Communication-Communication Systems(Date:2019/03/07)

Presentation
Regulatory Compliance Monitoring on the Web Using Paragraph Vector

Mitsuharu Sasaki(NTT EAST),  Taishi Nishiyama(NTT),  Atsutoshi Kumagai(NTT),  Kazunori Kamiya(NTT),  

[Date]2019-03-07
[Paper #]ICSS2018-71
Analyzing Deceptive Internationalized Domain Names

Daiki Chiba(NTT),  Ayako Akiyama Hasegawa(NTT),  Takashi Koide(NTT),  Yuta Sawabe(Waseda Univ.),  Shigeki Goto(Waseda Univ.),  Mitsuaki Akiyama(NTT),  

[Date]2019-03-07
[Paper #]ICSS2018-76
A Method for Realizing Traceability of Security Requirements for Information Systems deployed in Public Cloud using GSN

Ryo Hase(Mitsubishi Electric),  Yohei Matsuura(Mitsubishi Electric),  

[Date]2019-03-07
[Paper #]ICSS2018-70
Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data

Shun Tobiyama(NTT),  Shohei Araki(NTT),  Bo Hu(NTT),  Kazunori Kamiya(NTT),  Masaki Tanikawa(NTT),  Kenji Takahashi(NTT Security),  

[Date]2019-03-07
[Paper #]ICSS2018-77
A User Participation Type Web Security Platform and Its Real World Evaluation

Akira Yamada(KDDI Research),  Yukiko Sawaya(KDDI Research),  Takashi Matsunaka(KDDI Research),  Shoma Tanaka(KDDI Research),  Ayumu Kubota(KDDI Research),  

[Date]2019-03-07
[Paper #]ICSS2018-74
Implementation and evaluation of aggregate message authentication method

Atsuhiro Yamagishi(JDC),  Tatsuya Takehisa(NISSIN),  Eiichi Nishiura(NISSIN),  Shouichi Hirose(JDC),  Yu Imamura(JDC),  Kazuhiko Minematsu(nec),  Junji Shikata(YNU),  Koji Nakao(YNU),  

[Date]2019-03-07
[Paper #]ICSS2018-73
Period Analysis for Visualization of Industrial Network

Hiroki Nagayama(NTT),  Hu Bo(NTT),  Kazunori Kamiya(NTT),  Shingo Kashima(NTT),  Masaki Tanikawa(NTT),  

[Date]2019-03-07
[Paper #]ICSS2018-88
An experiment design of security notification to users of IoT devices through dedicated client software

Shin Nishida(Yokohama National Univ.),  Takuya Hoizumi(Yokohama National Univ.),  Keisuke Uchida(Yokohama National Univ.),  Akira Fujita(Yokohama National Univ.),  Katsunari Yoshioka(Yokohama National Univ.),  Tsutomu Matsumoto(Yokohama National Univ.),  

[Date]2019-03-07
[Paper #]ICSS2018-75
How to build malware sandbox using real IoT devices

Jia Xiong(Yokohama National Univ.),  Tatsuya Tamai(Yokohama National Univ.),  Kazuki Tamiya(Yokohama National Univ.),  Satoshi Hara(Yokohama National Univ./Fujisoft),  Rui Tanabe(Yokohama National Univ.),  Akira Fujita(Yokohama National Univ.),  Katsunari Yoshioka(Yokohama National Univ.),  Tsutomu Matsumoto(Yokohama National Univ.),  

[Date]2019-03-07
[Paper #]ICSS2018-69
On Improvement of a White-box Cryptographic Scheme

Masakazu Soshi(Hiroshima City Univ.),  

[Date]2019-03-07
[Paper #]ICSS2018-72
Discrimination of IoT devices by clustering their responses to network scan

Takuya Hoizumi(Yokohama National Univ.),  Shin Nishida(Yokohama National Univ.),  Keisuke Uchida(Yokohama National Univ.),  Akira Fujita(Yokohama National Univ.),  Katsunari Yoshioka(Yokohama National Univ.),  Tsutomu Matsumoto(Yokohama National Univ.),  

[Date]2019-03-07
[Paper #]
Traffic analysis to detect abnormal smartphone application behavior

Iifan Tyou(NTT),  Takahiro Nukushina(NTT),  Yukio Nagafuchi(NTT),  Masaki Tanikawa(NTT),  

[Date]2019-03-08
[Paper #]ICSS2018-87
A Trouble Ticket System Specialized for Incident Response

Yu Tsuda(NICT),  Takashi Tomine(NICT),  Masato Jingu(NICT/HISYS),  Keisuke Iwasaki(NTT-AT),  Kenjiro Terada(NICT),  Daisuke Inoue(NICT),  

[Date]2019-03-08
[Paper #]ICSS2018-92
A proposal of detection method of singed malicious program

Hiroyuki Sakakibara(Mitsubishi Electric),  Kiyoto Kawauchi(Mitsubishi Electric),  

[Date]2019-03-08
[Paper #]ICSS2018-82
Report on 35th Chaos Computer Congress(35C3)

Keisuke Kito(Mitsubishi Electric),  

[Date]2019-03-08
[Paper #]ICSS2018-83
Understanding DNS over TLS: Performance Evaluation and Large-scale Measurement Study

Masahiro Maki(Waseda Univ.),  Tatsuya Mori(Waseda Univ.),  

[Date]2019-03-08
[Paper #]ICSS2018-89
標的型メールにおける誘導手口の考察

,  ,  ,  ,  ,  

[Date]2019-03-08
[Paper #]ICSS2018-91
Performance survey for IoT security function on smartphone

Yukio Nagafuchi(NTT),  Takahiro Nukushina(NTT),  Iifan Tyou(NTT),  Masaki Tanikawa(NTT),  

[Date]2019-03-08
[Paper #]ICSS2018-68
Authentication with hash chain computation model

Shinta Hirai(Hiroshima City Univ.),  Masakazu Soshi(Hiroshima City Univ.),  

[Date]2019-03-08
[Paper #]ICSS2018-84
脅威情報のモデル化のためのセキュリティレポートからのイベント情報の抽出

Shunta Nakagawa(Kobe Univ.),  Tatsuya Nagai(Kobe Univ.),  Hideaki Kanehara(NICT),  Keisuke Furumoto(NICT),  Makoto Takita(Kobe Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  Takeshi Takahashi(NICT),  Masami Mohri(Gifu Univ.),  Yasuhiro Takano(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2019-03-08
[Paper #]ICSS2018-78
12>> 1-20hit(26hit)