IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Router Security Assessment Using CAPEC Vulnerability Assessment Criteria
Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] IA2023-62
pp.30-36
HWS, ICD [detail] 2021-10-19
15:00
Online Online A Survey on Security Requirements in System-on-Chip(SoC)
Yasuyuki Kawanishi, Hirotaka Yoshida (AIST) HWS2021-49 ICD2021-23
In the EU, a cybersecurity certification scheme for IoT products based on the Common Criteria is being developed. At tha... [more] HWS2021-49 ICD2021-23
pp.43-48
COMP 2016-03-14
13:30
Fukuoka   Longest Common Subsequence Problem for Numerical Sequences by using Order-Isomorphic-Substrings
Masatoshi Kurihara, Kazuyuki Narisawa, Ayumi Shinohara (Tohoku Univ.) COMP2015-38
The order-isomorphism can be used as a criteria for the similarity of numerical sequences. The order-preserving matching... [more] COMP2015-38
pp.11-20
KBSE 2014-01-28
15:00
Tokyo Kikai-Shinko-Kaikan Bldg An Evaluation on the Modifiability of Model Driven Security Requirements Analysis Method based on Common Criteria
Atsushi Noro, Saeko Matsuura (Shibaura Inst. of Tech.) KBSE2013-78
Requirements analysis is complicated because in requirements analysis of the system is a security request as well as a f... [more] KBSE2013-78
pp.77-82
SS 2013-05-09
14:40
Kagawa Kagawa University (Saiwaimachi) Detection of Security Threats Using Patterns of Sequence Diagrams
Tatsuya Abe, Shinpei Hayashi, Motoshi Saeki (Tokyo Inst. of Tech.) SS2013-1
Detecting security threats of information system in design phase helps to develop secure systems. However, the more thre... [more] SS2013-1
pp.1-6
KBSE, SS 2012-07-27
13:30
Hokkaido Future University Hakodate Integration Method of UML Requirement Analytical Model and Security Requirement Analysis based on Common Criteria
Atsushi Noro (Shibaura Inst. of Tech.), Shinpei Ogata (Shinshu Univ.), Saeko Matsuura (Shibaura Inst. of Tech.) SS2012-13 KBSE2012-15
Analyzing security requirements for a system at an early stage of development is effective in developing a system with l... [more] SS2012-13 KBSE2012-15
pp.19-24
SITE 2010-10-15
11:15
Tokyo Nihon Univ. (Surugadai) Improving traceability through graphical representation of security requirements
Mariko Fukawa, Akira Aiba (SIT) SITE2010-37
ISO/IEC15408 (CC) is used as a criterion to evaluate security. However it has difficulty to identify effect of modificat... [more] SITE2010-37
pp.19-24
KBSE, SS 2010-05-27
12:00
Kyoto Doshisha University, Imadegawa Campus Goal-oriented modeling method for security requirements
Masue Shiba, Naokazu Sasaki (Toshiba Solutions Corp.), Kenji Taguchi (AIST), Nobukazu Yoshioka (NII) SS2010-3 KBSE2010-3
In the upper process of the system development, it is important to set the problem of security, and to define the securi... [more] SS2010-3 KBSE2010-3
pp.15-20
KBSE 2010-03-05
10:30
Fukuoka Kyushu Institute of Technology (kyutech plaza) Goal-Oriented Security Requirements Analysis Using Common Criteria as Domain Ontology
Motoshi Saeki, Shinpei Hayashi (Tokyo Inst. of Tech.), Haruhiko Kaiya (Shinshu Univ.) KBSE2009-65
This paper proposes the usage of security targets, which are documents compliant to Common Criteria (ISO/IEC 15408), as ... [more] KBSE2009-65
pp.37-42
CQ 2006-07-13
13:00
Hokkaido Future University-Hakodate A Study on Automatic Classification of Worm Flows Based on Common Pieces of Flow Payloads
Hiroshi Tsunoda, Yuji Waizumi, Zheng Sekibe, Yoshiaki Nemoto (Tohoku Univ.) CQ2006-20
Security management is a core issue in the current Internet, and
illegal accesses is a serious problem in security mana... [more]
CQ2006-20
pp.17-22
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan