IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 147 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2019-11-13
13:30
Miyazaki MRT Terrace(Miyazaki) Recovery method of execution environment infected with ransomware by analyzing time series data of system calls
Hirotaka Hiraki, Hideya Ochiai, Hiroshi Esaki (Tokyo Univ.) ICSS2019-60
Today, keeping the computer environment safe is a very important issue. Among the malware, it is often difficult in prac... [more] ICSS2019-60
pp.1-5
ICSS 2019-11-13
14:20
Miyazaki MRT Terrace(Miyazaki) Issue on Adversarial Malware Sample Generation using Reinforcement Learning against Machine Learning Based Malware Detection System
Seiya Takagi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-62
In recent years, security researchers have applied machine learning techniques to malware detection researches to improv... [more] ICSS2019-62
pp.13-18
ISEC, SITE, LOIS 2019-11-02
15:00
Osaka Osaka Univ. On Robustness of Machine-Learning-Based Malware Detection
Wanjia Zheng (U. Tsukuba), Kazumasa Omote (U. Tsukuba/NICT) ISEC2019-83 SITE2019-77 LOIS2019-42
As the 2020 Tokyo Olympics are approaching, the possibility of being targeted by attackers has further increased in Japa... [more] ISEC2019-83 SITE2019-77 LOIS2019-42
pp.133-140
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:55
Kochi Kochi University of Technology Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki) ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48
Rapid malware detection is very important because malware causes serious damage to the modern society based on the Inter... [more] ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48
pp.293-298
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Android Malware Detection Scheme Based on Level of SSL Server Certificate
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2019-15
In this paper, in order to detect Android malwares which encrypt packets, we propose an Android malware detection scheme... [more] CS2019-15
pp.13-18
IA, ICSS 2019-06-07
10:55
Miyagi Research Institute for Electrical Communication, Tohoku University A method to detect host scan and isolate malicious hosts in LAN
Ayato Tokubi, Hideya Ochiai, Hiroshi Esaki (UTokyo) IA2019-7 ICSS2019-7
In this paper, we propose a system to isolate an abnormal host from the network by detecting the scan executed by the ma... [more] IA2019-7 ICSS2019-7
pp.31-36
ICSS, IPSJ-SPT 2019-03-07
14:20
Okinawa NICT Okinawa Electromagnetic Technology Center How to build malware sandbox using real IoT devices
Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] ICSS2018-69
pp.7-12
IN, NS
(Joint)
2019-03-05
11:50
Okinawa Okinawa Convention Center Proposal of malicious device detection method by DNS query/response log analysis using machine learning
Issei Nakasone, Kitaguchi Yoshiaki, Yamaoka Katsunori (Tokyo Tech) IN2018-129
One common way for detecting malware devices in a network is to use a blacklist based on signature detection.However, in... [more] IN2018-129
pp.271-276
ICSS 2018-11-21
13:00
Kagoshima   Development of remote LAN monitoring system
Katsuya Matsuoka, Masaya Mizutani, Hideya Ochiai, Hiroshi Esaki (UT) ICSS2018-53
Security in cyberspace is a problem crossing the border. The cyber attack in recent years targets inside the LAN, and in... [more] ICSS2018-53
pp.1-6
ICSS 2018-11-21
15:15
Kagoshima   Malware Analysis Method Using Conditional Generative Adversarial Network
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) ICSS2018-57
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] ICSS2018-57
pp.25-30
ICSS 2018-11-22
14:20
Kagoshima   Part II: Calculating Similarity between IoT Malware over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more]
ICSS2018-66
pp.73-78
CS 2018-11-02
10:10
Ehime The Shiki Museum Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio
Kyohei Osuge, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2018-65
Android malwares are rapidly becoming a potential threat to users. Among several Android malware detection schemes, the ... [more] CS2018-65
pp.57-62
ICSS, IA 2018-06-25
13:25
Ehime Ehime University Calculating Similarity between IoT Malware Samples over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more]
IA2018-2 ICSS2018-2
pp.7-12
ICSS, IA 2018-06-26
11:40
Ehime Ehime University A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] IA2018-13 ICSS2018-13
pp.77-82
ICSS, IPSJ-SPT 2018-03-07
13:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2017-51
In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and ... [more] ICSS2017-51
pp.1-6
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] ICSS2017-69
pp.109-114
ICSS, IPSJ-SPT 2018-03-08
10:35
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Malware Detection Method by Machine Learning Focused on Malignant Activity
Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-71
In recent years, many researches on detection and classification of malware have been done. Among them, researches on te... [more] ICSS2017-71
pp.121-126
ICSS, IPSJ-SPT 2018-03-08
13:25
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Response Signature Generation method for Detecting Malicious Destinations
Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-77
Blacklist is frequently deployed for detecting malware-infected hosts. However, even when request traffic from one host ... [more] ICSS2017-77
pp.157-160
SS, MSS 2018-01-19
10:15
Hiroshima   On Modeling of Infection Phenomenon and Evaluation of Countermeasure for IoT Malware Mirai by Agent-Oriented Petri Net PN2
Shingo Yamaguchi, Hiroaki Tanaka (Yamaguchi Univ.) MSS2017-63 SS2017-50
In September 2016, an unprecedented massive DDoS attack was launched by IoT devices. This attack was caused by a new typ... [more] MSS2017-63 SS2017-50
pp.91-95
ICSS 2017-11-20
15:15
Oita Beppu International Convention Center Preliminary Evaluation on the Program Classification at the Processor Level using Machine Learning
Ryotaro Kobayashi (Kogakuin Univ.), Hayate Takase, Genki Otani, Ren Ohmura (Toyohashi Univ. of Tech.), Masahiko Kato (Univ. of Nagasaki) ICSS2017-39
As use of IoT devices becomes widespread, a lot of things are connected to the Internet, and the convenience of everyday... [more] ICSS2017-39
pp.5-10
 Results 41 - 60 of 147 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan