Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2021-03-01 10:25 |
Online |
Online |
Construction of Vulnerability Evaluation System with Machine Learning Methods Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29 |
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] |
ICSS2020-29 pp.19-24 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
IN |
2021-01-18 15:50 |
Online |
Online |
[Invited Talk]
Risk Analysis Methods and Actual Conditions in Cyber Security Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49 |
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] |
IN2020-49 p.37 |
ICSS |
2020-11-26 15:25 |
Online |
Online |
Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23 |
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more] |
ICSS2020-23 pp.21-25 |
KBSE, SC |
2020-11-14 09:00 |
Online |
Online + Kikai-Shinko-Kaikan Bldg. (Primary: Online, Secondary: On-site) |
Risk prediction in software development project course with real clients Fumihiro Kumeno (NIT) KBSE2020-23 SC2020-27 |
We have conducted a software development project course with real clients; non-profit organizations of local community, ... [more] |
KBSE2020-23 SC2020-27 pp.41-46 |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |
SITE, IPSJ-EIP [detail] |
2020-06-04 10:55 |
Online |
Online |
Reconsideration of 'Risk' in information security/cybersecurity governance
-- Based on the discussion in Science, Technology and Society (STS) -- Takumi Kimura (NRI SecureTechnologies) SITE2020-2 |
As information security/cybersecurity has been increasing, so is the importance of (Information) Security Governance. Ho... [more] |
SITE2020-2 pp.7-12 |
SSS |
2020-03-17 14:10 |
Tokyo |
(Cancelled but technical report was issued) |
Theories and their practices for safety
-- Looking back on and foreseeing the past and coming half centuries -- Yoshinobu Sato (IFHQI) SSS2019-30 |
Theories and practices to prevent a recurrence of accident have been important in the past half century. Recently risk a... [more] |
SSS2019-30 pp.5-8 |
ET |
2020-03-07 13:50 |
Kagawa |
National Institute of Technology, Kagawa Collage (Cancelled but technical report was issued) |
Redefining Risk Assessment Based on Interpretation of Viewpoints and Researching Validity by Visualization System Kazuya Nitta, Naka Gotoda, Yusuke Kometani, Shigemi Ono, Rihito Yaegashi, Toshihiro Hayashi, Giro Imai, Koji Kida, Keizo Saisho (Kagawa Univ) ET2019-92 |
While information security threats become more sophisticated and complicated, an increasing number of organizations have... [more] |
ET2019-92 pp.93-98 |
ICSS, IPSJ-SPT |
2020-03-02 10:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Estimation method of information asset security attributes using design mode Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.) ICSS2019-69 |
In security evaluation such as risk analysis, analysis is performed based on the value of information assets in the syst... [more] |
ICSS2019-69 pp.7-12 |
EMD, R |
2020-02-14 13:35 |
Shizuoka |
|
Trend on standardization of Dependability
-- Outline of IEC TC 56 2016 Sydney international meeting and drafts from Japan -- Hiroyuki Goto (FDK), Yoshinobu Sato (The IHQI, Tokyo Healthcare Foundation), Fumiaki Harada (D-Tech Partners), Yoshiki Kinoshita (Kanagawa University) R2019-54 EMD2019-54 |
IEC/TC 56 (International Electrotechnical Commission/Technical Committee 56) plenary meeting was held in Shanghai, China... [more] |
R2019-54 EMD2019-54 pp.1-6 |
HCS |
2020-01-25 11:30 |
Oita |
Room407, J:COM HorutoHall OITA (Oita) |
An Estimation Method of Heat Stress Risk for Workers using Wearable Sensor Data and Information of Lifestyle Mami Saito, Takashi Sudo, Yasuhiro Kanishima (Toshiba) HCS2019-57 |
The heat index WBGT only using environmental information such as temperature and humidity, is used as a heat stress risk... [more] |
HCS2019-57 pp.17-22 |
CQ, CBE (Joint) |
2020-01-16 11:10 |
Tokyo |
NHK Science & Technology Research Laboratories |
Design and Implementation of an Application for Automatic Evacuation Guiding with Geographical Risk Information Takanori Hara, Masahiro Sasabe, Shoji Kasahara (NAIST) CQ2019-113 |
As the disaster response to large-scale disasters, a mobile-edge collaborative automatic evacuation guid- ing scheme has... [more] |
CQ2019-113 pp.35-40 |
SSS |
2019-12-17 14:10 |
Tokyo |
|
Proposal of a Risk Access Method of Steel Plant Control System using Remote Acccess Shuji Tsuchida (Nippon Steel) SSS2019-24 |
In plant control system, there is an increasing need for online operation analysis and maintenance using a remote access... [more] |
SSS2019-24 pp.9-10 |
SSS |
2019-12-17 14:45 |
Tokyo |
|
Practice for certification of safety devices highly developed
-- Introduction of procedure using IEC/TC72 standards -- Hiroyuki Tabuse (JIA), Kou Kawashima (OMC), Yoshinobu Sato (JC) SSS2019-25 |
Harmonization between international standards and JIS’s is essential for standardization under Agreement on Technical Ba... [more] |
SSS2019-25 pp.11-14 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 09:30 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Risk Evaluation of Block Diffusion Delaying Attacks in a Bitcoin Network Masanari Yamamoto, Masahiro Sasabe, Shoji Kasahara (NAIST) CQ2019-88 |
In the Bitcoin system,transactions and their collections, i.e., blocks, are distributed over a Peer-to-Peer (P2P) networ... [more] |
CQ2019-88 pp.1-6 |
ISEC, SITE, LOIS |
2019-11-02 14:20 |
Osaka |
Osaka Univ. |
Proposal of a Password Storage Method for Network Login
-- Using an External Storage Device for Screenshots -- Jun Tsuchiya, Yoshiaki Seki (Tokyo City Univ.) ISEC2019-82 SITE2019-76 LOIS2019-41 |
Password authentication is a typical memory authentication method. In order to maintain the strength of the password, us... [more] |
ISEC2019-82 SITE2019-76 LOIS2019-41 pp.127-132 |
SSS |
2019-09-24 14:10 |
Tokyo |
|
Evaluator ethical of the safety standard
-- Exploring of impartiality risk management -- Eihiro Hiranuma (SPC) SSS2019-19 |
This paper defines identification and the evaluator ethics of the company-regulations rule about use of the safety stand... [more] |
SSS2019-19 pp.9-12 |
SSS |
2019-08-27 14:10 |
Tokyo |
|
Detection of risk points at a tunnel construction site using the Safeguarding Supportive System
-- A case study -- Shoken Shimizu, Shigeo Umezaki, Rieko Hojo (JNIOSH) SSS2019-14 |
(To be available after the conference date) [more] |
SSS2019-14 pp.11-14 |
SSS |
2019-08-27 15:15 |
Tokyo |
|
An example of application of behavioral analysis for risk assessment Rieko Hojo, Shigeo Umezaki, Shoken Shimizu (joins) SSS2019-15 |
(To be available after the conference date) [more] |
SSS2019-15 pp.15-18 |