IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2024-01-25
16:40
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Strengthening Cybersecurity with Data Analytics -- A Web Tool for Secure Exploration of CVE Data --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] IA2023-68
pp.48-51
ISEC 2023-05-17
15:25
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities (from BRAIN 2023)
Chihiro Kado, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Shingo Okamura (NIT, Nara College) ISEC2023-11
Vulnerabilities are an important issue in Ethereum smart contracts. Although various vulnerability analysis tools have b... [more] ISEC2023-11
pp.62-64
ICSS, IPSJ-SPT 2017-03-14
11:45
Nagasaki University of Nagasaki Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities
Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU) ICSS2016-68
Android app developers sometimes copy code snippets posted on a Question and Answer Website and develop their apps. If a... [more] ICSS2016-68
pp.171-176
CPSY, IPSJ-EMB, IPSJ-SLDM, DC [detail] 2015-03-06
17:30
Kagoshima   A Trial Investigation System for Vulnerability on M2M Network
Kiyotaka Atsumi (ka-lab) CPSY2014-172 DC2014-98
Nowadays, M2M networks are growing up more and more, and many devices are active in M2M networks. Various devices are ex... [more] CPSY2014-172 DC2014-98
pp.61-64
KBSE 2013-09-13
15:00
Tokyo The University of Electro-Communications A classification method in identifying security patterns for a dependable Security Case -- From Security Patterns to D-Case --
Vaise Patu, Nada Olayan, Shuichiro Yamamoto (Nagoya Univ.) KBSE2013-52
Today's software systems are facing new and complicated challenges in confronting with security issues. There are lots o... [more] KBSE2013-52
pp.91-96
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan