IEICE Transactions in Information and Systems - 巻 101 / 号 11
| タイトル | |||||||||
|---|---|---|---|---|---|---|---|---|---|
| 著者 | 巻 | 号 | ページ | 年 | PKV | ||||
| An Overview of Cyber Security for Connected Vehicles | |||||||||
| Junko TAKAHASHI | 101 | 11 | 2561–2575 | 2018 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities | |||||||||
| Hiroki NAKANO, Fumihiro KANEI, Yuta TAKATA, Mitsuaki AKIYAMA, Katsunar ... | 101 | 11 | 2576–2583 | 2018 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps | |||||||||
| Takuya WATANABE, Mitsuaki AKIYAMA, Tetsuya SAKAI, Hironori WASHIZAKI, ... | 101 | 11 | 2584–2599 | 2018 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences | |||||||||
| Yuta TAKATA, Mitsuaki AKIYAMA, Takeshi YAGI, Takeo HARIU, Kazuhiko OHK ... | 101 | 11 | 2600–2611 | 2018 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices | |||||||||
| Yong JIN, Masahiko TOMOISHI, Satoshi MATSUURA, Yoshiaki KITAGUCHI | 101 | 11 | 2612–2621 | 2018 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Automatically Generating Malware Analysis Reports Using Sandbox Logs | |||||||||
| Bo SUN, Akinori FUJINO, Tatsuya MORI, Tao BAN, Takeshi TAKAHASHI, Dais ... | 101 | 11 | 2622–2632 | 2018 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Design and Implementation of SDN-Based Proactive Firewall System in Collaboration with Domain Name Resolution | |||||||||
| Hiroya IKARASHI, Yong JIN, Nariyoshi YAMAI, Naoya KITAGAWA, Kiyohiko O ... | 101 | 11 | 2633–2643 | 2018 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement | |||||||||
| Hiroki KUZUNO, Giannis TZIAKOURIS | 101 | 11 | 2644–2657 | 2018 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Modeling Attack Activity for Integrated Analysis of Threat Information | |||||||||
| Daiki ITO, Kenta NOMURA, Masaki KAMIZONO, Yoshiaki SHIRAISHI, Yasuhiro ... | 101 | 11 | 2658–2664 | 2018 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes | |||||||||
| Seira HIDANO, Takao MURAKAMI, Shuichi KATSUMATA, Shinsaku KIYOMOTO, Go ... | 101 | 11 | 2665–2676 | 2018 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||