Information and Systems-Image Engineering(Date:2017/03/13)

Presentation
Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin

Kentaroh Toyoda(Keio Univ.),  Tomoaki Ohtsuki(Keio Univ.),  P. Takis Mathiopoulos(UoA),  

[Date]2017-03-13
[Paper #]ICSS2016-49
A Brief Review on Anomaly Detection and its Applications to Cybersecurity

Danilo Vasconcellos Vargas(Kyudai),  Kouichi Sakurai(Kyudai),  

[Date]2017-03-13
[Paper #]ICSS2016-50
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic

Taishi Nishiyama(NTT),  Atsutoshi Kumagai(NTT),  Yasushi Okano(NTT),  Kazunori Kamiya(NTT),  Masaki Tanikawa(NTT),  Kazuya Okada(University of Tokyo),  Yuji Sekiya(University of Tokyo),  

[Date]2017-03-13
[Paper #]ICSS2016-52
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data

Atsutoshi Kumagai(NTT),  Yasushi Okano(NTT),  Kazunori Kamiya(NTT),  Masaki Tanikawa(NTT),  

[Date]2017-03-13
[Paper #]ICSS2016-51
Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference

Hiroya Kato(Keio Univ.),  Shuichiro Haruta(Keio Univ.),  Iwao Sasase(Keio Univ.),  

[Date]2017-03-13
[Paper #]ICSS2016-54
Clustering of Bot Port Scan and Brute-force Activities

Shohei Araki(NTT),  Bo Hu(NTT),  Yukio Nagafuchi(NTT),  Takaaki Koyama(NTT),  Jun Miyoshi(NTT),  Hajime Shimada(Nagoya Univ.),  Hiroki Takakura(NII),  

[Date]2017-03-13
[Paper #]ICSS2016-46
Evaluation of memory image acquisition/analysis function in forensics tools

Ikuo Tanaka(IISEC),  Masaki Hashimoto(IISEC),  

[Date]2017-03-13
[Paper #]ICSS2016-53
A Study on Parameter Adjustment of Whitelist Detection Rule

Takeshi Ueda(Mitsubishi Electric Corp.),  Kobayashi Nobuhiro(Mitsubishi Electric Corp./ Shizuoka Univ.),  Masakatsu Nishigaki(Shizuoka Univ),  

[Date]2017-03-13
[Paper #]ICSS2016-56
Effective Analysis of Macro Malware Based on Clustering

Toshinori Usui(NTT),  Tomonori Ikuse(NTT Security Japan),  Makoto Iwamura(NTT),  Takeshi Yada(NTT),  

[Date]2017-03-13
[Paper #]ICSS2016-55
Primary Discussion about a Honeypot System for IoT Aimed Protocols

Katsutaka Ito(Nagoya Univ.),  Hirokazu Hasegawa(Nagoya Univ.),  Yukiko Yamaguchi(Nagoya Univ.),  Hajime Shimada(Nagoya Univ.),  

[Date]2017-03-13
[Paper #]ICSS2016-57
Modeling of Attack Activity for Integrated Analysis of Threat Information

Kenta Nomura(Kobe Univ.),  Daiki Ito(Kobe Univ.),  Masaki Kamizono(PwC Cyber Services),  Yoshiaki Shiraishi(Kobe Univ.),  Yasuhiro Takano(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Yuji Hoshizawa(PwC Cyber Services),  Masakatu Morii(Kobe Univ.),  

[Date]2017-03-13
[Paper #]ICSS2016-47
Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot

Tomomi Nishizoe(Yokohama National Univ.),  Daisuke Makita(Yokohama National Univ./NICT),  Katsunari Yoshioka(Yokohama National Univ.),  Tsutomu Matsumoto(Yokohama National Univ.),  

[Date]2017-03-13
[Paper #]ICSS2016-48
Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications

Yang Zhong(NTT),  Tohru Sato(NTT),  Masaki Tanikawa(NTT),  

[Date]2017-03-14
[Paper #]ICSS2016-59
V2X通信のメッセージ検証の簡略化方式の提案

Manabu Misawa(Mitsubishi Electric Corp.),  Masamichi Tanji(Mitsubishi Electric Corp.),  Takeshi Ueda(Mitsubishi Electric Corp.),  Nobuhiro Kobayashi(Mitsubishi Electric Corp.),  Hirohito Nishiyama(Mitsubishi Electric Corp.),  Atsushi Ohba(JARI),  

[Date]2017-03-14
[Paper #]ICSS2016-62
V2X通信のメッセージ検証簡略化方式に関する評価

Masamichi Tanji(Mitsubishi Electric Corp.),  Manabu Misawa(Mitsubishi Electric Corp.),  Takeshi Ueda(Mitsubishi Electric Corp.),  Nobuhiro Kobayashi(Mitsubishi Electric Corp.),  Hirohito Nishiyama(Mitsubishi Electric Corp.),  Atsushi Ohba(JARI),  

[Date]2017-03-14
[Paper #]ICSS2016-61
A Vulnerability Analysis of Android Applications from the View of Framework

Ryoya Furukawa(Kobe Univ.),  Tatsuya Nagai(Kobe Univ.),  Hiroshi Kumagai(PwC Cyber Services),  Masaki Kamizono(PwC Cyber Services),  Yoshiaki Shiraishi(Kobe Univ.),  Yasuhiro Takano(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Yuji Hoshizawa(PwC Cyber Services),  Masakatu Morii(Kobe Univ.),  

[Date]2017-03-14
[Paper #]
Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow

Ryosuke Miyazaki(ISIT/Kyushu Univ.),  Junpei Kawamoto,  Shinichi Matsumoto(Kyushu Univ.),  Kouichi Sakurai(ISIT/Kyushu Univ.),  

[Date]2017-03-14
[Paper #]ICSS2016-69
Low rate attack detection method based on duration of burst state by using quick packet matching function

Yuhei Hayashi(NTT),  Jia Yong Zhen(NTT),  Satoshi Nishiyama(NTT),  Akira Misawa(NTT),  

[Date]2017-03-14
[Paper #]ICSS2016-66
Graph based Detection of Advanced Persistent Threat on LAN

Hiroki Nagayama(NTT),  Bo Hu(NTT),  Takaaki Koyama(NTT),  Jun Miyoshi(NTT),  

[Date]2017-03-14
[Paper #]ICSS2016-65
Vibration-based Key Exchange among Multiple Smart Devices on the Desk

Alisa Arno(Keio Univ.),  Kentaroh Toyoda(Keio Univ.),  Yuji Watanabe(IBM Japan),  Iwao Sasase(Keio Univ.),  P. Takis Mathiopoulos(Athens Univ.),  

[Date]2017-03-14
[Paper #]ICSS2016-71
12>> 1-20hit(28hit)