Keyword : vulnerability


Search-Based Concolic Execution for SW Vulnerability Discovery
Rustamov FAYOZBEK Minjun CHOI Joobeom YUN 
Publication:   
Publication Date: 2018/10/01
Vol. E101-D  No. 10 ; pp. 2526-2529
Type of Manuscript:  LETTER
Category: Data Engineering, Web Information Systems
Keyword: 
search-basedconcolic executionvulnerability
 Summary | Full Text:PDF(621KB)

The Structural Vulnerability Analysis of Power Grids Based on Second-Order Centrality
Zhong-Jian KANG Yi-Jia ZHANG Xin-Ling GUO Zhe-Ming LU 
Publication:   
Publication Date: 2017/07/01
Vol. E100-A  No. 7 ; pp. 1567-1570
Type of Manuscript:  LETTER
Category: Systems and Control
Keyword: 
power gridscomplex networksvulnerabilitycentralitysecond-order centrality
 Summary | Full Text:PDF(273.2KB)

Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems
Seondong HEO Soojin LEE Bumsoon JANG Hyunsoo YOON 
Publication:   
Publication Date: 2017/01/01
Vol. E100-D  No. 1 ; pp. 118-129
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
intrusion-tolerant systemdiversityvirtual machinevulnerabilitysoftware
 Summary | Full Text:PDF(723.8KB)

The Structural Vulnerability Analysis of Power Grids Based on Overall Information Centrality
Yi-Jia ZHANG Zhong-Jian KANG Xin-Ling GUO Zhe-Ming LU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/03/01
Vol. E99-D  No. 3 ; pp. 769-772
Type of Manuscript:  LETTER
Category: Artificial Intelligence, Data Mining
Keyword: 
power gridscomplex networksvulnerabilitycentralityoverall information
 Summary | Full Text:PDF(265.3KB)

Falsification Attacks against WPA-TKIP in a Realistic Environment
Yosuke TODO Yuki OZAWA Toshihiro OHIGASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/02/01
Vol. E95-D  No. 2 ; pp. 588-595
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
wireless LAN networkWPA-TKIPfalsification attackQoSvulnerability
 Summary | Full Text:PDF(642.8KB)

A Dynamic Continuous Signature Monitoring Technique for Reliable Microprocessors
Makoto SUGIHARA 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2011/04/01
Vol. E94-C  No. 4 ; pp. 477-486
Type of Manuscript:  Special Section PAPER (Special Section on Circuits and Design Techniques for Advanced Large Scale Integration)
Category: 
Keyword: 
soft errorNBTISEUSETcontrol signal errorcontinuous signature monitoringreliabilityvulnerabilitymicroprocessor
 Summary | Full Text:PDF(485.3KB)

Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
Takeshi YAGI Naoto TANIMOTO Takeo HARIU Mitsutaka ITOH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/05/01
Vol. E93-B  No. 5 ; pp. 1122-1130
Type of Manuscript:  Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet)
Category: 
Keyword: 
securitywebvulnerabilityapplicationmalware
 Summary | Full Text:PDF(877.3KB)

Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks
Daigo MURAMATSU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/03/01
Vol. E93-D  No. 3 ; pp. 448-457
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy for Pervasive Applications)
Category: 
Keyword: 
hill-climbing attackonline signature verificationbiometricsvulnerabilityoffline attack
 Summary | Full Text:PDF(972.9KB)

Quantum-Dot Cellular Automata Design Guideline
Kyosun KIM Kaijie WU Ramesh KARRI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/06/01
Vol. E89-A  No. 6 ; pp. 1607-1614
Type of Manuscript:  Special Section PAPER (Special Section on Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2005))
Category: 
Keyword: 
quantum-dot cellular automatavulnerabilityunbalanced input pathsneak noise pathdisciplinary guideline
 Summary | Full Text:PDF(983.9KB)

Swiss Cheese Test Case Generation for Web Services Testing
Wei-Tek TSAI Xiao WEI Yinong CHEN Ray PAUL Bingnan XIAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/12/01
Vol. E88-D  No. 12 ; pp. 2691-2698
Type of Manuscript:  Special Section PAPER (IEICE/IEEE Joint Special Section on Autonomous Decentralized Systems)
Category: 
Keyword: 
Web servicesWeb services testingtest case generationvulnerabilitymodel checking
 Summary | Full Text:PDF(963KB)