IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2016)

Search Results: Keywords 'from:2016-06-06 to:2016-06-06'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 14 of 14  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IA 2016-06-06
13:05
Saga Saga University Design of a flow-level monitoring middleware for automatic flow categorization
Xuliang Wang, Pongsakorn U-chupala, Kohei Ichikawa, Yasuhiro Watashiba (NAIST), Chantana Chantrapornchai, Putchong Uthayopas (Kasetsart Univ.), Hajimu Iida (NAIST) IA2016-1 ICSS2016-1
 [more] IA2016-1 ICSS2016-1
pp.1-6
ICSS, IA 2016-06-06
13:30
Saga Saga University Analysis of recursive queries from the Internet to the authoritative name servers in Oita University
Masashi Nakamura, Minoru Ikebe, Kazuyuki Yoshida (Oita Univ.) IA2016-2 ICSS2016-2
The authoritative name server will receive name resolution queries from the Internet. In this paper, we analyzed queries... [more] IA2016-2 ICSS2016-2
pp.7-12
ICSS, IA 2016-06-06
14:10
Saga Saga University Method to Locate Cryptographic Functions from Malware
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT)
 [more]
ICSS, IA 2016-06-06
14:35
Saga Saga University A Visualization system of network packets with alert function for suspicious communications
Reido Horigome, Naoya Kitagawa, Nariyoshi Yamai (Tokyo Univ. of Agriculture and Technology) IA2016-3 ICSS2016-3
(To be available after the conference date) [more] IA2016-3 ICSS2016-3
pp.13-18
ICSS, IA 2016-06-06
15:00
Saga Saga University Development of Network Forensic System Using Filter Drivers
Kouki Oda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
 [more]
ICSS, IA 2016-06-06
15:40
Saga Saga University Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN
Nariaki Tamaki, Takehiro Kawata (NTT) IA2016-4 ICSS2016-4
We propose the countermeasure technique to prevent key decipher, and improve the key-exchange protocol of IEEE 802.11 Wi... [more] IA2016-4 ICSS2016-4
pp.19-24
ICSS, IA 2016-06-06
16:05
Saga Saga University
Kenta Nomura (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-5 ICSS2016-5
(To be available after the conference date) [more] IA2016-5 ICSS2016-5
pp.25-30
ICSS, IA 2016-06-06
16:30
Saga Saga University Multidimensional Lamport-like one-time password authentication schemes
Yuji Suga (IIJ) IA2016-6 ICSS2016-6
 [more] IA2016-6 ICSS2016-6
p.31
ICSS, IA 2016-06-07
09:30
Saga Saga University
Daiki Ito (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-7 ICSS2016-7
 [more] IA2016-7 ICSS2016-7
pp.33-38
ICSS, IA 2016-06-07
09:55
Saga Saga University Report on the 2016 Network and Distributed System Security Symposium
Shinichi Matsumoto (ISIT), Daiki Chiba (NTT), Kuniyasu Suzaki (AIST), Mirang Park (Kanagawa Institute of Technology) IA2016-8 ICSS2016-8
 [more] IA2016-8 ICSS2016-8
pp.39-44
ICSS, IA 2016-06-07
10:35
Saga Saga University An Experiment to Shut off DDoS Attacks on Testbed Simulating Autonomous Internet Security Infrastructure
Kishi Yuya, Eguchi Ken, Ishikawa Tsuyoshi, Suzuki Ryusei, Miyaguchi Yuki, Ohsawa Kazuo, Yogosawa Mamoru, Sano Kaoru, Yamaki Hiroshi, Ueno Yoichirou, Sasaki Ryoichi, Kobayashi Hiroshi (Tokyo Denki Univ) IA2016-9 ICSS2016-9
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. A shift in thinking is required fr... [more] IA2016-9 ICSS2016-9
pp.45-50
ICSS, IA 2016-06-07
11:00
Saga Saga University Measuring BGP Origin Validation Effect for Mis-Origination
Masahito Ando (Toho Univ.), Masayuki Okada (JPNIC), Akira Kanaoka (Toho Univ.) IA2016-10 ICSS2016-10
Current Border Gateway Protocol (BGP) operation in the Internet has serious problem about Mis-Origination which is hijac... [more] IA2016-10 ICSS2016-10
pp.51-56
ICSS, IA 2016-06-07
13:00
Saga Saga University On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis
Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] IA2016-11 ICSS2016-11
pp.57-62
ICSS, IA 2016-06-07
13:25
Saga Saga University
Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services LLCPwC Cyber Services), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services LLCPwC Cyber Services), Masakatu Morii (Kobe Univ.) IA2016-12 ICSS2016-12
(To be available after the conference date) [more] IA2016-12 ICSS2016-12
pp.63-68
 Results 1 - 14 of 14  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan