|
|
Technical Committee on Information and Communication System Security (ICSS) (Searched in: 2013)
|
|
Search Results: Keywords 'from:2013-11-12 to:2013-11-12'
|
[Go to Official ICSS Homepage] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2013-11-12 13:00 |
Fukuoka |
Nishijin Plaza |
[Special Invited Talk]
Cyber Security Trend - Annual Review 2013
-- Keywords for protecting organizations from increasingly sophisticated cyber attacks -- Kensuke Masaki, Tomohiro Nakashima, Sukehiro Nishita, Nobuyuki Itoh, Youichi Shimoyama, Yuu Yasutake, Taku Murakami, Tomohiko Suga (NRI Secure Technologies) ICSS2013-56 |
[more] |
ICSS2013-56 p.1 |
ICSS |
2013-11-12 14:15 |
Fukuoka |
Nishijin Plaza |
Evaluations of Multi-Stage Traffic Analysis against Attacks on Websites Takeshi Yagi, Takeo Hariu (NTT), Hiroki Takakura (Nagoya University) ICSS2013-57 |
This paper proposes a traffic analysis scheme to detect attacks from accesses to websites. Conventional schemes can dete... [more] |
ICSS2013-57 pp.3-8 |
ICSS |
2013-11-12 14:35 |
Fukuoka |
Nishijin Plaza |
On the Risk of DNS Cache Vulnerability "Ghost Domain Name" Hiroaki Kikuchi (Meiji Univ.), Tomohiro Arimizu (Tokai Univ.) ICSS2013-58 |
[more] |
ICSS2013-58 pp.9-12 |
ICSS |
2013-11-12 15:10 |
Fukuoka |
Nishijin Plaza |
An OEP Identifying Method based on the Order of Opcodes Noriaki Nakamura, Masakatu Morii (Kobe Univ.), Ryoichi Isawa, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-59 |
To skip unpacking steps, automated generic unpacking methods are strongly required.Most of generic unpackers extract mem... [more] |
ICSS2013-59 pp.13-18 |
ICSS |
2013-11-12 15:30 |
Fukuoka |
Nishijin Plaza |
Proposal improve security of local area networks based on encryption using identity numbers assigned to personal computers for disrimination between each other Kousuke Yoshimura, Satoshi Kodama (Tokyo Univ. of Science) ICSS2013-60 |
In our daily life, it is general that almost all packets without being enciphered are commuting among routers which the ... [more] |
ICSS2013-60 pp.19-21 |
ICSS |
2013-11-12 15:50 |
Fukuoka |
Nishijin Plaza |
Experimental Evaluation of A Botnet Detection Method based on Non-negative Matrix Factorization Yuki Kawamura (Kyushu Univ.), Junpei Shimamura, Junji Nakazato (NICT), Katsunari Yoshioka (Yokohama National Univ.), Masashi Eto, Daisuke Inoue (NICT), Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2013-61 |
[more] |
ICSS2013-61 pp.23-28 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|