IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2009)

Search Results: Keywords 'from:2009-11-13 to:2009-11-13'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2009-11-13
10:40
Miyazaki University of Miyazaki Identifying Potentially-Impacted Area using CVSS for Networked Systems
Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.of Tsukuba), Masahiko Kato (IIJ Tech. Inc.) ICSS2009-54
CVSS(Common Vulnerability Scoring System) is a vulnerability scoring method. CVSS is composed of
three metrics groups: ... [more]
ICSS2009-54
pp.1-6
ICSS 2009-11-13
11:05
Miyazaki University of Miyazaki Similarity Scoring Method of Runtime Packed Malware and its Evaluation
Tatsunori Orii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat Univ.), Hyung Chan Kim, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-55
A great number of malware have been generated and released over the Internet because of the underground distribution of ... [more] ICSS2009-55
pp.7-12
ICSS 2009-11-13
11:30
Miyazaki University of Miyazaki Vulnerability inspection system for Web application by OS level virtualization
Toshiaki Saraya (Kobe Univ.), Naoto Sone (Naruto Univ. of Edu.), Masakatu Morii (Kobe Univ.) ICSS2009-56
 [more] ICSS2009-56
pp.13-18
ICSS 2009-11-13
13:30
Miyazaki University of Miyazaki A Study of Detection Rate Improvement for Spam Mail Filter Functioning Before Receiving the Message Body
Yukiko Sawaya, Yutaka Miyake (KDDI R&D Labs, Inc.) ICSS2009-57
 [more] ICSS2009-57
pp.19-24
ICSS 2009-11-13
13:55
Miyazaki University of Miyazaki Web Tracking Site Detection and Blacklist Generation Based on Temporal Link Analysis
Akira Yamada (KDDI R&D Labs. Inc.,), Masanori Hara (KDDI Corp.), Yutaka Miyake (KDDI R&D Labs. Inc.,), Kazuo Hashimoto (Tohoku Univ.) ICSS2009-58
Web tracking sites or Web bugs are potential but serious threats to users' privacy during Web browsing. Web sites and th... [more] ICSS2009-58
pp.25-30
ICSS 2009-11-13
14:20
Miyazaki University of Miyazaki Authenticating RFID Tags using Insulated Keys
Mohammad Shahriar Rahman, Atsuko Miyaji (JAIST) ICSS2009-59
 [more] ICSS2009-59
pp.31-36
ICSS 2009-11-13
15:30
Miyazaki University of Miyazaki Packet filtering with IP address database and identification of attack path
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ)
 [more]
ICSS 2009-11-13
15:55
Miyazaki University of Miyazaki A Consideration of Feature Extraction for Attacks on Darknet
Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] ICSS2009-60
pp.37-42
ICSS 2009-11-13
16:20
Miyazaki University of Miyazaki The relation betwenn the arrangement of network sensors and the information obtained by the sensors
Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more]
ICSS 2009-11-13
16:45
Miyazaki University of Miyazaki A classification method for packet generation logic of darknet traffic based on characteristics of packet header
Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-61
A large-scae darknet monitoring is an effective approach to grasp a global trend of malicious activities such as the pre... [more] ICSS2009-61
pp.43-48
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan