Abstract is missing.
- Detecting Unknown Malware from ASCII Strings with Natural Language Processing TechniquesRyo Ito, Mamoru Mimura. 1-8 [doi]
- Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT DevicesBing-Kai Hong, Jr-Wei Huang, Tao Ban, Ryoichi Isawa, Shin-Ming Cheng, Daisuke Inoue, Koji Nakao. 9-15 [doi]
- Malware Classification using Early Stage Behavioral AnalysisNitesh Kumar, Subhasis Mukhopadhyay, Mugdha Gupta, Anand Handa, Sandeep K. Shukla. 16-23 [doi]
- Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced DatasetMamoru Mimura, Yuya Suga. 24-31 [doi]
- String commitment scheme with low output localityHideaki Miyaji, Akinori Kawachi, Atsuko Miyaji. 32-39 [doi]
- Privacy and Integrity Protection of Metering Data in Smart GridYong Ding 0005, Bingyao Wang, Yujue Wang, Kun Zhang, Huiyong Wang. 40-47 [doi]
- Analysis of Division Property using MILP Method for Lightweight Blockcipher PiccoloHiroki Sato, Mamoru Mimura, Hidema Tanaka. 48-55 [doi]
- Secure Online-Efficient Interval Test based on Empty-Set CheckKatsunari Shishido, Atsuko Miyaji. 56-63 [doi]
- Platform Design and Implementation for Flexible Data Processing and Building ML Models of IDS AlertsIksoo Shin, Yunsoo Choi, Taewoong Kwon, Hyeakro Lee, Jungsuk Song. 64-71 [doi]
- Boosting Fuzzing Performance with Differential Seed SchedulingChung-Yi Lin, Chun-Ying Huang, Chia-Wei Tien. 72-79 [doi]
- Prediction of Crime Occurrence using Information Propagation Model and Gaussian ProcessShusuke Morimoto, Hajime Kawamukai, Kilho Shin. 80-87 [doi]
- Enabling Cybersecurity Incident Reporting and Coordinated Handling for Maritime SectorBilhanan Silverajan, Petteri Vistiaho. 88-95 [doi]
- Counter Attack Against the Bus-Off Attack on CANMasaru Takada, Yuki Osada, Masakatu Morii. 96-102 [doi]
- Prevention of Data Leakage due to Implicit Information Flows in Android ApplicationsHiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito. 103-110 [doi]
- Designing Authentication and Authorization System with BlockchainYuki Ezawa, Makoto Takita, Yoshiaki Shiraishi, Shohei Kakei, Masanori Hirotomo, Youji Fukuta, Masami Mohri, Masakatu Morii. 111-118 [doi]
- Watermarking Technique Based on Harris-Laplace Feature Point Detector Capable of Resisting Geometric AttacksKuo-Lung Hung, Chih-Yu Yen. 119-126 [doi]
- Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check MatricesMasanori Hirotomo, Haruka Ito, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi. 127-133 [doi]
- Signcryption from NTRU Lattices Without Random OraclesZi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo. 134-141 [doi]
- A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC CodesToshiki Tsuchida, Masanori Hirotomo, Haruka Ito, Makoto Takita, Yoshiaki Shiraishi, Kenta Nomura, Masami Mohri, Youji Fukuta, Masakatu Morii. 142-145 [doi]
- Subliminal Channels in the Code-based Ring Signature SchemeBingsen Wang, Zhuoran Zhang, Fangguo Zhang. 146-150 [doi]
- Learnable Audio Encryption for Untrusted Outsourcing Machine Learning ServicesPo-Wen Chi, Pin-Hsin Hsiao. 151-156 [doi]
- Password Strength Measurement without Password DisclosureTaku Sugai, Toshihiro Ohigashi, Yoshio Kakizaki, Akira Kanaoka. 157-164 [doi]
- Privacy Risk Evaluation of Re-Identification of PseudonymsYuma Takeuchi, Shogo Kitajima, Kazuya Fukushima, Masahiro Mambo. 165-172 [doi]