IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2016)

Search Results: Keywords 'from:2017-03-13 to:2017-03-13'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 28 of 28 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2017-03-14
11:45
Nagasaki University of Nagasaki Representation for Attack Activity to Associate Threat Information
Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] ICSS2016-64
pp.147-152
ICSS, IPSJ-SPT 2017-03-14
10:55
Nagasaki University of Nagasaki A Vulnerability Analysis of Android Applications from the View of Framework
Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)
 [more]
ICSS, IPSJ-SPT 2017-03-14
11:20
Nagasaki University of Nagasaki Ransomware Detection Focused on Encryption Processing
Shigeta Takanari, Morii Masakatu (Kobe Univ.), Hasegawa Tomohisa, Ikegami Masato, Ishikawa Teiichi (Canon IT Solutions) ICSS2016-67
 [more] ICSS2016-67
pp.165-169
ICSS, IPSJ-SPT 2017-03-14
11:45
Nagasaki University of Nagasaki Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities
Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU) ICSS2016-68
Android app developers sometimes copy code snippets posted on a Question and Answer Website and develop their apps. If a... [more] ICSS2016-68
pp.171-176
ICSS, IPSJ-SPT 2017-03-14
12:20
Nagasaki University of Nagasaki Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow
Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.) ICSS2016-69
In recent years, cyber attacks are in various ways, and we must detect as many kinds of attacks as possible. Therefore, ... [more] ICSS2016-69
pp.177-182
ICSS, IPSJ-SPT 2017-03-14
12:45
Nagasaki University of Nagasaki A Study of Security Evaluation for Composite Systems
Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Takeshi Ueda (Mitsubishi Electric Corp.), Masakatsu Nishigaki (Shizuoka Univ.) ICSS2016-70
(To be available after the conference date) [more] ICSS2016-70
pp.183-187
ICSS, IPSJ-SPT 2017-03-14
12:20
Nagasaki University of Nagasaki Vibration-based Key Exchange among Multiple Smart Devices on the Desk
Alisa Arno, Kentaroh Toyoda (Keio Univ.), Yuji Watanabe (IBM Japan), Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (Athens Univ.) ICSS2016-71
The man-in-the-middle attack is a real concern in mobile Near Filed Communication payment and data sharing applications.... [more] ICSS2016-71
pp.189-194
ICSS, IPSJ-SPT 2017-03-14
12:45
Nagasaki University of Nagasaki A system architecture that prevents fraud issue using third parties to issue authentication information
Masahiro Matsui, Akira Nagai, Tetsutaro Kobayashi, Hironobu Okuyama (NTT) ICSS2016-72
Nowadays, the leakages of authentication information such as password from web service are happened frequently. MILAGRO-... [more] ICSS2016-72
pp.195-200
 Results 21 - 28 of 28 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan