|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70 |
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] |
ICSS2023-70 pp.9-16 |
NS, IN (Joint) |
2024-03-01 14:15 |
Okinawa |
Okinawa Convention Center |
Ransomware Detection using Traffic Features in SDN Ken Tanase, Kunio Akashi, Yuji Sekiya, Hiroshi Nakamura (Tokyo Univ.) NS2023-237 |
In recent years, ransomware has emerged as a significant threat to information security in organizations.
A particular... [more] |
NS2023-237 pp.385-390 |
ICSS, IPSJ-SPT |
2020-03-02 14:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Development of a recovery tool for a ransomware infected PC Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.) ICSS2019-77 |
In recent years, malware called ransomware, which encrypts data on terminal devices, including servers and personal comp... [more] |
ICSS2019-77 pp.55-60 |
ICSS |
2019-11-13 13:30 |
Miyazaki |
MRT Terrace(Miyazaki) |
Recovery method of execution environment infected with ransomware by analyzing time series data of system calls Hirotaka Hiraki, Hideya Ochiai, Hiroshi Esaki (Tokyo Univ.) ICSS2019-60 |
Today, keeping the computer environment safe is a very important issue. Among the malware, it is often difficult in prac... [more] |
ICSS2019-60 pp.1-5 |
ICSS, IA |
2018-06-26 12:05 |
Ehime |
Ehime University |
Sho Minami, Takashi Nishide (The Univ. of Tsukuba) IA2018-14 ICSS2018-14 |
Ransomwares are a kind of malwares. If infected with ransomwares, files in a computer are automatically encrypted, and t... [more] |
IA2018-14 ICSS2018-14 pp.83-89 |
CPSY, DC, IPSJ-ARC [detail] |
2018-06-15 14:40 |
Yamagata |
Takamiya Rurikura Resort |
A Note on Ransomeware Detection using Support Vector Machines Yuuki Takeuchi, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2018-10 DC2018-10 |
Recently, the damage of Ransomware has spread around the world.Ransomware is malware that requires users to pay money as... [more] |
CPSY2018-10 DC2018-10 pp.131-136 |
IA |
2016-11-04 10:35 |
Overseas |
Taipei (Taiwan) |
Deep Learning for Ransomware Detection Aragorn Tseng, YunChun Chen, YiHsiang Kao, Tsungnan Lin (NTU) IA2016-46 |
Ransomware is malware that installs covertly on a victim's computer or smartphone, executes a cryptovirology attack and ... [more] |
IA2016-46 pp.87-92 |
ICSS, IA |
2014-06-06 11:20 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Ransomware: Threat Analysis and Countermeasures Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) IA2014-7 ICSS2014-7 |
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic techno... [more] |
IA2014-7 ICSS2014-7 pp.33-38 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|