list of accepted papers
- Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection Chia-Mei Chen, Gu-Hsin Lai and Pong-Yu Young
- Migrant Attack: A Multi-Resource DoS Attack on Cloud Virtual Machine Migration Schemes Jia-Rung Yeh, Hsu-Chun Hsiao and Ai-Chun Pang
- Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File Mamoru Mimura, Yuhei Otsubo and Hidehiko Tanaka
- Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlay Markku Vajaranta and Joona Kannisto
- Partial Server Side Parameter Selection in Private Information Retrieval Thomas Vannet and Noboru Kunihiro
- ({1,3},n) hierarchical secret sharing scheme based on XOR operations for a small number of indispensable participants Koji Shima and Hiroshi Doi
- NFC-based Mobile Payment Protocol with User Anonymity Shang-Wen Chen and Raylin Tso
- Design of Arithmetic Building Blocks for Cryptographic Systems Mostafa Abd-El-Barr and Aisha Al-Noori
- A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation Yuxuan Gao, Yaokai Feng, Junpei Kawamoto and Kouichi Sakurai
- Securing Smart Meters Data for AMI Using RBAC Ezedin Barka, Nedaa Al Hussien and Khaled Squab
- An Data Hiding Scheme Based on Formula Fully EMD and Pixel Value Differencing Method Wen-Chung Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu and Yu-Chih Huang
- Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet Juha Nurmi, Joona Kannisto and Markku Vajaranta
- New Conditional Differential Cryptanalysis for NLFSR-Based Stream Ciphers and Application to Grain v1 Yuhei Watanabe, Yosuke Todo and Masakatu Morii
- SDNort: A Software Defined Network Testing Framework Using Openflow Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei and Nen-Fu Huang
- How to Design Practical Client Honeypots Based on Virtual Environment Jinhak Park, Jangwon Choi and Jungsuk Song
- An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing Rohit Ahuja, Sraban Kumar Mohanty and Kouichi Sakurai
- Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network Bayu Adhi Tama and Kyung-Hyune Rhee
- Comparing Malware Samples for Unpacking: A Feasibility Study Ryoichi Isawa, Masakatu Morii and Daisuke Inoue
- Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots Satomi Saito, Satoru Torii, Katsunari Yoshioka and Tsutomu Matsumoto
- Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment Chih Hung Wang and Chien-Ming Wang
- Home Network Security: Modelling Power Consumption to Detect and Prevent Attacks on Homenet Routers Bilhanan Silverajan, Markku Vajaranta and Antti Kolehmainen
- Integration of Multimodal Features for Android Malware Detection Based on Linear SVM Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue and Koji Nakao
- Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares Hiroaki Kikuchi, Hideo Yasunaga, Hiroki Matsui and Chun-I Fan