Ryôichi Sasaki
According to our database1,
Ryôichi Sasaki
authored at least 77 papers
between 1990 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Enhancement of a Company-Wide Information Security Management System Through Incident Learning.
SN Comput. Sci., May, 2023
Reconsideration of Risk Communication and Risk Assessment Support Methods for Security.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
2020
Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Trial Development of a Cyber Risk Visualization System with Function of k-Anonymity and Compatibility with Other Organizations.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the Advances in Networked-Based Information Systems, 2020
2018
Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018
2017
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Proceedings of the 8th International Conference on the Network of the Future, 2017
2016
Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Chance-Constrained Programming Method of IT Risk Countermeasures for Social Consensus Making.
IEEE Trans. Syst. Man Cybern. Syst., 2015
Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network.
Proceedings of the Fourth International Conference on Cyber Security, 2015
Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation.
Proceedings of the Fourth International Conference on Cyber Security, 2015
Proceedings of the Fourth International Conference on Cyber Security, 2015
Proceedings of the Fourth International Conference on Cyber Security, 2015
Proceedings of the Fourth International Conference on Cyber Security, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proposal for Combinatorial Optimization Technology in Consideration of the Dynamic Characteristic of IT Risks.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proposal and Evaluation of Methods Using the Quantification Theory and Machine Learning for Detecting C&C Server Used in a Botnet.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2014
Proceedings of the Human-Computer Interaction. Theories, Methods, and Tools, 2014
Proposal and Evaluation of Safe and Efficient Log Signature Scheme for the Preservation of Evidence.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
NII Shonan Meet. Rep., 2013
Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Chance-Constrained Programming Method by Constraints Aggregation for Social Consensus Making on IT Risk Countermeasure.
Proceedings of the IEEE International Conference on Systems, 2013
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android Phone.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
2012
Considerations on Risk Communication for IT Systems and Development of Support Systems.
J. Inf. Process., 2012
Approximation method for chance-constrained programming of social consensus formation concerning IT risk countermeasure.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012
Proposal and Evaluation of the Digital Certificate System with Sumi-coating Module for Privacy Protection.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2011
Wirel. Commun. Mob. Comput., 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
A Proposed Web Access Control System Request Policy Framework for Cooperation of DNS and a Web Browser.
Proceedings of the Sixth International Conference on Availability, 2011
Development and Trial Application of Prototype Program for "Social-MRC": Social Consensus Formation Support System Concerning IT Risk Countermeasures.
Proceedings of the Sixth International Conference on Availability, 2011
2010
J. Digit. Forensics Secur. Law, 2010
Social consensus making support system by qualitative and quantitative hybrid simulation.
Proceedings of the IEEE International Conference on Systems, 2010
A consensus support system for deciding a combination of risk-reducing plans under uncertain parameters.
Proceedings of the IEEE International Conference on Systems, 2010
A Security Measure Selection Scheme with Consideration of Potential Lawsuits.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Advances in Digital Forensics V, 2009
Proceedings of the Software Services for e-Business and e-Society, 2009
2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the 14th Eurographics Symposium on Virtual Environments, 2008
2007
Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Evaluation of the Participant-Support Method for Information Acquisition in the "Multiplex Risk Communicator".
Proceedings of the Human Interface and the Management of Information. Interacting in Information Environments, 2007
Proposal of the e-Discovery System for Sanitizing Disclosure Information and for Securing Evidence.
Proceedings of the Future Generation Communication and Networking, 2007
2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of 11th IEEE International Conference on Emerging Technologies and Factory Automation, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Development and Evaluation of a System for Checking for Improper Sending of Personal Information in Encrypted E-Mail.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005
2002
Proceedings of the Security Protocols, 2002
Proceedings of the Security Protocols, 2002
2001
Proceedings of the Security Protocols, 2001
2000
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis.
Proceedings of the Security Protocols, 2000
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000
1999
Proceedings of the Security Protocols, 1999
1998
Proceedings of the Security Protocols, 1998
Proceedings of the Security Protocols, 1998
1991
Development and Performance Evaluation of Point to Multipoint Communication Control Scheme Via Satellite.
Perform. Evaluation, 1991
1990