|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Router Security Assessment Using CAPEC Vulnerability Assessment Criteria Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62 |
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] |
IA2023-62 pp.30-36 |
IA |
2023-01-25 15:25 |
Osaka |
Osaka Umeda Campus, Kwansei Gakuin University (Osaka) (Primary: On-site, Secondary: Online) |
Cybersecurity Analysis of Internet Banking in Developing and Developed countries, a case study of Tanzania and Japan Ndalama Festus Edward, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2022-72 |
Over the last few years, internet banking has become the primary way of accessing banking services for many bank custome... [more] |
IA2022-72 pp.28-35 |
SC |
2019-06-01 10:30 |
Ibaraki |
National Institute for Materials Science |
An Introduction of Security Case Studies for Service Robots and IoT Devices Jiro Yamazaki, Hidenori Tsuiji, Fumiaki Yamasaki (NOS) SC2019-8 |
In the past years, robots worked in very restricted area such as industrial factory for a certain purposes and
also iso... [more] |
SC2019-8 pp.45-50 |
ICSS |
2017-11-20 14:15 |
Oita |
Beppu International Convention Center |
[Invited Talk]
Case Study and Future Perspective on Security Assessment of Connected Car Masaki Kamizono (PwC) ICSS2017-38 |
Various cyber security threats and vulnerabilities are reported in accordance with the remarkable rise of the connected ... [more] |
ICSS2017-38 pp.1-4 |
LOIS |
2016-03-04 11:20 |
Okinawa |
Central Community Center, Miyakojima-City |
A study on data protection requirements for an authentication system using personal data Miho Ikeda, Kenichiro Muto, Hideki Kawabe, Fumiaki Kudo, Takahiro Yamamoto (NTT) LOIS2015-87 |
We have been researching new authentication which identifies users by analyzing personal characteristics of human behavi... [more] |
LOIS2015-87 pp.139-144 |
KBSE |
2011-09-21 09:30 |
Overseas |
Ocean Grand Hotel Jeju |
Development of a Software Security Learning Environment Atsuo Hazeyama (TGU), Hiroto Shimizu (IIS) KBSE2011-24 |
Importance for software security technologies has been recognized according to increase of services on the internet. It ... [more] |
KBSE2011-24 pp.1-6 |
SITE |
2009-10-07 13:50 |
Tokyo |
IPA |
Comprehensive study of the storage cloud utilization as off-site storage for EMR Eizen Kimura (Ehime Univ.) SITE2009-38 |
Recent development of cloud technology enables us to consider the storage cloud as affordable off-site storage. But stor... [more] |
SITE2009-38 pp.35-40 |
IA, SITE |
2009-03-06 10:40 |
Kumamoto |
|
A Survey on Computer Ethics Education in Foreign Countries
-- For Development of Teaching Materials by International Collaboration -- Takahiro Tagawa (Kyushu Univ.), Izumi Fuse, Shigeto Okabe (Hokkaido Univ.), Takahiro Sumiya, Atsushi Nakamura (Hiroshima Univ.), Takashi Yamanoue (Kagoshima Univ.), Takeo Tatsumi (Tokyo Univ. of Agr. & Tech.), Michio Nakanishi (Osaka Inst. of Tech.), Shozo Fukada (Ehime Univ.), Ikuya Murata (Hokkaido Univ. of Edu.), Tetsutaro Uehara (Kyoto Univ.), Tsuneo Yamada (National Institute of Multimedia Education) SITE2008-91 IA2008-114 |
The utilization of information technology and the many services using internet have widely spread across the border, an... [more] |
SITE2008-91 IA2008-114 pp.277-281 |
CS |
2008-01-28 11:35 |
Kagoshima |
Amami-Oshima Island |
Development of a content tracking system based on content profile Naoki Matsuoka, Tomohiro Ishihara, Yoshitoshi Kurose, Hiroshi Kondou, Ryo Takajitsuko (FUJITSU) CS2007-59 |
The Internet has evolved rapidly in conjunction with the spread of broadband access lines, and become an important socia... [more] |
CS2007-59 pp.25-30 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|