Information and Systems-Information and Communication System Security(Date:2009/11/06)

Presentation
表紙

,  

[Date]2009/11/6
[Paper #]
目次

,  

[Date]2009/11/6
[Paper #]
Identifying Potentially-Impacted Area using CVSS for Networked Systems

Toshiki HARADA,  Akira KANAOKA,  Eiji OKAMOTO,  Masahiko KATO,  

[Date]2009/11/6
[Paper #]ICSS2009-54
Similarity Scoring Method of Runtime Packed Malware and Its Evaluation

Tatsunori Orii,  Katsunari Yoshioka,  Junji Shikata,  Tsutomu Matsumoto,  Hyung Chan Kim,  Daisuke Inoue,  Koji Nakao,  

[Date]2009/11/6
[Paper #]ICSS2009-55
Vulnerability inspection system for Web application by OS level virtualization

Toshiaki SARAYA,  Naoto SONE,  Masakatu MORII,  

[Date]2009/11/6
[Paper #]ICSS2009-56
A Study of Detection Rate Improvement for Spam Mail Filter Functioning Before Receiving the Message Body

Yukiko SAWAYA,  Yutaka MIYAKE,  

[Date]2009/11/6
[Paper #]ICSS2009-57
Web Tracking Site Detection and Blacklist Generation Based on Temporal Link Analysis

Akira YAMADA,  Masanori HARA,  Yutaka MIYAKE,  Kazuo HASHIMOTO,  

[Date]2009/11/6
[Paper #]ICSS2009-58
Authenticating RFID Tags using Insulated Keys

Mohammad RAHMAN,  Atsuko MIYAJI,  

[Date]2009/11/6
[Paper #]ICSS2009-59
A Consideration of Feature Extraction for Attacks on Darknet

Yoshiro FUKUSHIMA,  Yoshiaki HORI,  Kouichi SAKURAI,  

[Date]2009/11/6
[Paper #]ICSS2009-60
A classification method for packet generation logic of darknet traffic based on characteristics of packet header

Junji NAKAZATO,  Jumpei SHIMAMURA,  Masashi ETO,  Daisuke INOUE,  Koji NAKAO,  

[Date]2009/11/6
[Paper #]ICSS2009-61
複写される方へ

,  

[Date]2009/11/6
[Paper #]
Notice for photocopying

,  

[Date]2009/11/6
[Paper #]
奥付

,  

[Date]2009/11/6
[Paper #]