Information and Systems-Software Science(Date:2015/11/26)

Presentation
A Traffic Analysis to Identify Unintended Impact on Business Caused by an Incident Response

Minori Shiota(Nagoya Univ),  Yukiko Yamaguchi(Nagoya Univ),  Hajime Shiimada(Nagoya Univ),  Hiroki Takakura(NII),  

[Date]2015-11-26
[Paper #]ICSS2015-36
TCP Behavior-based Slow DoS Attack Detection

Hiroyuki Nooka(NTT),  Kazunori Kamiya(NTT),  Hiroshi Kurakami(NTT),  Takeshi Yada(NTT),  

[Date]2015-11-26
[Paper #]ICSS2015-37
[Invited Talk] International trends in cyber security for Medical Devices

Toshiaki Nakazato(SNAG),  

[Date]2015-11-26
[Paper #]ICSS2015-41
tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header

Takashi Koide(Yokohama National Univ.),  Daisuke Makita(Yokohama National Univ./NICT),  Takahiro Kasama(NICT),  Mio Suzuki(NICT),  Daisuke Inoue(NICT),  Koji Nakao(NICT),  Katsunari Yoshioka(Yokohama National Univ.),  Tsutomu Matsumoto(Yokohama National Univ.),  

[Date]2015-11-26
[Paper #]ICSS2015-38
[Invited Talk] The latest trend of the international standardization for Safety and Security in factories

Koji Demachi(Yokogawa Electric),  

[Date]2015-11-26
[Paper #]ICSS2015-35
Study on Rogue Access Point detection method

Takaaki Hoyo(Hosei Univ.),  Atsushi Kanai(Hosei Univ.),  

[Date]2015-11-26
[Paper #]ICSS2015-39
On Evaluation of Android Markets Based on Maliciousness and Impact of Registered Applications

Yosuke Kikuchi(YNU),  Katsunari Yoshioka(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2015-11-26
[Paper #]ICSS2015-40
[Invited Talk] Observing IoT Devices Infected by Malware

Katsunari Yoshioka(YNU),  

[Date]2015-11-26
[Paper #]
Cyber security issues and measures of automobiles

Hiroki Mase(NIT),  Kazuma Ito(NIT),  Shinya Yamamoto(NIT),  

[Date]2015-11-27
[Paper #]ICSS2015-43
An annotated context-free grammar based vulnerability detection using LALR parser

Ruo Ando(NICT),  

[Date]2015-11-27
[Paper #]ICSS2015-46
[Invited Talk] Introduction of Fukushima Renewable Energy Institute, AIST (FREA)

Hirohide Furutani(AIST),  Kenji Otani(AIST),  

[Date]2015-11-27
[Paper #]ICSS2015-42
A Suspicious Processes Detection Scheme using Process Frequency

Junji Nakazato(NICT),  Yu Tsuda(NICT),  Masashi Eto(NICT),  Daisuke Inoue(NICT),  Koji Nakao(NICT),  

[Date]2015-11-27
[Paper #]ICSS2015-45
Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language

Masaki Hashimoto(IISEC),  Minetoshi Takizawa(IISEC),  Fumihiko Takayama(IIT),  Hidenori Tsuji(IISEC),  Hidehiko Tanaka(IISEC),  

[Date]2015-11-27
[Paper #]ICSS2015-44
[Invited Talk] International Standardization for Secure Software Update of ITS Communication Devices

Masashi Eto(NICT),  

[Date]2015-11-27
[Paper #]