list of accepted papers

  • Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection Chia-Mei Chen, Gu-Hsin Lai and Pong-Yu Young
  • Migrant Attack: A Multi-Resource DoS Attack on Cloud Virtual Machine Migration Schemes Jia-Rung Yeh, Hsu-Chun Hsiao and Ai-Chun Pang
  • Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File Mamoru Mimura, Yuhei Otsubo and Hidehiko Tanaka
  • Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlay Markku Vajaranta and Joona Kannisto
  • Partial Server Side Parameter Selection in Private Information Retrieval Thomas Vannet and Noboru Kunihiro
  • ({1,3},n) hierarchical secret sharing scheme based on XOR operations for a small number of indispensable participants Koji Shima and Hiroshi Doi
  • NFC-based Mobile Payment Protocol with User Anonymity Shang-Wen Chen and Raylin Tso
  • Design of Arithmetic Building Blocks for Cryptographic Systems Mostafa Abd-El-Barr and Aisha Al-Noori
  • A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation Yuxuan Gao, Yaokai Feng, Junpei Kawamoto and Kouichi Sakurai
  • Securing Smart Meters Data for AMI Using RBAC Ezedin Barka, Nedaa Al Hussien and Khaled Squab
  • An Data Hiding Scheme Based on Formula Fully EMD and Pixel Value Differencing Method Wen-Chung Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu and Yu-Chih Huang
  • Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet Juha Nurmi, Joona Kannisto and Markku Vajaranta
  • New Conditional Differential Cryptanalysis for NLFSR-Based Stream Ciphers and Application to Grain v1 Yuhei Watanabe, Yosuke Todo and Masakatu Morii
  • SDNort: A Software Defined Network Testing Framework Using Openflow Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei and Nen-Fu Huang
  • How to Design Practical Client Honeypots Based on Virtual Environment Jinhak Park, Jangwon Choi and Jungsuk Song
  • An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing Rohit Ahuja, Sraban Kumar Mohanty and Kouichi Sakurai
  • Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network Bayu Adhi Tama and Kyung-Hyune Rhee
  • Comparing Malware Samples for Unpacking: A Feasibility Study Ryoichi Isawa, Masakatu Morii and Daisuke Inoue
  • Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots Satomi Saito, Satoru Torii, Katsunari Yoshioka and Tsutomu Matsumoto
  • Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment Chih Hung Wang and Chien-Ming Wang
  • Home Network Security: Modelling Power Consumption to Detect and Prevent Attacks on Homenet Routers Bilhanan Silverajan, Markku Vajaranta and Antti Kolehmainen
  • Integration of Multimodal Features for Android Malware Detection Based on Linear SVM Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue and Koji Nakao
  • Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares Hiroaki Kikuchi, Hideo Yasunaga, Hiroki Matsui and Chun-I Fan