018-12 pp.73-75 |
ICSS, IA |
2018-06-26 11:40 |
Ehime |
Ehime University |
A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13 |
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] |
IA2018-13 ICSS2018-13 pp.77-82 |
ICSS, IA |
2018-06-26 12:05 |
Ehime |
Ehime University |
Sho Minami, Takashi Nishide (The Univ. of Tsukuba) IA2018-14 ICSS2018-14 |
Ransomwares are a kind of malwares. If infected with ransomwares, files in a computer are automatically encrypted, and t... [more] |
IA2018-14 ICSS2018-14 pp.83-89 |
ICSS, IA |
2018-06-26 12:30 |
Ehime |
Ehime University |
Datagram TLS extensions for multipath communication Seiya Nuta, Takashi Nishide (Univ. of Tsukuba) IA2018-15 ICSS2018-15 |
Multiple network paths are often available as smartphones are equipped with 4G and Wi-Fi network interfaces. In TCP, Mul... [more] |
IA2018-15 ICSS2018-15 pp.91-96 |