JOURNAL |
Vol. 63 No. 2 |
Special Issue on Network Security |
●contents |
1 |
Introduction: Overview of NICT’s Research and Development Projects on Network Security
Kazumasa TAIRA |
2 |
Summary of Research and Development Activities |
|
2-1 |
Overview of Research and Development Activities on Cyber-Security
Daisuke INOUE |
|
2-2 |
|
|
2-3 |
Overview of R&D Activities of Security Fundamental Technologies
Shiho MORIAI |
3 |
Cybersecurity Technologies : Darknet Monitoring and Analysis |
|
3-1 |
Long-term Darknet Analysis in NICTER
Takahiro KASAMA |
|
3-2 |
GHOST Sensor: Development of a Proactive Cyber-attack Observation Platform
Masashi ETO |
|
3-3 |
Data Mining Applied to Darknet Traffic Analysis
Tao BAN |
|
3-4 |
DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks
Mio SUZUKI, Koei SUZUKI, Yaichiro TAKAGI, and Ryoichi ISAWA |
|
3-5 |
Internet Alive Monitoring around Disaster Areas using Large-scale Darknet
Mio SUZUKI |
4 |
Cyber-Security Technologies: Live Network Monitoring and Analysis Technologies
|
|
4-1 |
NIRVANA-Kai: A Real-time Visual SIEM System Against Targeted Attacks
Yu TSUDA, Nobuyuki KANAYA, Takashi TOMINE, Masaki KAMIZONO, Masato JINGU, Yaichiro TAKAGI, and Koei SUZUKI |
|
4-2 |
Rapid Analysis Technologies for Live Networks
Ichiro SHIMADA and Yu TSUDA |
|
4-3 |
A Suspicious Process Analysis in Cooperation with End Hosts
Junji NAKAZATO, Yu TSUDA, and Yaichiro TAKAGI |
|
4-4 |
The Design and Application of a Mimetic Network Environment Construction System
~Security Verification Environment Building System and Contribution to Human Resource Development~
Shingo YASUDA |
|
4-5 |
SF-TAP: Scalable and Flexible Traffic Analysis Platform
Yuuki TAKANO |
5 |
Cybersecurity Technologies: Countermeasures Against Emerging Threats
|
|
5-1 |
Technology for Supporting Obfuscated-Malware Analysis
Ryoichi ISAWA and Tao BAN |
|
5-2 |
Framework for Countering Drive-By Download
Takahiro KASAMA, Takashi MATSUNAKA, Akira YAMADA, Ayumu KUBOTA, Nobuyo FUJIWARA, Kazuo KAWAMORITA, and Koichiro OKADA |
|
5-3 |
Development of Honeypot to Observe DRDoS Attacks
Daisuke MAKITA and Katsunari YOSHIOKA |
|
5-4 |
Studies on Countermeasures for Malicious USB Devices
Tatsuya TAKEHISA, Makoto IWAMURA, and Hayato USHIMARU |
6 |
Security Architecture Techniques
|
|
6-1 |
Cybersecurity Information Discovery Technique and Knowledge Base
Takeshi TAKAHASHI |
|
6-2 |
Automated Vulnerability Monitoring Techniques for IT Assets on the Network
Takeshi TAKAHASHI |
|
6-3 |
Risk Analysis System for Android Applications
Takeshi TAKAHASHI and Tao BAN |
|
6-4 |
Description and Negotiation Techniques to Establish Security SLA
Takeshi TAKAHASHI |
|
6-5 |
Revocable Identity-Based Encryption
Keita EMURA |
|
6-6 |
Authentication Protocol and its Evaluation for IoT Devices
Daisuke MORIYAMA |
|
6-7 |
Two Approaches to Analyzing the Security of Cryptographic Protocols
Maki YOSHIDA |
|
6-8 |
Secure and Anonymous Communication Technique
Keita EMURA and Takeshi TAKAHASHI |
7 |
Security Fundamental Technologies
|
|
7-1 |
Recent Developments in Security Evaluation Technologies of Cryptosystems
Naoyuki SHINOHARA, Yoshinori AONO, and Takuya HAYASHI |
|
7-2 |
Analysis System (XPIA)
Takashi KUROKAWA, Ryo NOJIMA, and Shiho MORIAI |
|
7-3 |
CRYPTREC Activities and a Revision of the e-Government Recommended Ciphers List…
Takashi KUROKAWA, Sachiko KANAMORI, Ryo NOJIMA, Miyako OHKUBO, and Shiho MORIAI |
|
7-4 |
An Encrypted File Storage System with Hierarchical Levels of Sensitivity and its Applications
Lihua WANG, Takuya HAYASHI, Atsushi WASEDA, Ryo NOJIMA, and Shiho MORIAI |
|
7-5 |
Structure Preserving Cryptography
Miyako OHKUBO |
|
7-6 |
Privacy Preserving Technologies for Personal Data
Ryo NOJIMA, Sachiko KANAMORI, Atsushi WASEDA, Keita EMURA, and Takuya HAYASHI |
|
7-7 |
Long Term Cryptography and Applications to Privacy-Preserving Data Mining
Le Trieu PHONG, Yoshinori AONO, Takuya HAYASHI, and Lihua WANG |
|
7-8 |
Information Theoretic Secure Cryptosystems
Atsushi WASEDA and Ryo NOJIMA |
8 |
List of Published Presentation Papers of Network Security Research Institute and Cybersecurity Research Center
|