|
|
Technical Committee on Information and Communication System Security (ICSS) (Searched in: 2019)
|
|
Search Results: Keywords 'from:2019-11-13 to:2019-11-13'
|
[Go to Official ICSS Homepage] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2019-11-13 13:30 |
Miyazaki |
MRT Terrace(Miyazaki) |
Recovery method of execution environment infected with ransomware by analyzing time series data of system calls Hirotaka Hiraki, Hideya Ochiai, Hiroshi Esaki (Tokyo Univ.) ICSS2019-60 |
Today, keeping the computer environment safe is a very important issue. Among the malware, it is often difficult in prac... [more] |
ICSS2019-60 pp.1-5 |
ICSS |
2019-11-13 13:55 |
Miyazaki |
MRT Terrace(Miyazaki) |
A Fast Algorithm for Constructing Phylogenetic Trees and Its Evaluation Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2019-61 |
[more] |
ICSS2019-61 pp.7-12 |
ICSS |
2019-11-13 14:20 |
Miyazaki |
MRT Terrace(Miyazaki) |
Issue on Adversarial Malware Sample Generation using Reinforcement Learning against Machine Learning Based Malware Detection System Seiya Takagi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-62 |
In recent years, security researchers have applied machine learning techniques to malware detection researches to improv... [more] |
ICSS2019-62 pp.13-18 |
ICSS |
2019-11-13 14:55 |
Miyazaki |
MRT Terrace(Miyazaki) |
ICSS2019-63 |
E-mail has been one of the most widely used tools for computer-based communication since the early days of the Internet.... [more] |
ICSS2019-63 pp.19-23 |
ICSS |
2019-11-13 15:20 |
Miyazaki |
MRT Terrace(Miyazaki) |
Detecting Wi-Fi channel-based man-in-the-middle attacks by scanning access points Sheng Gong, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2019-64 |
Today, Wi-Fi is being used as a means of near-field high-speed communication across much equipment, such as personal com... [more] |
ICSS2019-64 pp.25-30 |
ICSS |
2019-11-13 15:45 |
Miyazaki |
MRT Terrace(Miyazaki) |
Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65 |
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] |
ICSS2019-65 pp.31-36 |
ICSS |
2019-11-13 16:20 |
Miyazaki |
MRT Terrace(Miyazaki) |
A study on the side-channel attacks on IoT devices Rikuta Furuta, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2019-66 |
Through it is common to encrypt messages in communication channels in the Internet today, it is often forgot that some c... [more] |
ICSS2019-66 pp.37-40 |
ICSS |
2019-11-13 16:45 |
Miyazaki |
MRT Terrace(Miyazaki) |
Study on evaluation system for aggregate message authentication and its application to IoT systems Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-67 |
Utilization of Internet of things (IoT) devices has widely spread, and suppressing the increasing amount of data due to ... [more] |
ICSS2019-67 pp.41-46 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|