Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ET |
2024-03-03 14:35 |
Miyazaki |
Miyazaki University |
Development of Worker Digital Twin Generation and Visualization Function for Accident Prediction Training in Outbound Training Kaito Minohara, Toshiki Muguruma, Yusuke Kometani, Naka Gotoda, Saerom Lee, Ryo Kanda (Kagawa Univ.), Shotaro Irie, Toru Harai (Shinnihon Co.) ET2023-72 |
In the construction industry, completing a construction project within a limited timeframe while complying with labor la... [more] |
ET2023-72 pp.121-128 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
IN |
2021-01-18 15:50 |
Online |
Online |
[Invited Talk]
Risk Analysis Methods and Actual Conditions in Cyber Security Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49 |
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] |
IN2020-49 p.37 |
ICSS |
2020-11-26 15:25 |
Online |
Online |
Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23 |
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more] |
ICSS2020-23 pp.21-25 |
SSS |
2020-03-17 14:10 |
Tokyo |
(Cancelled but technical report was issued) |
Theories and their practices for safety
-- Looking back on and foreseeing the past and coming half centuries -- Yoshinobu Sato (IFHQI) SSS2019-30 |
Theories and practices to prevent a recurrence of accident have been important in the past half century. Recently risk a... [more] |
SSS2019-30 pp.5-8 |
DC |
2019-12-20 14:20 |
Wakayama |
|
STAMP & FTA
-- Proposal of New Safety Evaluation Method using STAMP & FTA -- Upvinder Singh, Takeshi Mizuma (UTokyo), Hideo Nakamura (NU), Yukiko Sugimoto (Kyosan) DC2019-80 |
Modern railway signaling systems are becoming more and more complex with the increased use of software. Conventional saf... [more] |
DC2019-80 pp.11-15 |
SSS |
2019-12-17 14:10 |
Tokyo |
|
Proposal of a Risk Access Method of Steel Plant Control System using Remote Acccess Shuji Tsuchida (Nippon Steel) SSS2019-24 |
In plant control system, there is an increasing need for online operation analysis and maintenance using a remote access... [more] |
SSS2019-24 pp.9-10 |
ISEC, SITE, LOIS |
2019-11-02 14:20 |
Osaka |
Osaka Univ. |
Proposal of a Password Storage Method for Network Login
-- Using an External Storage Device for Screenshots -- Jun Tsuchiya, Yoshiaki Seki (Tokyo City Univ.) ISEC2019-82 SITE2019-76 LOIS2019-41 |
Password authentication is a typical memory authentication method. In order to maintain the strength of the password, us... [more] |
ISEC2019-82 SITE2019-76 LOIS2019-41 pp.127-132 |
NC, IBISML, IPSJ-MPS, IPSJ-BIO [detail] |
2019-06-17 17:10 |
Okinawa |
Okinawa Institute of Science and Technology |
MCMC for Value-at-Risk estimation Igor Zavialov, Kazushi Ikeda (NAIST) NC2019-11 |
Value-at-Risk models (VaR) are powerful tools for financial risk management and are widely used by regulating authoritie... [more] |
NC2019-11 pp.41-44 |
SSS |
2018-12-18 14:25 |
Tokyo |
|
Examination of safety work procedures based on the principle of safety confirmation Yamato Miyazaki, Mizuho Nakamura (PTU) SSS2018-27 |
Among those who take job training, beginners who do not have adequate knowledge of mechanical functions or risk have a m... [more] |
SSS2018-27 pp.9-12 |
SSS |
2018-08-14 13:00 |
Kyoto |
|
Development of Risk Assessment Procedures for Small and Medium Size Enterprises Takabumi Fukuda, Ryuichi Nunome, Hironoshin Asakawa, Toshiro Houshi (NUT) SSS2018-13 |
Risk assessment makes it possible to find hazards before the work and take protective measures. However, it is generall... [more] |
SSS2018-13 pp.1-4 |
SSS |
2018-08-14 13:35 |
Kyoto |
|
Development of simple risk assessment method for small companies
-- Proposal of 5-step Type simple risk assessment method for roll machine -- Shigeo Umezaki, Shoken Shimizu, Kyoko Hamajima (JNIOSH) SSS2018-14 |
In order to prevent occupational accidents caused by machines, it is necessary to carry out appropriate risk assessment ... [more] |
SSS2018-14 pp.5-8 |
SSS |
2017-08-22 13:35 |
Tokyo |
|
Study of Simple Type Risk Assessment Method for Food Processing Machinery
-- Proposal of Backwards Inference using Statistical Method by IMTOC Expression -- Shigeo Umezaki, Shoken Shimizu, Kyoko Hamajima (JNIOSH) SSS2017-14 |
In order to prevent occupational accidents caused by machines, it is necessary to carry out risk assessment of work at t... [more] |
SSS2017-14 pp.5-8 |
SSS |
2014-06-26 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Popularization of ISO 11161 and the related issues
-- A case study -- Yukihiro Imaeda, Tetsuya Kimura (Nagaoka Univ. of Tech.) SSS2014-9 |
Integrated Manufacturing System (IMS) occupies an important position in the manufacturing industry along with the facili... [more] |
SSS2014-9 pp.9-12 |
LOIS |
2014-03-08 14:25 |
Okinawa |
|
Risk Assessment of Information Leak in Twitter Use of Employee
-- Tweet Experience and Consciousness about Business -- Yoshiaki Seki, Naoko Chiba (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-75 |
Companies are apprehensive about the information leak according to the handiness of Twitter. In this paper, we conduct W... [more] |
LOIS2013-75 pp.125-130 |
LOIS |
2014-03-08 14:50 |
Okinawa |
|
Risk Assessment of Information Leak in Twitter Use of Employee
-- The Actual Situation and Effectiveness of Company's Measures for Employee Tweets -- Naoko Chiba, Yoshiaki Seki (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-76 |
The cases, such as the employees posting to Twitter about customer information of the celebrity and the unpublished info... [more] |
LOIS2013-76 pp.131-136 |
ICSS |
2010-11-05 14:30 |
Hiroshima |
Hiroshima City University |
Network Topology Analysys for Web Malware Risk Assesment Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba) ICSS2010-50 |
Risk Condition Reference Model indicated by National Information Security Center (NISC) simulated dynamics of threat beh... [more] |
ICSS2010-50 pp.35-40 |
SSS |
2009-08-24 13:00 |
Osaka |
|
A study for suited risk-assessmennt method of labor accident for the small and medium enterprise Motoya Takagi (jniosh) SSS2009-12 |
The objective of this research is to advance risk assessment and develop practicality of such assessment in order to red... [more] |
SSS2009-12 pp.1-4 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 14:15 |
Akita |
Akita University |
Risk Assessment Method for Networked Systems using CVSS Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) ISEC2009-34 SITE2009-26 ICSS2009-48 |
CVSS(Common Vulnerability Scoring System) is a common vulnerability scoring method. CVSS is composed of three metrics gr... [more] |
ISEC2009-34 SITE2009-26 ICSS2009-48 pp.189-194 |
SITE, IPSJ-EIP |
2009-06-05 17:00 |
Tokyo |
|
Considerations about Categorize under the Internal Security Problems Soichiro Morishita (The Univ. of Tokyo), Taketoshi Mishima (Saitama Univ.) SITE2009-4 |
Authors have defined the problem of damages of computer resources caused by the user who has the use authority as an int... [more] |
SITE2009-4 pp.63-66 |