|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Strengthening Cybersecurity with Data Analytics
-- A Web Tool for Secure Exploration of CVE Data -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68 |
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] |
IA2023-68 pp.48-51 |
ISEC |
2023-05-17 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities (from BRAIN 2023) Chihiro Kado, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Shingo Okamura (NIT, Nara College) ISEC2023-11 |
Vulnerabilities are an important issue in Ethereum smart contracts. Although various vulnerability analysis tools have b... [more] |
ISEC2023-11 pp.62-64 |
ICSS, IPSJ-SPT |
2017-03-14 11:45 |
Nagasaki |
University of Nagasaki |
Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU) ICSS2016-68 |
Android app developers sometimes copy code snippets posted on a Question and Answer Website and develop their apps. If a... [more] |
ICSS2016-68 pp.171-176 |
CPSY, IPSJ-EMB, IPSJ-SLDM, DC [detail] |
2015-03-06 17:30 |
Kagoshima |
|
A Trial Investigation System for Vulnerability on M2M Network Kiyotaka Atsumi (ka-lab) CPSY2014-172 DC2014-98 |
Nowadays, M2M networks are growing up more and more, and many devices are active in M2M networks. Various devices are ex... [more] |
CPSY2014-172 DC2014-98 pp.61-64 |
KBSE |
2013-09-13 15:00 |
Tokyo |
The University of Electro-Communications |
A classification method in identifying security patterns for a dependable Security Case
-- From Security Patterns to D-Case -- Vaise Patu, Nada Olayan, Shuichiro Yamamoto (Nagoya Univ.) KBSE2013-52 |
Today's software systems are facing new and complicated challenges in confronting with security issues. There are lots o... [more] |
KBSE2013-52 pp.91-96 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|