|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ET |
2021-03-06 14:05 |
Online |
Online |
Development of an Assessment Partitioning Module to be Incorporated into an Incident Response Training System for the KADAI-CSIRT Shunsuke Shinohara, Naka Gotoda, Masanori Ono, Shigemi Ono, Yusuke Kometani, Koji Kida, Rihito Yaegashi, Toshihiro Hayashi, Yoshiro Imai, Keizo Saisho (Kagawa Univ) ET2020-70 |
When responding to incidents,CSIRT of university is contacted by management,system administrators,and users,and take act... [more] |
ET2020-70 pp.103-108 |
ET |
2020-03-07 13:50 |
Kagawa |
National Institute of Technology, Kagawa Collage (Cancelled but technical report was issued) |
Redefining Risk Assessment Based on Interpretation of Viewpoints and Researching Validity by Visualization System Kazuya Nitta, Naka Gotoda, Yusuke Kometani, Shigemi Ono, Rihito Yaegashi, Toshihiro Hayashi, Giro Imai, Koji Kida, Keizo Saisho (Kagawa Univ) ET2019-92 |
While information security threats become more sophisticated and complicated, an increasing number of organizations have... [more] |
ET2019-92 pp.93-98 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 09:55 |
Kochi |
Kochi University of Technology |
Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information Motoki Kusume, Koji Kida, Keizo Saisho (Kagawa Univ.) ISEC2019-12 SITE2019-6 BioX2019-4 HWS2019-7 ICSS2019-10 EMM2019-15 |
The damage caused by zero day attack performed between the time vulnerabilities are found in the software and the time t... [more] |
ISEC2019-12 SITE2019-6 BioX2019-4 HWS2019-7 ICSS2019-10 EMM2019-15 pp.1-6 |
ET |
2018-03-03 16:05 |
Kochi |
Kochi University of Technology (Eikokuji Campus) |
Development and Evaluation of a System for Support Visualization and Transmission for Recognition of Risk Assessment Process for the Incident Response Yuji Yamasaki, Naka Gotoda, Yusuke Kometani, Toshihiro Hayashi, Rihito Yaegashi, Keizo Saisho (Kagawa Univ.) ET2017-103 |
In recent years, the expansion of damage caused by information security incidents has become a problem, and appropriate ... [more] |
ET2017-103 pp.83-88 |
ET |
2017-11-11 15:20 |
Tokyo |
Sophia Univ. |
Design of Security Incident Response Training System for Improving Risk Assessment Ability Yuji Yamasaki, Naka Gotoda, Toshihiro Hayashi, Rihito Yaegashi, Keizo Saisho (Kagawa Univ.) ET2017-62 |
The occurrence of information security incidents where terminals maliciously infect malware is a problem at universities... [more] |
ET2017-62 pp.53-56 |
IN |
2014-06-27 13:50 |
Kagawa |
Kagawa Univ. |
Load Observation of Cache Servers and Load Distribution of Web System Suitable for Cloud Akihiko Horiuchi, Keizo Saisho (Kagawa Univ.) IN2014-29 |
We have been developing a web system suitable for Cloud that adjusting the number of virtual cache servers according to ... [more] |
IN2014-29 pp.79-84 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|