Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2023-05-17 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Risk Assessment Method against ML-specific Attacks for ML system developers
-- A Damage Assessment Method for ML system developers -- Jun Yajima, Maki Inui, Kentarou Tsuji (Fujitsu Ltd.), Nobukazu Yoshioka (Waseda Univ.) ISEC2023-4 |
To develop machine learning (ML) systems that are secure againstML-specific attacks, to conduct threat assessment to fin... [more] |
ISEC2023-4 pp.25-32 |
KBSE |
2022-03-10 10:15 |
Online |
Online (Zoom) |
Safety risk analysis and evaluation method for DNN system in autonomous driving Tomoko Kaneko, Yuji Takahashi (NII), Shinichi Yamaguchi (SDM), Junji Hashimoto (GREE), Nobukazu Yoshioka (Soudai) KBSE2021-51 |
There is a great concern about the quality of current AI, especially DNN (deep learning), especially about its safety an... [more] |
KBSE2021-51 pp.60-65 |
KBSE |
2021-01-23 15:55 |
Online |
Online |
[Invited Talk]
"Research Trends and Future Prospects for Safety and Security of Machine Learning Applied Systems" Nobukazu Yoshioka (NII) KBSE2020-33 |
[more] |
KBSE2020-33 p.25 |
KBSE |
2020-09-18 14:15 |
Online |
Online |
PROPOSAL FOR ENSURING SAFETY OF THE ENTIRE MACHINE LEARNING SYSTEM Tomoko Kaneko, Yuji Takahashi, Nobukazu Yoshioka (NII) KBSE2020-5 |
[more] |
KBSE2020-5 pp.25-30 |
KBSE |
2020-01-25 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
CC-CASE: SAFETY& SECURITY ENGINEERING METHODOLOGY FOR AI/IOT Tomoko Kaneko, Nobukazu Yoshioka (NII) KBSE2019-42 |
We aim to develop a safe and secure development methodology for complex systems in the AI / IoT era. We will show a new ... [more] |
KBSE2019-42 pp.25-30 |
KBSE |
2019-03-02 09:00 |
Kyoto |
Doshisha University Kambaikan |
Development of Knowledge Presentation Method in Security Requirement Analysis and Design Using a Software Security Knowledge Base and Evaluation by a Case Study Yuki Yamada, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) KBSE2018-62 |
In recent years, the threat of cyber attacks such as information disclosure due to unauthorized access has become seriou... [more] |
KBSE2018-62 pp.51-56 |
KBSE |
2018-03-01 15:50 |
Okinawa |
|
Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50 |
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] |
KBSE2017-50 pp.67-72 |
SC |
2015-10-02 15:10 |
Tokyo |
NII |
Distributed Cloud with Overlay Cloud Architecture
-- nano clouds, micro clouds and mega clouds work together -- Shigetoshi Yokoyama, Yoshinobu Masatani, Nobukazu Yoshioka, Kento Aida (NII) SC2015-12 |
[more] |
SC2015-12 pp.23-26 |
KBSE, SS, IPSJ-SE [detail] |
2015-07-23 10:40 |
Hokkaido |
|
Proposal of EMSsec-Common Problem for Security and Privacy Takao Okubo (IISEC), Haruhiko Kaiya (Kanagawa Univ.), Hironori Washizaki (Waseda Univ.), Shinpei Ogata (Shinshu Univ.), Yoshio Kakizaki (Dendai Univ.), Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) SS2015-22 KBSE2015-15 |
[more] |
SS2015-22 KBSE2015-15 pp.69-74 |
SC |
2015-06-05 13:05 |
Tokyo |
National Institute of Informatics 12F 1210/1208 |
Inter-Cloud Environment with Overlay Cloud Architecture Shigetoshi Yokoyama, Yoshinobu Masatani, Nobukazu Yoshioka, Kento Aida (NII) SC2015-1 |
[more] |
SC2015-1 pp.1-6 |
SC |
2015-06-05 13:30 |
Tokyo |
National Institute of Informatics 12F 1210/1208 |
A trial of improvement of Cloud Monitoring "Map" using the Access Log Satoshi Yazawa (e-ambition), Shingo Nakagawa, Fumiaki Kanezashi (carabiner), Kazuhiko Nishimura (e-ambition), Masaru Nagaku, Yoshinobu Masatani, Shigetoshi Yokoyama, Nobukazu Yoshioka (NII) SC2015-2 |
[more] |
SC2015-2 pp.7-11 |
SC |
2015-06-05 15:20 |
Tokyo |
National Institute of Informatics 12F 1210/1208 |
Infrastructure as Code meets IPython notebook to be Literate Computing Yoshinobu Masatani, Satoshi Yazawa, Shigetoshi Yokoyama, Nobukazu Yoshioka, Kento Aida (NII) SC2015-6 |
Cloud has put the pressure to rapidly build systems and frequently re-configure services, then Infrastructure as Code ha... [more] |
SC2015-6 pp.27-32 |
KBSE |
2015-03-05 15:25 |
Tokyo |
The University of Electro-Communications |
A Case-based Management System for Secure Software Development Using Software Security Knowledge Masahito Saito, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-57 |
In recent years, importance on software security technologies has been recognized and various types of the technologies ... [more] |
KBSE2014-57 pp.31-36 |
KBSE |
2015-01-27 11:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Case base of secure web application development using software security knowledge base Atsuo Hazeyama, Masahito Saito (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Azusa Kumagaya (Tokyo Gakugei Univ.), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-47 |
Importance for software security technologies has been recognized according to increase of services on the Internet. Var... [more] |
KBSE2014-47 pp.49-54 |
IA |
2014-10-07 10:35 |
Osaka |
Grand Front OSAKA Tower-B 10F |
Cloud Service for Building Academic Cloud Kento Aida, Kazutsuna Yamaji, Motonori Nakamura, Shigetoshi Yokoyama, Nobukazu Yoshioka, Yoshinobu Masatani (NII), Kouji Nishimura (Hiroshima Univ.), Masaharu Munetomo (Hokkaido Univ.) IA2014-24 |
(To be available after the conference date) [more] |
IA2014-24 pp.1-5 |
ICM |
2014-03-14 16:50 |
Okinawa |
|
Practical application of Cloud Monitoring using a huge Map Satoshi Yazawa (e-ambition), Shingo Nakagawa, Fumiaki Kanezashi (carabiner), Kazuhiko Nishimura (e-ambition), Masaru Nagaku, Shigetoshi Yokoyama, Nobukazu Yoshioka (NII) ICM2013-79 |
[more] |
ICM2013-79 pp.161-165 |
SC |
2014-01-10 14:15 |
Tokyo |
NII |
Design of Academic Intercloud Kento Aida, Shigetoshi Yokoyama, Nobukazu Yoshioka, Kenjiro Yamanaka, Masaru Nagaku, Michihiro Aoki, Shunji Abe, Shigeo Urushidani (NII) SC2013-13 |
Cloud computing is now widely used in the academic community. Users in the academic community have a lot of opportunitie... [more] |
SC2013-13 pp.1-6 |
KBSE |
2013-09-12 13:15 |
Tokyo |
The University of Electro-Communications |
A Study of the Application of Model Checking to Embedded Software Based on Interrupt Processing Takanori Sasaki (UEC), Nobukazu Yoshioka (NII), Yasuyuki Tahara, Akihiko Ohsuga (UEC) KBSE2013-39 |
Detecting errors from incorrect interrupt processing when testing embedded systems is difficult because same scenario ca... [more] |
KBSE2013-39 pp.19-24 |
SC |
2013-06-17 17:15 |
Tokyo |
National Institute of Informatics |
A Study toward the development of Visualization and Monitoring tools in Private Cloud Satoshi Yazawa, Kazuhiko Nishimura (e-ambition), Masaru Nagaku, Shigetoshi Yokoyama, Nobukazu Yoshioka (NII) SC2013-8 |
National Institute of Informatics has developed a private IaaS cloud "edubase Cloud" under the concept of [IT labs for e... [more] |
SC2013-8 pp.41-46 |
KBSE |
2012-11-22 16:05 |
Ishikawa |
Kanazawa University |
Security Requirements Analysis under Bring Your Own Device Yuuji Suzuki, Haruhiko Kaiya, Shinpei Ogata (SU), Takao Okubo, Nobuyuki Kanaya (Fujitsu Lab.), Nobukazu Yoshioka (NII) KBSE2012-47 |
[more] |
KBSE2012-47 pp.55-60 |