IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2018)

Search Results: Keywords 'from:2018-06-25 to:2018-06-25'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IA 2018-06-25
13:00
Ehime Ehime University A Study on the structure and Its Classification
Naoya Nitta, Masakatu Morii (Kobe Univ.) IA2018-1 ICSS2018-1
 [more] IA2018-1 ICSS2018-1
pp.1-6
ICSS, IA 2018-06-25
13:25
Ehime Ehime University Calculating Similarity between IoT Malware Samples over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more]
IA2018-2 ICSS2018-2
pp.7-12
ICSS, IA 2018-06-25
13:50
Ehime Ehime University Malware Classification Based on Data Compression Algorithm and Its Evaluation
Sohei Takechi, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ) IA2018-3 ICSS2018-3
 [more] IA2018-3 ICSS2018-3
pp.13-18
ICSS, IA 2018-06-25
14:25
Ehime Ehime University Designing network control system for industrial IoT security
Yutaka Oiwa (AIST), Ray Atarashi (IIJ-II), Yoshifumi Atarashi, Toru Asahina (Alaxala) IA2018-4 ICSS2018-4
 [more] IA2018-4 ICSS2018-4
pp.19-26
ICSS, IA 2018-06-25
14:50
Ehime Ehime University Survey on current situation of incorrect setting of DNS server
Akira Sato (Univ. of Tsukuba), Kazunori Fujiwara (JPRS), Takaho Omuro, Kodai Watanabe, Kenichi Yoshida (Univ. of Tsukuba) IA2018-5 ICSS2018-5
It is necessary for the stable operation of the Internet that DNS (Domain Name System) can be used normally. Currently, ... [more] IA2018-5 ICSS2018-5
pp.27-31
ICSS, IA 2018-06-25
15:25
Ehime Ehime University The Existence of the QR Code Guiding to a Malicious Web Site and a Counterfeit Attack Using It
Okuma Hiroya, Makoto Takita, Masakatu Morii (Kobe Univ.) IA2018-6 ICSS2018-6
(To be available after the conference date) [more] IA2018-6 ICSS2018-6
pp.33-38
ICSS, IA 2018-06-25
15:50
Ehime Ehime University IA2018-7 ICSS2018-7  [more] IA2018-7 ICSS2018-7
pp.39-45
ICSS, IA 2018-06-25
16:20
Ehime Ehime University  [more]
ICSS, IA 2018-06-26
09:00
Ehime Ehime University IA2018-8 ICSS2018-8 (To be available after the conference date) [more] IA2018-8 ICSS2018-8
pp.47-54
ICSS, IA 2018-06-26
09:25
Ehime Ehime University A consideration on the possibility of automatic classifying for anomalous posts on Twitter
Ryutaro Ushigome (NICT/Chuo Univ), Takeshi Matsuda (Univ of Nagasaki), Michio Sonoda, Takeshi Takahashi, Mio Suzuki (NICT), Jinhui Chao (Chuo Univ) IA2018-9 ICSS2018-9
A lot of information has been posted on the SNS, including not only erroneous information and inappropriate writing, but... [more] IA2018-9 ICSS2018-9
pp.55-60
ICSS, IA 2018-06-26
09:50
Ehime Ehime University Proposal of Sparse-Modeling based Approach for Betweenness Centrality Estimation
Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2018-10 ICSS2018-10
In recent years, a statistical approach for estimating unobserved model parameters from a small number of observations u... [more] IA2018-10 ICSS2018-10
pp.61-66
ICSS, IA 2018-06-26
10:15
Ehime Ehime University A study of applying SDN to the operational challenges of multi-service wide-area IP network
Aki Fukuda, Hitoshi Irino, Yoshinori Koike, Hirotaka Yoshioka (NTT) IA2018-11 ICSS2018-11
 [more] IA2018-11 ICSS2018-11
pp.67-72
ICSS, IA 2018-06-26
10:45
Ehime Ehime University [Invited Talk] Security Analysis with Formal Methods
Naoto Yanai (Osaka Univ.) IA2018-12 ICSS2018-12
For security analysis of information security researches, a method with a formal proof has attracted attention in recent... [more] IA2018-12 ICSS2018-12
pp.73-75
ICSS, IA 2018-06-26
11:40
Ehime Ehime University A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] IA2018-13 ICSS2018-13
pp.77-82
ICSS, IA 2018-06-26
12:05
Ehime Ehime University
Sho Minami, Takashi Nishide (The Univ. of Tsukuba) IA2018-14 ICSS2018-14
Ransomwares are a kind of malwares. If infected with ransomwares, files in a computer are automatically encrypted, and t... [more] IA2018-14 ICSS2018-14
pp.83-89
ICSS, IA 2018-06-26
12:30
Ehime Ehime University Datagram TLS extensions for multipath communication
Seiya Nuta, Takashi Nishide (Univ. of Tsukuba) IA2018-15 ICSS2018-15
Multiple network paths are often available as smartphones are equipped with 4G and Wi-Fi network interfaces. In TCP, Mul... [more] IA2018-15 ICSS2018-15
pp.91-96
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan