Information and Systems-Image Engineering(Date:2017/03/13)

Presentation
Assignment and Solution regarding Access Control of a Camera on a Computer

Yuri Yoshino(TDU),  Masaki Inamura(TDU),  

[Date]2017-03-14
[Paper #]ICSS2016-63
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder

Shuichiro Haruta(Keio Univ),  Hiromu Asahina(Keio Univ),  Iwao Sasase(Keio Univ),  

[Date]2017-03-14
[Paper #]ICSS2016-58
A system architecture that prevents fraud issue using third parties to issue authentication information

Masahiro Matsui(NTT),  Akira Nagai(NTT),  Tetsutaro Kobayashi(NTT),  Hironobu Okuyama(NTT),  

[Date]2017-03-14
[Paper #]ICSS2016-72
Attack Pattern Extraction by Clustering Parameters

Shingo Orihara(NTT),  Tohru Sato(NTT),  Masaki Tanikawa(NTT),  

[Date]2017-03-14
[Paper #]ICSS2016-60
Ransomware Detection Focused on Encryption Processing

Shigeta Takanari(Kobe Univ.),  Morii Masakatu(Kobe Univ.),  Hasegawa Tomohisa(Canon IT Solutions),  Ikegami Masato(Canon IT Solutions),  Ishikawa Teiichi(Canon IT Solutions),  

[Date]2017-03-14
[Paper #]ICSS2016-67
A Study of Security Evaluation for Composite Systems

Kobayashi Nobuhiro(Mitsubishi Electric Corp./ Shizuoka Univ.),  Takeshi Ueda(Mitsubishi Electric Corp.),  Masakatsu Nishigaki(Shizuoka Univ.),  

[Date]2017-03-14
[Paper #]ICSS2016-70
Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities

Hiroki Nakano(YNU),  Fumihiro Kanei(NTT),  Mitsuaki Akiyama(NTT),  Katsunari Yoshioka(YNU),  

[Date]2017-03-14
[Paper #]ICSS2016-68
Representation for Attack Activity to Associate Threat Information

Daiki Ito(Kobe Univ.),  Kenta Nomura(Kobe Univ.),  Masaki Kamizono(PwC Cyber Services),  Yoshiaki Shiraishi(Kobe Univ.),  Yasuhiro Takano(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Yuji Hoshizawa(PwC Cyber Services),  Masakatu Morii(Kobe Univ.),  

[Date]2017-03-14
[Paper #]ICSS2016-64
<<12 21-28hit(28hit)