- Junfeng Tian, Lizheng Xue, Hongyun Cai:
An Algorithm Based on Influence to Predict Invisible Relationship. AsiaJCIS 2018: 54-61 - Yu Tsuda, Junji Nakazato, Yaichiro Takagi, Daisuke Inoue, Koji Nakao, Kenjiro Terada:
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns. AsiaJCIS 2018: 102-108 - Jingyuan Wang, Peidai Xie, Yongjun Wang, Zelin Rong:
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use. AsiaJCIS 2018: 83-88 - Ming Xu, Yu Cheng, QiXin Yin:
Toward a Resilient System: The Inspiration from Information Security Management Appliance. AsiaJCIS 2018: 42-46 - 13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7380-5 [contents]
- 2017
- Masahito Ando, Masayuki Okada, Akira Kanaoka:
Simulation Study of BGP Origin Validation Effect against Mis-Origination with Internet Topology. AsiaJCIS 2017: 75-82 - Hung-Chang Chang:
Based on Standard Descriptors and Dynamic Key Features to Detect Malicious USB Storage Devices in APT. AsiaJCIS 2017: 65-68 - Chia-Mei Chen, Gu Hsin Lai, Je-Ming Lin:
Identifying Threat Patterns of Android Applications. AsiaJCIS 2017: 69-74 - D. J. Guan, Er-Shuo Zhuang, I. C. Chung, Yu-Shen Lin:
Performance Analysis of Some Batch Verification Methods of Digital Signatures. AsiaJCIS 2017: 10-14 - Masanori Hirotomo, Yuya Nishio, Masaki Kamizono, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi:
Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System. AsiaJCIS 2017: 48-54 - Younsu Lee, Sang-Soo Choi, Jangwon Choi, Jungsuk Song:
A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software. AsiaJCIS 2017: 5-9 - Mamoru Mimura, Yuhei Otsubo, Hidehiko Tanaka, Hidema Tanaka:
A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs. AsiaJCIS 2017: 31-37 - Jema David Ndibwile, Youki Kadobayashi, Doudou Fall:
UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App. AsiaJCIS 2017: 38-47 - Soushirou Sakumoto, Akira Kanaoka:
Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation. AsiaJCIS 2017: 15-22 - Bayu Adhi Tama, Akash Suresh Patil, Kyung Hyune Rhee:
An Improved Model of Anomaly Detection Using Two-Level Classifier Ensemble. AsiaJCIS 2017: 1-4 - Ling Yang, Xianhui Lu:
An Efficient Dispersal Storage Scheme Based on Ring-LWE and NTT. AsiaJCIS 2017: 23-30 - 12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2132-5 [contents]
- 2016
- Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai:
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing. AsiaJCIS 2016: 39-47 - Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM. AsiaJCIS 2016: 141-146 - Ezedin Barka, Nedaa Al Hussien, Khaled Shuaib:
Securing Smart Meters Data for AMI Using RBAC. AsiaJCIS 2016: 1-8 - Chia-Mei Chen, Gu Hsin Lai, Pong-Yu Young:
Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection. AsiaJCIS 2016: 74-79 - Shang-Wen Chen, Raylin Tso:
NFC-based Mobile Payment Protocol with User Anonymity. AsiaJCIS 2016: 24-30 - Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei, Nen-Fu Huang:
SDNort: A Software Defined Network Testing Framework Using Openflow. AsiaJCIS 2016: 100-107 - Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation. AsiaJCIS 2016: 80-86 - Ryoichi Isawa, Masakatu Morii, Daisuke Inoue:
Comparing Malware Samples for Unpacking: A Feasibility Study. AsiaJCIS 2016: 155-160 - Hiroaki Kikuchi, Hideo Yasunaga, Hiroki Matsui, Chun-I Fan:
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares. AsiaJCIS 2016: 48-54 - Wen-Chung Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu, Yu-Chih Huang:
An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method. AsiaJCIS 2016: 136-140 - Mamoru Mimura, Yuhei Otsubo, Hidehiko Tanaka:
Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File. AsiaJCIS 2016: 147-154 - Juha Nurmi, Joona Kannisto, Markku Vajaranta:
Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet. AsiaJCIS 2016: 55-59 - Jinhak Park, Jang Won Choi, Jung-suk Song:
How to Design Practical Client Honeypots Based on Virtual Environment. AsiaJCIS 2016: 67-73