Information and Systems-Information and Communication System Security(Date:2014/11/20)

Presentation
表紙

,  

[Date]2014/11/20
[Paper #]
目次

,  

[Date]2014/11/20
[Paper #]
Introduction to Japan's Control System Security Center

Hideaki KOBAYASHI,  

[Date]2014/11/20
[Paper #]ICSS2014-51
Dynamic Zoning of the Industrial Control System for Security improvement

Wataru MACHII,  Isao KATO,  Masahito KOIKE,  Masafumi MATTA,  Tomomi AOYAMA,  Ichiro KOSHIJIMA,  Yoshihiro HASHIMOTO,  

[Date]2014/11/20
[Paper #]ICSS2014-52
Industrial Control System Monitoring based on Communication Profile

Masafumi MATTA,  Masahito KOIKE,  Wataru MACHII,  Tomomi AOYAMA,  Hidemasa NARUOKA,  Ichiro KOSHIJIMA,  Yoshihiro HASHIMOTO,  

[Date]2014/11/20
[Paper #]ICSS2014-53
Studying Resilient Cyber Incident Management From Large-scale Cyber Security Training

Tomomi Aoyama,  Ichiro Koshijima,  Kohei Seki,  Masafumi Matta,  

[Date]2014/11/20
[Paper #]ICSS2014-54
On the status of techniques and standardization regarding lightweight cryptography : ISO/IEC JTC1/SC27/WG2 status report

Hirotaka YOSHIDA,  Dai WATANABE,  Nicky MOUHA,  

[Date]2014/11/20
[Paper #]ICSS2014-55
Efficient Computation of Weil Pairing over Supersingular Elliptic Curve and Its Evaluation

Kazuma TANAKA,  Tadanori TERUYA,  Naoki KANAYAMA,  Takashi NISHIDE,  Eiji OKAMOTO,  

[Date]2014/11/20
[Paper #]ICSS2014-56
Expansion of a Proposal of Short Proxy Signature into an Aggregate Signature Scheme and Adaptation of it to Content Editing System

Keiji Ogura,  Masaki IWAMURA,  Keiichi IWAMURA,  

[Date]2014/11/20
[Paper #]ICSS2014-57
Security Evaluation of Content Editing System that Previous Control allow about Editing Operation

Katsuma Koga,  Keiichi Iwamura,  Masaki Inamura,  

[Date]2014/11/20
[Paper #]ICSS2014-58
Detecting Backscatter of DDoS Attacks from Darknet Traffic

Nobuaki FURUTANI,  Tao BAN,  Junji NAKAZATO,  Jumpei SHIMAMURA,  Jun KITAZONO,  Seiichi OZAWA,  

[Date]2014/11/20
[Paper #]ICSS2014-59
A Study of Drive by Download Attack detection using the features of the obfuscation

Hirotaka FUJIWARA,  Gregory BLANC,  Hiroaki HAZEYAMA,  Youki KADOBAYASHI,  

[Date]2014/11/20
[Paper #]ICSS2014-60
Searching malicious URL from vast webspace

Bo SUN,  Mitsuaki AKIYAMA,  Takeshi YAGI,  Tatsuya MORI,  

[Date]2014/11/20
[Paper #]ICSS2014-61
Detecting infected hosts with machine learning analysis of DNS responses

Wataru TSUDA,  Youki KADOBAYASHI,  Hirotaka FUJIWARA,  Suguru YAMAGUCHI,  

[Date]2014/11/20
[Paper #]ICSS2014-62
複写される方へ

,  

[Date]2014/11/20
[Paper #]
Reprographic Reproduction outside Japan

,  

[Date]2014/11/20
[Paper #]
奥付

,  

[Date]2014/11/20
[Paper #]
裏表紙

,  

[Date]2014/11/20
[Paper #]