|
|
Technical Committee on Information and Communication System Security (ICSS) (Searched in: 2009)
|
|
Search Results: Keywords 'from:2009-11-13 to:2009-11-13'
|
[Go to Official ICSS Homepage] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2009-11-13 10:40 |
Miyazaki |
University of Miyazaki |
Identifying Potentially-Impacted Area using CVSS for Networked Systems Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.of Tsukuba), Masahiko Kato (IIJ Tech. Inc.) ICSS2009-54 |
CVSS(Common Vulnerability Scoring System) is a vulnerability scoring method. CVSS is composed of
three metrics groups: ... [more] |
ICSS2009-54 pp.1-6 |
ICSS |
2009-11-13 11:05 |
Miyazaki |
University of Miyazaki |
Similarity Scoring Method of Runtime Packed Malware and its Evaluation Tatsunori Orii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat Univ.), Hyung Chan Kim, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-55 |
A great number of malware have been generated and released over the Internet because of the underground distribution of ... [more] |
ICSS2009-55 pp.7-12 |
ICSS |
2009-11-13 11:30 |
Miyazaki |
University of Miyazaki |
Vulnerability inspection system for Web application by OS level virtualization Toshiaki Saraya (Kobe Univ.), Naoto Sone (Naruto Univ. of Edu.), Masakatu Morii (Kobe Univ.) ICSS2009-56 |
[more] |
ICSS2009-56 pp.13-18 |
ICSS |
2009-11-13 13:30 |
Miyazaki |
University of Miyazaki |
A Study of Detection Rate Improvement for Spam Mail Filter Functioning Before Receiving the Message Body Yukiko Sawaya, Yutaka Miyake (KDDI R&D Labs, Inc.) ICSS2009-57 |
[more] |
ICSS2009-57 pp.19-24 |
ICSS |
2009-11-13 13:55 |
Miyazaki |
University of Miyazaki |
Web Tracking Site Detection and Blacklist Generation Based on Temporal Link Analysis Akira Yamada (KDDI R&D Labs. Inc.,), Masanori Hara (KDDI Corp.), Yutaka Miyake (KDDI R&D Labs. Inc.,), Kazuo Hashimoto (Tohoku Univ.) ICSS2009-58 |
Web tracking sites or Web bugs are potential but serious threats to users' privacy during Web browsing. Web sites and th... [more] |
ICSS2009-58 pp.25-30 |
ICSS |
2009-11-13 14:20 |
Miyazaki |
University of Miyazaki |
Authenticating RFID Tags using Insulated Keys Mohammad Shahriar Rahman, Atsuko Miyaji (JAIST) ICSS2009-59 |
[more] |
ICSS2009-59 pp.31-36 |
ICSS |
2009-11-13 15:30 |
Miyazaki |
University of Miyazaki |
Packet filtering with IP address database and identification of attack path Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ) |
[more] |
|
ICSS |
2009-11-13 15:55 |
Miyazaki |
University of Miyazaki |
A Consideration of Feature Extraction for Attacks on Darknet Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60 |
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] |
ICSS2009-60 pp.37-42 |
ICSS |
2009-11-13 16:20 |
Miyazaki |
University of Miyazaki |
The relation betwenn the arrangement of network sensors and the information obtained by the sensors Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more] |
|
ICSS |
2009-11-13 16:45 |
Miyazaki |
University of Miyazaki |
A classification method for packet generation logic of darknet traffic based on characteristics of packet header Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-61 |
A large-scae darknet monitoring is an effective approach to grasp a global trend of malicious activities such as the pre... [more] |
ICSS2009-61 pp.43-48 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|