{"created":"2023-07-25T10:39:56.257932+00:00","id":12564,"links":{},"metadata":{"_buckets":{"deposit":"a3cb1872-1183-4512-a880-9037c3152400"},"_deposit":{"created_by":12,"id":"12564","owners":[12],"pid":{"revision_id":0,"type":"depid","value":"12564"},"status":"published"},"_oai":{"id":"oai:shizuoka.repo.nii.ac.jp:00012564","sets":["80:956"]},"author_link":["10391","10392","4232","941","10389","10390"],"item_36_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2020-01-28","bibliographicIssueDateType":"Issued"},"bibliographicPageStart":"2F2-5","bibliographicVolumeNumber":"2020","bibliographic_titles":[{"bibliographic_title":"2020年暗号と情報セキュリティシンポジウム"},{"bibliographic_title":"2020 Symposium on Cryptography and Information Security","bibliographic_titleLang":"en"}]}]},"item_36_description_10":{"attribute_name":"注記","attribute_value_mlt":[{"subitem_description":"2020年暗号と情報セキュリティシンポジウム 1月28日~30日(高知)","subitem_description_type":"Other"},{"subitem_description":"2F2 Webセキュリティ(2) 1月29日(水) 10:50--12:30","subitem_description_type":"Other"}]},"item_36_description_30":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_36_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"電子情報通信学会"}]},"item_36_relation_22":{"attribute_name":"NII論文ID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"120006849747","subitem_relation_type_select":"NAID"}}]},"item_36_rights_7":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2020 The Institute of Electronics, Information and Communication Engineers"}]},"item_36_subject_8":{"attribute_name":"NDC","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_36_version_type_32":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"黒木, 琴海"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"鐘本, 楊"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"青木, 一史"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"三好, 潤"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"野口, 靖浩"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{},{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-06-12"}],"displaytype":"detail","filename":"200612003.pdf","filesize":[{"value":"327.3 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"200612003","url":"https://shizuoka.repo.nii.ac.jp/record/12564/files/200612003.pdf"},"version_id":"b97f27fa-81e2-42c4-830a-7090e4e1a619"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"被害識別","subitem_subject_scheme":"Other"},{"subitem_subject":"SQLインジェクション","subitem_subject_scheme":"Other"},{"subitem_subject":"構文解析","subitem_subject_scheme":"Other"},{"subitem_subject":"動的意味解析","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"構文解析と動的意味解析に基づくSQLインジェクション被害識別手法","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"構文解析と動的意味解析に基づくSQLインジェクション被害識別手法"},{"subitem_title":"A Damage Identification Method Based on Syntax Analysis and Semantic Analysis for SQL Injection","subitem_title_language":"en"}]},"item_type_id":"36","owner":"12","path":["956"],"pubdate":{"attribute_name":"公開日","attribute_value":"2020-06-12"},"publish_date":"2020-06-12","publish_status":"0","recid":"12564","relation_version_is_last":true,"title":["構文解析と動的意味解析に基づくSQLインジェクション被害識別手法"],"weko_creator_id":"12","weko_shared_id":-1},"updated":"2024-02-14T02:54:24.038429+00:00"}