IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 22  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Comparison of accuracy of classification methods using machine learning for imaged malware
Kenta Usui, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96
In recent years, the damage caused by malware has become more serious, and the increase in the number of variants of exi... [more] IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96
pp.254-258
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Improving The Classification Accuracy of Imaged Malware through Data Expansion
Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97
Although malware-based attacks have existed for years,
malware infections increased in 2019 and 2020.
One of the reaso... [more]
IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97
pp.259-264
IA 2023-09-21
14:15
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis
Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] IA2023-12
pp.6-10
R 2022-10-07
14:50
Fukuoka
(Primary: On-site, Secondary: Online)
A Note on A Transformer Encoder-Based Malware Classification Using API Calls
Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] R2022-36
pp.25-30
ICSS 2021-11-30
09:55
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Comparison of CNN padding method using a part of malware API call sequence data with RNN.
Shugo Asai, Yuichi Futa (TUT) ICSS2021-55
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] ICSS2021-55
pp.55-60
ICSS, IPSJ-SPT 2021-03-02
11:05
Online Online Accuracy evaluation of CNNs and random forests with Malware API call sequences
Shugo Asai, Futa Yuichi (TUT) ICSS2020-58
In this paper, we compare the accuracy of the results of classifying each malware family by Random Forest and CNN using ... [more] ICSS2020-58
pp.190-194
ICSS 2018-11-22
14:20
Kagoshima   Part II: Calculating Similarity between IoT Malware over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more]
ICSS2018-66
pp.73-78
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] ICSS2017-69
pp.109-114
ICSS, IPSJ-SPT 2018-03-08
10:35
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Malware Detection Method by Machine Learning Focused on Malignant Activity
Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-71
In recent years, many researches on detection and classification of malware have been done. Among them, researches on te... [more] ICSS2017-71
pp.121-126
ICSS 2017-11-20
15:15
Oita Beppu International Convention Center Preliminary Evaluation on the Program Classification at the Processor Level using Machine Learning
Ryotaro Kobayashi (Kogakuin Univ.), Hayate Takase, Genki Otani, Ren Ohmura (Toyohashi Univ. of Tech.), Masahiko Kato (Univ. of Nagasaki) ICSS2017-39
As use of IoT devices becomes widespread, a lot of things are connected to the Internet, and the convenience of everyday... [more] ICSS2017-39
pp.5-10
ICSS 2017-11-21
10:55
Oita Beppu International Convention Center Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result
Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.) ICSS2017-45
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] ICSS2017-45
pp.41-45
ICSS, IPSJ-SPT 2017-03-13
15:15
Nagasaki University of Nagasaki Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data
Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] ICSS2016-51
pp.43-48
ICSS 2016-11-25
14:15
Kanagawa Institute of Information Security Study of behavior each malware function from the API calls
Nobuki Suetsugu, Masaki Hashimoto (IISEC) ICSS2016-40
In recent years, there are various studies to malicious behavior detection. In particular, for the detection, much techn... [more] ICSS2016-40
pp.9-14
ICSS 2015-03-04
13:40
Okinawa Meio Univiersity The Geographical Origin Estimation of Malware Using Language Information
Masaru Kawakita, Shigeyoshi Shima (NEC) ICSS2014-88
Cyber attack using malware has become a social problem, it had an impact on the decision in the nation. In the conventio... [more] ICSS2014-88
pp.151-156
ICSS 2015-03-04
15:55
Okinawa Meio Univiersity Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary
Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] ICSS2014-96
pp.199-204
LOIS 2013-03-08
14:50
Okinawa   A Study on Malware Traffic Detection by Using N-gram Probability Density
Kenji Kawamoto (Waseda Univ.), Masatsugu Ichino, Yusuke Otsuki (Univ. of Electro-Comm.), Mitsuhiro Hatada (NTT), Hiroshi Yoshiura (Univ. of Electro-Comm.), Jiro Katto (Waseda Univ.) LOIS2012-102
The threat of malware is increasing.
Malware detection has thus become important for the safety of the Internet usage.
... [more]
LOIS2012-102
pp.191-196
ICSS, IA 2012-06-22
09:50
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University A High-Speed Classification Method based on Opcode of Malware
Yang Zong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-8 ICSS2012-8
Malicious software in form of Internet worms, computer viruses, and trojan horses poses a major threat to the security o... [more] IA2012-8 ICSS2012-8
pp.43-48
NC 2011-07-26
14:05
Hyogo Graduate School of Engineering, Kobe University A visualization method of Windows OS malware using SOM
Ruo Ando (NICT) NC2011-40
As commodity OS has compound funcions and utilities, malware's behavisor has become complicated. In security incident an... [more] NC2011-40
pp.109-114
ICSS 2009-11-13
16:45
Miyazaki University of Miyazaki A classification method for packet generation logic of darknet traffic based on characteristics of packet header
Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-61
A large-scae darknet monitoring is an effective approach to grasp a global trend of malicious activities such as the pre... [more] ICSS2009-61
pp.43-48
IA, ICSS 2009-06-19
13:50
Tokyo Kikai-Shinko-Kaikan Bldg Study on Classification of Malware and it Applications
Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] IA2009-19 ICSS2009-27
pp.103-108
 Results 1 - 20 of 22  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan