{"created":"2023-07-25T10:38:52.589174+00:00","id":11290,"links":{},"metadata":{"_buckets":{"deposit":"c8770949-cee2-4859-82cc-e76dae59a0c4"},"_deposit":{"created_by":12,"id":"11290","owners":[12],"pid":{"revision_id":0,"type":"depid","value":"11290"},"status":"published"},"_oai":{"id":"oai:shizuoka.repo.nii.ac.jp:00011290","sets":["80:956"]},"author_link":["7847","941","8689","8081","7945"],"item_36_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018-10-22","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"905","bibliographicPageStart":"898","bibliographicVolumeNumber":"2018","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム論文集"}]}]},"item_36_description_30":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_36_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_36_relation_22":{"attribute_name":"NII論文ID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"120006695957","subitem_relation_type_select":"NAID"}}]},"item_36_rights_7":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"(C)2018 Information Processing Society of Japan"},{"subitem_rights":"ここに掲載した著作物の利用に関する注意 本著作物の著作権は情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。"}]},"item_36_source_id_19":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"18820840","subitem_source_identifier_type":"ISSN"}]},"item_36_source_id_23":{"attribute_name":"NII書誌ID","attribute_value_mlt":[{"subitem_source_identifier":"AA12629964","subitem_source_identifier_type":"NCID"}]},"item_36_subject_8":{"attribute_name":"NDC","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_36_version_type_32":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"井上, 佳祐"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"本多, 俊貴"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"向山, 浩平"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大木, 哲史"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{},{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-01-25"}],"displaytype":"detail","filename":"190125001.pdf","filesize":[{"value":"4.3 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"190125001","url":"https://shizuoka.repo.nii.ac.jp/record/11290/files/190125001.pdf"},"version_id":"bb814ad3-758b-4d6f-8c92-98110cf453dc"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"XSS","subitem_subject_scheme":"Other"},{"subitem_subject":"ホワイトリスト","subitem_subject_scheme":"Other"},{"subitem_subject":"自動生成","subitem_subject_scheme":"Other"},{"subitem_subject":"テストケース","subitem_subject_scheme":"Other"},{"subitem_subject":"攻撃検知","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"XSS攻撃検知のためのテストベースホワイトリスト自動生成手法に関する検討","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"XSS攻撃検知のためのテストベースホワイトリスト自動生成手法に関する検討"}]},"item_type_id":"36","owner":"12","path":["956"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-01-25"},"publish_date":"2019-01-25","publish_status":"0","recid":"11290","relation_version_is_last":true,"title":["XSS攻撃検知のためのテストベースホワイトリスト自動生成手法に関する検討"],"weko_creator_id":"12","weko_shared_id":-1},"updated":"2024-02-14T02:54:24.888929+00:00"}