Communication-Internet Architecture(Date:2011/06/09)

Presentation
表紙

,  

[Date]2011/6/9
[Paper #]
目次

,  

[Date]2011/6/9
[Paper #]
Combining the outcomes of IP reputation services

Tatsuya MORI,  Kazumichi SATO,  Yosuke TAKAHASHI,  Tatsuaki KIMURA,  Keisuke ISHIBASHI,  

[Date]2011/6/9
[Paper #]IA2011-1,ICSS2011-1
An Architecture of A Multifactor Authentication Platform for Hybrid Cloud

Satoshi YAGI,  Ryoichi KASUGA,  Satoshi IMAMURA,  Jiro YAMADA,  Hidetoshi TAKASUGI,  

[Date]2011/6/9
[Paper #]IA2011-2,ICSS2011-2
IPAにおけるクラウドセキュリティへの取組とCloud Security Alliance(CSA)の最新動向(スパム対策・クラウドサービス,インターネットセキュリティ,一般)

,  

[Date]2011/6/9
[Paper #]IA2011-3,ICSS2011-3
A Profiling Method of Attacking Hosts based on Scan Feature Extraction

Masashi ETO,  Yaichiro TAKAGI,  Jungsuk SONG,  Daisuke INOUE,  Koji NAKAO,  

[Date]2011/6/9
[Paper #]IA2011-4,ICSS2011-4
A Practical Usage of Large-scale Darknet Monitoring for Disaster Recovery

Daisuke INOUE,  Junji NAKAZATO,  Jumpei SHIMAMURA,  Masashi ETO,  Koji NAKAO,  

[Date]2011/6/9
[Paper #]IA2011-5,ICSS2011-5
A study of the information system at the time of earthquake disaster

Masahiro HIJI,  

[Date]2011/6/9
[Paper #]IA2011-6,ICSS2011-6
An Extension of Hierarchical Automatic Locator Number Allocation Protocol HANA for a Hierarchical Routing Protocol

Kenji FUJIKAWA,  Masataka OHTA,  

[Date]2011/6/9
[Paper #]IA2011-7,ICSS2011-7
Secure and Traceable Online Image Sharing Scheme for Service Providers

Kohei SUGIYAMA,  Masaki FUKUSHIMA,  Teruyuki HASEGAWA,  

[Date]2011/6/9
[Paper #]IA2011-8,ICSS2011-8
Trend on Information Security and Technologies for Solving Issues

Ryoichi Sasaki,  

[Date]2011/6/9
[Paper #]IA2011-9,ICSS2011-9
Detecting Original Entry Point based on Comparing Runtime Library Codes in Malware Unpacking

Kazuki IWAMOTO,  Katsumi WASAKI,  

[Date]2011/6/9
[Paper #]IA2011-10,ICSS2011-10
Dense Ship:Virtual Machine Monitor Specialized for Server-Type Honeypot

Yuhei KAWAKOYA,  Makoto IWAMURA,  Mitsutaka ITOH,  

[Date]2011/6/9
[Paper #]IA2011-11,ICSS2011-11
Automatically Removing Malware Using Malware Analysis System

Nobutaka KAWAGUCHI,  Takayuki YODA,  Hiroki YAMAGUCHI,  Toshihiko KASAGI,  Yuji HOSIZAWA,  

[Date]2011/6/9
[Paper #]IA2011-12,ICSS2011-12
Analysis of Website Infections using Malware

Takeshi YAGI,  Shinta NAKAYAMA,  Mitsuaki AKIYAMA,  Kazufumi AOKI,  Takeo HARIU,  Mitsutaka ITOH,  

[Date]2011/6/9
[Paper #]IA2011-13,ICSS2011-13
複写される方へ

,  

[Date]2011/6/9
[Paper #]
Notice for Photocopying

,  

[Date]2011/6/9
[Paper #]
奥付

,  

[Date]2011/6/9
[Paper #]
裏表紙

,  

[Date]2011/6/9
[Paper #]