IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 22  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ET 2024-03-03
14:35
Miyazaki Miyazaki University Development of Worker Digital Twin Generation and Visualization Function for Accident Prediction Training in Outbound Training
Kaito Minohara, Toshiki Muguruma, Yusuke Kometani, Naka Gotoda, Saerom Lee, Ryo Kanda (Kagawa Univ.), Shotaro Irie, Toru Harai (Shinnihon Co.) ET2023-72
In the construction industry, completing a construction project within a limited timeframe while complying with labor la... [more] ET2023-72
pp.121-128
ICSS, IPSJ-SPT 2021-03-01
11:55
Online Online Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] ICSS2020-32
pp.37-42
IN 2021-01-18
15:50
Online Online [Invited Talk] Risk Analysis Methods and Actual Conditions in Cyber Security
Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] IN2020-49
p.37
ICSS 2020-11-26
15:25
Online Online Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more]
ICSS2020-23
pp.21-25
SSS 2020-03-17
14:10
Tokyo
(Cancelled but technical report was issued)
Theories and their practices for safety -- Looking back on and foreseeing the past and coming half centuries --
Yoshinobu Sato (IFHQI) SSS2019-30
Theories and practices to prevent a recurrence of accident have been important in the past half century. Recently risk a... [more] SSS2019-30
pp.5-8
DC 2019-12-20
14:20
Wakayama   STAMP & FTA -- Proposal of New Safety Evaluation Method using STAMP & FTA --
Upvinder Singh, Takeshi Mizuma (UTokyo), Hideo Nakamura (NU), Yukiko Sugimoto (Kyosan) DC2019-80
Modern railway signaling systems are becoming more and more complex with the increased use of software. Conventional saf... [more] DC2019-80
pp.11-15
SSS 2019-12-17
14:10
Tokyo   Proposal of a Risk Access Method of Steel Plant Control System using Remote Acccess
Shuji Tsuchida (Nippon Steel) SSS2019-24
In plant control system, there is an increasing need for online operation analysis and maintenance using a remote access... [more] SSS2019-24
pp.9-10
ISEC, SITE, LOIS 2019-11-02
14:20
Osaka Osaka Univ. Proposal of a Password Storage Method for Network Login -- Using an External Storage Device for Screenshots --
Jun Tsuchiya, Yoshiaki Seki (Tokyo City Univ.) ISEC2019-82 SITE2019-76 LOIS2019-41
Password authentication is a typical memory authentication method. In order to maintain the strength of the password, us... [more] ISEC2019-82 SITE2019-76 LOIS2019-41
pp.127-132
NC, IBISML, IPSJ-MPS, IPSJ-BIO [detail] 2019-06-17
17:10
Okinawa Okinawa Institute of Science and Technology MCMC for Value-at-Risk estimation
Igor Zavialov, Kazushi Ikeda (NAIST) NC2019-11
Value-at-Risk models (VaR) are powerful tools for financial risk management and are widely used by regulating authoritie... [more] NC2019-11
pp.41-44
SSS 2018-12-18
14:25
Tokyo   Examination of safety work procedures based on the principle of safety confirmation
Yamato Miyazaki, Mizuho Nakamura (PTU) SSS2018-27
Among those who take job training, beginners who do not have adequate knowledge of mechanical functions or risk have a m... [more] SSS2018-27
pp.9-12
SSS 2018-08-14
13:00
Kyoto   Development of Risk Assessment Procedures for Small and Medium Size Enterprises
Takabumi Fukuda, Ryuichi Nunome, Hironoshin Asakawa, Toshiro Houshi (NUT) SSS2018-13
Risk assessment makes it possible to find hazards before the work and take protective measures. However, it is generall... [more] SSS2018-13
pp.1-4
SSS 2018-08-14
13:35
Kyoto   Development of simple risk assessment method for small companies -- Proposal of 5-step Type simple risk assessment method for roll machine --
Shigeo Umezaki, Shoken Shimizu, Kyoko Hamajima (JNIOSH) SSS2018-14
In order to prevent occupational accidents caused by machines, it is necessary to carry out appropriate risk assessment ... [more] SSS2018-14
pp.5-8
SSS 2017-08-22
13:35
Tokyo   Study of Simple Type Risk Assessment Method for Food Processing Machinery -- Proposal of Backwards Inference using Statistical Method by IMTOC Expression --
Shigeo Umezaki, Shoken Shimizu, Kyoko Hamajima (JNIOSH) SSS2017-14
In order to prevent occupational accidents caused by machines, it is necessary to carry out risk assessment of work at t... [more] SSS2017-14
pp.5-8
SSS 2014-06-26
14:20
Tokyo Kikai-Shinko-Kaikan Bldg. Popularization of ISO 11161 and the related issues -- A case study --
Yukihiro Imaeda, Tetsuya Kimura (Nagaoka Univ. of Tech.) SSS2014-9
Integrated Manufacturing System (IMS) occupies an important position in the manufacturing industry along with the facili... [more] SSS2014-9
pp.9-12
LOIS 2014-03-08
14:25
Okinawa   Risk Assessment of Information Leak in Twitter Use of Employee -- Tweet Experience and Consciousness about Business --
Yoshiaki Seki, Naoko Chiba (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-75
Companies are apprehensive about the information leak according to the handiness of Twitter. In this paper, we conduct W... [more] LOIS2013-75
pp.125-130
LOIS 2014-03-08
14:50
Okinawa   Risk Assessment of Information Leak in Twitter Use of Employee -- The Actual Situation and Effectiveness of Company's Measures for Employee Tweets --
Naoko Chiba, Yoshiaki Seki (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-76
The cases, such as the employees posting to Twitter about customer information of the celebrity and the unpublished info... [more] LOIS2013-76
pp.131-136
ICSS 2010-11-05
14:30
Hiroshima Hiroshima City University Network Topology Analysys for Web Malware Risk Assesment
Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba) ICSS2010-50
Risk Condition Reference Model indicated by National Information Security Center (NISC) simulated dynamics of threat beh... [more] ICSS2010-50
pp.35-40
SSS 2009-08-24
13:00
Osaka   A study for suited risk-assessmennt method of labor accident for the small and medium enterprise
Motoya Takagi (jniosh) SSS2009-12
The objective of this research is to advance risk assessment and develop practicality of such assessment in order to red... [more] SSS2009-12
pp.1-4
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
14:15
Akita Akita University Risk Assessment Method for Networked Systems using CVSS
Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) ISEC2009-34 SITE2009-26 ICSS2009-48
CVSS(Common Vulnerability Scoring System) is a common vulnerability scoring method. CVSS is composed of three metrics gr... [more] ISEC2009-34 SITE2009-26 ICSS2009-48
pp.189-194
SITE, IPSJ-EIP 2009-06-05
17:00
Tokyo   Considerations about Categorize under the Internal Security Problems
Soichiro Morishita (The Univ. of Tokyo), Taketoshi Mishima (Saitama Univ.) SITE2009-4
Authors have defined the problem of damages of computer resources caused by the user who has the use authority as an int... [more] SITE2009-4
pp.63-66
 Results 1 - 20 of 22  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan