IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 11 of 11  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2024-03-22
15:45
Nagasaki Ikinoshima Hall
(Primary: On-site, Secondary: Online)
Software Vulnerability Risk Growth Model for CVSS 4 Metrics
Sora Okada, Takashi Minohara, Masaya Shimakawa (Takushoku Univ.) CPSY2023-47 DC2023-113
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] CPSY2023-47 DC2023-113
pp.53-58
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Analyzing Cybersecurity Datasets -- Enhancing Security throughout the Data Life Cycle --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] IA2023-63
pp.37-39
ICSS, IPSJ-SPT 2022-03-07
13:30
Online Online Time Efficient Risk Assessment Tool for IoT Systems
Rajulapati Shourya, Takashi Kawauchi (Hitachi) ICSS2021-60
We have developed an integrated security design platform that provides security analysis independent of the consultant's... [more] ICSS2021-60
p.13
IN 2021-01-18
15:50
Online Online [Invited Talk] Risk Analysis Methods and Actual Conditions in Cyber Security
Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] IN2020-49
p.37
ICSS, IPSJ-SPT 2020-03-03
16:00
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
ICSS2019-92 (To be available after the conference date) [more] ICSS2019-92
pp.151-155
ICSS 2018-11-22
13:30
Kagoshima   ICSS2018-64 (To be available after the conference date) [more] ICSS2018-64
pp.61-66
ICSS 2015-03-04
10:25
Okinawa Meio Univiersity Estimation of Vulnerability Score based on Annual Analysis with Supervised Latent Dirichlet Allocation
Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama (Tokyo Univ.) ICSS2014-79
This research purpose is to determine technical scores of vulnerability by using machine learning methods in order to ev... [more] ICSS2014-79
pp.97-102
ISEC, LOIS 2013-11-29
13:30
Miyagi Tohoku Univ. The proposal on a vulnerability evaluation method according to information system environment
Naoki Kamegai, Naoshi Sato (IISEC) ISEC2013-69 LOIS2013-35
It is essential to perform a vulnerability assessment to avoid for the security incident of own system because a lot of ... [more] ISEC2013-69 LOIS2013-35
pp.65-70
ICM, LOIS 2011-01-21
13:30
Nagasaki   A Multi-Platform Vulnerability Management System Based on the Standard Protocol and Public Contents
Akihito Nakamura (AIST) ICM2010-51 LOIS2010-62
Continuous vulnerability management is one of critical and effective controls to block security attacks. However, the ad... [more] ICM2010-51 LOIS2010-62
pp.105-110
ICSS 2009-11-13
10:40
Miyazaki University of Miyazaki Identifying Potentially-Impacted Area using CVSS for Networked Systems
Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.of Tsukuba), Masahiko Kato (IIJ Tech. Inc.) ICSS2009-54
CVSS(Common Vulnerability Scoring System) is a vulnerability scoring method. CVSS is composed of
three metrics groups: ... [more]
ICSS2009-54
pp.1-6
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
14:15
Akita Akita University Risk Assessment Method for Networked Systems using CVSS
Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) ISEC2009-34 SITE2009-26 ICSS2009-48
CVSS(Common Vulnerability Scoring System) is a common vulnerability scoring method. CVSS is composed of three metrics gr... [more] ISEC2009-34 SITE2009-26 ICSS2009-48
pp.189-194
 Results 1 - 11 of 11  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan