IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2020)

Search Results: Keywords 'from:2021-03-01 to:2021-03-01'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 34  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2021-03-01
09:10
Online Online Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts
Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-26
(To be available after the conference date) [more] ICSS2020-26
pp.1-6
ICSS, IPSJ-SPT 2021-03-01
09:35
Online Online Detection of Infected Device Using DNS Traffic
Soichiro Kogo, Atsushi Kanai (Hosei Univ.) ICSS2020-27
The damage caused by computer viruses is becoming a serious problem. However, it requires a lot of effort to manage all ... [more] ICSS2020-27
pp.7-12
ICSS, IPSJ-SPT 2021-03-01
10:00
Online Online Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects
Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-28
DNS cache poisoning attacks have received increasing attention these days.
As a countermeasure against such attacks, DN... [more]
ICSS2020-28
pp.13-18
ICSS, IPSJ-SPT 2021-03-01
10:25
Online Online Construction of Vulnerability Evaluation System with Machine Learning Methods
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] ICSS2020-29
pp.19-24
ICSS, IPSJ-SPT 2021-03-01
11:05
Online Online A proposal of model for scale and frequency of cyber incidents based on organizational attributes
Kazuki Ikegami, Hiroaki Kikuchi (Meiji Univ.) ICSS2020-30
 [more] ICSS2020-30
pp.25-30
ICSS, IPSJ-SPT 2021-03-01
11:30
Online Online Method of Similarity Evaluation among Incidents for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] ICSS2020-31
pp.31-36
ICSS, IPSJ-SPT 2021-03-01
11:55
Online Online Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] ICSS2020-32
pp.37-42
ICSS, IPSJ-SPT 2021-03-01
14:30
Online Online A path authentication framework based on One-way cross networks
Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.) ICSS2020-33
Since MANETs can transmit information between mobile devices, it is critically important to guarantee that the transmitt... [more] ICSS2020-33
pp.43-48
ICSS, IPSJ-SPT 2021-03-01
09:10
Online Online On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures
Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] ICSS2020-34
pp.49-54
ICSS, IPSJ-SPT 2021-03-01
09:35
Online Online A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background
Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] ICSS2020-35
pp.55-60
ICSS, IPSJ-SPT 2021-03-01
10:00
Online Online Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest
Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.) ICSS2020-36
Programming competitions are held all over the world to write programs accurately in a short time. However, because many... [more] ICSS2020-36
pp.61-65
ICSS, IPSJ-SPT 2021-03-01
10:25
Online Online Design and implementation of a cyber security exercise rewinding mechanism
Yuma Kodera, Chinen Kenichi (JAIST) ICSS2020-37
 [more] ICSS2020-37
pp.66-71
ICSS, IPSJ-SPT 2021-03-01
13:40
Online Online An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-38
 [more] ICSS2020-38
pp.72-77
ICSS, IPSJ-SPT 2021-03-01
14:05
Online Online Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware
Reo Kawasoe (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-39
 [more] ICSS2020-39
pp.78-83
ICSS, IPSJ-SPT 2021-03-01
14:30
Online Online Analyzing the Transition of Vulnerabilities Targeted by IoT Malware
Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] ICSS2020-40
pp.84-89
ICSS, IPSJ-SPT 2021-03-01
14:55
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
pp.90-95
ICSS, IPSJ-SPT 2021-03-02
09:35
Online Online Proposal for Chameleon Hash with a Revocation Function
Koki Matsubara (Osaka Univ.), Atsuko Miyaji (Osaka Univ./ JAIST), Tian Yangguang (Osaka Univ.) ICSS2020-42
The data registered on the blockchain cannot be changed again, but Policy-based Chameleon Hash (PCH)by Derler et al. (20... [more] ICSS2020-42
pp.96-101
ICSS, IPSJ-SPT 2021-03-02
10:00
Online Online Authentication and authorization of IoT devices using blockchain and fog nodes
Takahiro Igarashi, Yuichi Futa (TUT) ICSS2020-43
In this paper, we propose a system for authentication / authorization of IoT devices using blockchain. With reference to... [more] ICSS2020-43
pp.102-107
ICSS, IPSJ-SPT 2021-03-02
10:25
Online Online Consideration on the mechanism of identifying and tracking Bitcoin users
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2020-44
The use of CryptoAssets for money laundering and settlement of fraudulent and illegal transactions due to strong anonymi... [more] ICSS2020-44
pp.108-113
ICSS, IPSJ-SPT 2021-03-02
11:05
Online Online Study on analyzing Memcached DRDoS attacks and their infrastructures
Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] ICSS2020-45
pp.114-119
 Results 1 - 20 of 34  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan