|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Router Security Assessment Using CAPEC Vulnerability Assessment Criteria Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62 |
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] |
IA2023-62 pp.30-36 |
ICSS |
2023-11-17 14:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Proposal for a Test Tool Enabling Programmatic Description of Test Scenarios in OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) ICSS2023-66 |
Single sign-on (SSO) is a mechanism that allows users to log in to multiple web services with single-user authentication... [more] |
ICSS2023-66 pp.108-113 |
ICSS, IPSJ-SPT |
2018-03-08 12:00 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Analyzing web application vulnerability reports by machine learning Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com) ICSS2017-74 |
Web application vulnerability testing is important for preventing cyberattacks. However, it is difficult to test all URL... [more] |
ICSS2017-74 pp.139-144 |
ISEC, LOIS |
2013-11-29 13:30 |
Miyagi |
Tohoku Univ. |
The proposal on a vulnerability evaluation method according to information system environment Naoki Kamegai, Naoshi Sato (IISEC) ISEC2013-69 LOIS2013-35 |
It is essential to perform a vulnerability assessment to avoid for the security incident of own system because a lot of ... [more] |
ISEC2013-69 LOIS2013-35 pp.65-70 |
DC |
2010-10-14 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Evaluation of Automated Testing Tools for Web Application Vulnerability Detection Ryosuke Nakai, Tatsuhiro Tsuchiya, Tohru Kikuno (Osaka Univ) DC2010-21 |
This paper reports an evaluation of some automatic testing tools for web
applications. These testing tools are intende... [more] |
DC2010-21 pp.19-23 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|