IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 207 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2021-03-01
10:25
Online Online Construction of Vulnerability Evaluation System with Machine Learning Methods
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] ICSS2020-29
pp.19-24
ICSS, IPSJ-SPT 2021-03-01
11:55
Online Online Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] ICSS2020-32
pp.37-42
IN 2021-01-18
15:50
Online Online [Invited Talk] Risk Analysis Methods and Actual Conditions in Cyber Security
Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] IN2020-49
p.37
ICSS 2020-11-26
15:25
Online Online Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more]
ICSS2020-23
pp.21-25
KBSE, SC 2020-11-14
09:00
Online Online + Kikai-Shinko-Kaikan Bldg.
(Primary: Online, Secondary: On-site)
Risk prediction in software development project course with real clients
Fumihiro Kumeno (NIT) KBSE2020-23 SC2020-27
We have conducted a software development project course with real clients; non-profit organizations of local community, ... [more] KBSE2020-23 SC2020-27
pp.41-46
ICD, HWS [detail] 2020-10-26
13:50
Online Online Security Threats and Preventions for Photonics Computing Model
Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] HWS2020-33 ICD2020-22
pp.48-53
SITE, IPSJ-EIP [detail] 2020-06-04
10:55
Online Online Reconsideration of 'Risk' in information security/cybersecurity governance -- Based on the discussion in Science, Technology and Society (STS) --
Takumi Kimura (NRI SecureTechnologies) SITE2020-2
As information security/cybersecurity has been increasing, so is the importance of (Information) Security Governance. Ho... [more] SITE2020-2
pp.7-12
SSS 2020-03-17
14:10
Tokyo
(Cancelled but technical report was issued)
Theories and their practices for safety -- Looking back on and foreseeing the past and coming half centuries --
Yoshinobu Sato (IFHQI) SSS2019-30
Theories and practices to prevent a recurrence of accident have been important in the past half century. Recently risk a... [more] SSS2019-30
pp.5-8
ET 2020-03-07
13:50
Kagawa National Institute of Technology, Kagawa Collage
(Cancelled but technical report was issued)
Redefining Risk Assessment Based on Interpretation of Viewpoints and Researching Validity by Visualization System
Kazuya Nitta, Naka Gotoda, Yusuke Kometani, Shigemi Ono, Rihito Yaegashi, Toshihiro Hayashi, Giro Imai, Koji Kida, Keizo Saisho (Kagawa Univ) ET2019-92
While information security threats become more sophisticated and complicated, an increasing number of organizations have... [more] ET2019-92
pp.93-98
ICSS, IPSJ-SPT 2020-03-02
10:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Estimation method of information asset security attributes using design mode
Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.) ICSS2019-69
In security evaluation such as risk analysis, analysis is performed based on the value of information assets in the syst... [more] ICSS2019-69
pp.7-12
EMD, R 2020-02-14
13:35
Shizuoka   Trend on standardization of Dependability -- Outline of IEC TC 56 2016 Sydney international meeting and drafts from Japan --
Hiroyuki Goto (FDK), Yoshinobu Sato (The IHQI, Tokyo Healthcare Foundation), Fumiaki Harada (D-Tech Partners), Yoshiki Kinoshita (Kanagawa University) R2019-54 EMD2019-54
IEC/TC 56 (International Electrotechnical Commission/Technical Committee 56) plenary meeting was held in Shanghai, China... [more] R2019-54 EMD2019-54
pp.1-6
HCS 2020-01-25
11:30
Oita Room407, J:COM HorutoHall OITA (Oita) An Estimation Method of Heat Stress Risk for Workers using Wearable Sensor Data and Information of Lifestyle
Mami Saito, Takashi Sudo, Yasuhiro Kanishima (Toshiba) HCS2019-57
The heat index WBGT only using environmental information such as temperature and humidity, is used as a heat stress risk... [more] HCS2019-57
pp.17-22
CQ, CBE
(Joint)
2020-01-16
11:10
Tokyo NHK Science & Technology Research Laboratories Design and Implementation of an Application for Automatic Evacuation Guiding with Geographical Risk Information
Takanori Hara, Masahiro Sasabe, Shoji Kasahara (NAIST) CQ2019-113
As the disaster response to large-scale disasters, a mobile-edge collaborative automatic evacuation guid- ing scheme has... [more] CQ2019-113
pp.35-40
SSS 2019-12-17
14:10
Tokyo   Proposal of a Risk Access Method of Steel Plant Control System using Remote Acccess
Shuji Tsuchida (Nippon Steel) SSS2019-24
In plant control system, there is an increasing need for online operation analysis and maintenance using a remote access... [more] SSS2019-24
pp.9-10
SSS 2019-12-17
14:45
Tokyo   Practice for certification of safety devices highly developed -- Introduction of procedure using IEC/TC72 standards --
Hiroyuki Tabuse (JIA), Kou Kawashima (OMC), Yoshinobu Sato (JC) SSS2019-25
Harmonization between international standards and JIS’s is essential for standardization under Agreement on Technical Ba... [more] SSS2019-25
pp.11-14
NS, ICM, CQ, NV
(Joint)
2019-11-21
09:30
Hyogo Rokkodai 2nd Campus, Kobe Univ. Risk Evaluation of Block Diffusion Delaying Attacks in a Bitcoin Network
Masanari Yamamoto, Masahiro Sasabe, Shoji Kasahara (NAIST) CQ2019-88
In the Bitcoin system,transactions and their collections, i.e., blocks, are distributed over a Peer-to-Peer (P2P) networ... [more] CQ2019-88
pp.1-6
ISEC, SITE, LOIS 2019-11-02
14:20
Osaka Osaka Univ. Proposal of a Password Storage Method for Network Login -- Using an External Storage Device for Screenshots --
Jun Tsuchiya, Yoshiaki Seki (Tokyo City Univ.) ISEC2019-82 SITE2019-76 LOIS2019-41
Password authentication is a typical memory authentication method. In order to maintain the strength of the password, us... [more] ISEC2019-82 SITE2019-76 LOIS2019-41
pp.127-132
SSS 2019-09-24
14:10
Tokyo   Evaluator ethical of the safety standard -- Exploring of impartiality risk management --
Eihiro Hiranuma (SPC) SSS2019-19
This paper defines identification and the evaluator ethics of the company-regulations rule about use of the safety stand... [more] SSS2019-19
pp.9-12
SSS 2019-08-27
14:10
Tokyo   Detection of risk points at a tunnel construction site using the Safeguarding Supportive System -- A case study --
Shoken Shimizu, Shigeo Umezaki, Rieko Hojo (JNIOSH) SSS2019-14
(To be available after the conference date) [more] SSS2019-14
pp.11-14
SSS 2019-08-27
15:15
Tokyo   An example of application of behavioral analysis for risk assessment
Rieko Hojo, Shigeo Umezaki, Shoken Shimizu (joins) SSS2019-15
(To be available after the conference date) [more] SSS2019-15
pp.15-18
 Results 41 - 60 of 207 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan