IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2014)

Search Results: Keywords 'from:2014-11-27 to:2014-11-27'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2014-11-27
13:30
Miyagi Tohoku Gakuin University (Tagajo Campus) [Invited Talk] Introduction to Japan's Control System Security Center
Hideaki Kobayashi (CSSC) ICSS2014-51
CSSC was established in March 2012. At Tagajoi n May 2013,
CSSC constructed the testbed named CSS-Base6 for industrial... [more]
ICSS2014-51
pp.1-6
ICSS 2014-11-27
14:20
Miyagi Tohoku Gakuin University (Tagajo Campus) Dynamic Zoning of the Industrial Control System for Security improvement
Wataru Machii, Isao Kato, Masahito Koike, Masafumi Matta, Tomomi Aoyama, Ichiro Koshijima, Yoshihiro Hashimoto (NIT) ICSS2014-52
In the previous paper, our authors proposed a design methodology of zones and conduits not only to isolate incidents cau... [more] ICSS2014-52
pp.7-12
ICSS 2014-11-27
14:45
Miyagi Tohoku Gakuin University (Tagajo Campus) Industrial Control System Monitoring based on Communication Profile
Masafumi Matta, Masahito Koike, Wataru Machii, Tomomi Aoyama, Hidemasa Naruoka, Ichiro Koshijima, Yoshihiro Hashimoto (Nagoya Inst. of Tech.) ICSS2014-53
 [more] ICSS2014-53
pp.13-18
ICSS 2014-11-27
15:10
Miyagi Tohoku Gakuin University (Tagajo Campus) Studying Resilient Cyber Incident Management From Large-scale Cyber Security Training
Tomomi Aoyama, Ichiro Koshijima, Kohei Seki, Masafumi Matta (Nagoya Inst. of Tech.) ICSS2014-54
(To be available after the conference date) [more] ICSS2014-54
pp.19-23
ICSS 2014-11-27
15:35
Miyagi Tohoku Gakuin University (Tagajo Campus) On the status of techniques and standardization regarding lightweight cryptography -- ISO/IEC JTC1/SC27/WG2 status report --
Hirotaka Yoshida, Dai Watanabe (Hitachi), Nicky Mouha (KU Leuven) ICSS2014-55
As more and more computers and controllers used for ICS (industrial control systems) or for vehicles go online, increase... [more] ICSS2014-55
pp.25-30
ICSS 2014-11-27
16:00
Miyagi Tohoku Gakuin University (Tagajo Campus) Efficient Computation of Weil Pairing over Supersingular Elliptic Curve and Its Evaluation
Kazuma Tanaka (Univ. of Tsukuba), Tadanori Teruya (AIST), Naoki Kanayama, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) ICSS2014-56
In SCIS 2014, the authors considered efficiency of computing symmetric parings on supersingular elliptic curves over fin... [more] ICSS2014-56
pp.31-36
ICSS 2014-11-28
09:15
Miyagi Tohoku Gakuin University (Tagajo Campus) Expansion of a Proposal of Short Proxy Signature into an Aggregate Signature Scheme and Adaptation of it to Content Editing System
Keiji Ogura (TUS), Masaki Inamura (TDU/AIST), Keiichi Iwamura (TUS) ICSS2014-57
 [more] ICSS2014-57
pp.37-41
ICSS 2014-11-28
09:40
Miyagi Tohoku Gakuin University (Tagajo Campus) security evaluation of content editing system that previous control allow about editing operation
Katsuma Koga (Tokyo Univ of Science), Keiichi Iwamura (Tokyo Denki Unive), Masaki Inamura (Tokyo Univ of Science) ICSS2014-58
 [more] ICSS2014-58
pp.43-48
ICSS 2014-11-28
10:20
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting Backscatter of DDoS Attacks from Darknet Traffic
Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] ICSS2014-59
pp.49-53
ICSS 2014-11-28
10:45
Miyagi Tohoku Gakuin University (Tagajo Campus) A Study of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] ICSS2014-60
pp.55-60
ICSS 2014-11-28
11:10
Miyagi Tohoku Gakuin University (Tagajo Campus) searching malicious URL from vast webspace
Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more]
ICSS2014-61
pp.61-66
ICSS 2014-11-28
11:35
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting infected hosts with machine learning analysis of DNS responses
Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] ICSS2014-62
pp.67-72
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan