|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2024-03-22 15:45 |
Nagasaki |
Ikinoshima Hall (Primary: On-site, Secondary: Online) |
Software Vulnerability Risk Growth Model for CVSS 4 Metrics Sora Okada, Takashi Minohara, Masaya Shimakawa (Takushoku Univ.) CPSY2023-47 DC2023-113 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2023-47 DC2023-113 pp.53-58 |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Strengthening Cybersecurity with Data Analytics
-- A Web Tool for Secure Exploration of CVE Data -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68 |
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] |
IA2023-68 pp.48-51 |
NLC |
2022-03-07 13:25 |
Online |
Online |
An Exploratory Text Analysis for the Ideologies of the Chinese Communist Party Yuki Mikiya (Keio Univ.), Daichi Mochihashi (ISM) NLC2021-32 |
Understanding the semantic differences among texts has important implications in the social sciences and humanities. In ... [more] |
NLC2021-32 pp.24-29 |
ICSS, IPSJ-SPT |
2020-03-03 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-92 |
(To be available after the conference date) [more] |
ICSS2019-92 pp.151-155 |
ICSS |
2018-11-22 13:30 |
Kagoshima |
|
ICSS2018-64 |
(To be available after the conference date) [more] |
ICSS2018-64 pp.61-66 |
IBISML |
2016-11-17 14:00 |
Kyoto |
Kyoto Univ. |
Exhaustive search for sparse variable selection in linear regression Yasuhiko Igarashi, Hikaru Takenaka, Nakanishi-Ohno Yoshinori (UTokyo), Makoto Uemura (Hiroshima Univ.), Shiro Ikeda (ISM), Masato Okada (UTokyo) IBISML2016-90 |
We proposed the $K$-sparse
Exhaustive-Search (ES-$K$) method,
in which, assuming the optimum combination of
explan... [more] |
IBISML2016-90 pp.313-320 |
ICSS |
2015-03-04 10:25 |
Okinawa |
Meio Univiersity |
Estimation of Vulnerability Score based on Annual Analysis with Supervised Latent Dirichlet Allocation Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama (Tokyo Univ.) ICSS2014-79 |
This research purpose is to determine technical scores of vulnerability by using machine learning methods in order to ev... [more] |
ICSS2014-79 pp.97-102 |
ICM, LOIS |
2011-01-21 13:30 |
Nagasaki |
|
A Multi-Platform Vulnerability Management System Based on the Standard Protocol and Public Contents Akihito Nakamura (AIST) ICM2010-51 LOIS2010-62 |
Continuous vulnerability management is one of critical and effective controls to block security attacks. However, the ad... [more] |
ICM2010-51 LOIS2010-62 pp.105-110 |
AI |
2007-11-26 14:30 |
Tokyo |
Kwansei Gakuin University, Tokyo Marunouchi Campus |
Open 3D Digital Space Construction Method for Symbiotic Cooperative Works Gen Kitagata, Akira Sakatoku, Takayuki Kuroda, Tetsuo Kinoshita, Norio Shiratori (Tohoku Univ.) AI2007-18 |
We are developing Symbiotic Office application as a cooperative work
supporting system. Symbiotic Office incorporates s... [more] |
AI2007-18 pp.41-46 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|