{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00224970","sets":["1164:4088:11174:11243"]},"path":["11243"],"owner":"44499","recid":"224970","title":["サイバーセキュリティのデュアルユース性~IoTセキュリティを中心としたサイバー空間をめぐる脅威の現状より~"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-03-08"},"_buckets":{"deposit":"3303c540-8a4a-4360-a7aa-d99d1df796b7"},"_deposit":{"id":"224970","pid":{"type":"depid","value":"224970","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"サイバーセキュリティのデュアルユース性~IoTセキュリティを中心としたサイバー空間をめぐる脅威の現状より~","author_link":["594505","594504"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"サイバーセキュリティのデュアルユース性~IoTセキュリティを中心としたサイバー空間をめぐる脅威の現状より~"},{"subitem_title":"Dual-Use of Cybersecurity-From the Threat Landscape in Cyberspace with a Focus on IoT Security-","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"SITEシンポジウム:招待講演","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2023-03-08","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"(一社)重要生活機器連携セキュリティ協議会"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Connected Consumer Device Security Council","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/224970/files/IPSJ-IOT23060030.pdf","label":"IPSJ-IOT23060030.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT23060030.pdf","filesize":[{"value":"2.6 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"b4b6cb7c-5f53-4ae2-8b9c-a23dd5c04901","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"荻野, 司"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tsukasa, Ogino","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"自動車,ドローンや家電などが互いにインターネットを介して繋がる「モノのインターネット (IoT)」がグローバル規模で実現しつつある.モノがインターネットで繋がることで,あらゆるシステムのサイバー攻撃に対する脆弱性は,より一層高まり,サイバー攻撃による被害も深刻化・広範化している.このような情勢を受け,本講演では,IoT 時代におけるサイバー攻撃から個人や社会を守るサイバーセキュリテイの現状と課題を概説する.また,サイバーセキュリティ技術が,防御/攻撃のデュアルユース性もっており,典型的な善悪デュアルユース性を備えた技術であることを示す.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Internet, is being realized on a global scale. The Internet of Things has made all systems vulnerable to cyber attacks, and the damage caused by cyber attacks is becoming more serious and widespread. In response to this situation, this lecture outlines the current status and challenges of cyber security to protect individuals and society from cyber attacks in the IoT era. It will also show that cybersecurity technology has dual uses of defense/attack, with a typical dual use of good and evil.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2023-03-08","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"30","bibliographicVolumeNumber":"2023-IOT-60"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T12:58:16.494046+00:00","created":"2025-01-19T01:24:29.268434+00:00","links":{},"id":224970}