Updated on 2024/04/03

写真a

 
MATSUZAKI Kazutaka
 
Organization
Faculty of Global Informatics Professor
Other responsible organization
Global Informatics Course of Graduate School of Global Informatics, Master's Program
Contact information
The inquiry by e-mail is 《here
External link

Degree

  • 博士(情報理工学) ( 東京大学 )

  • 修士(情報理工学) ( 東京大学 )

Education

  • 2007.3
     

    The University of Tokyo   doctor course   completed

  • 2004.3
     

    The University of Tokyo   master course   completed

  • 2002.3
     

    The University of Tokyo   graduated

Research History

  • 2024.4 - Now

    Chuo University   Faculty of Global Informatics   Professor

  • 2021.10 - Now

    The Tokyo Foundation for Policy Research   主席研究員

  • 2019 - Now

    The University of Electro-Communications   i-パワードエネルギー・システム研究センター   客員准教授

  • 2018.4 - Now

    早稲田大学 グリーン・コンピューティング・システム研究機構 招聘研究員

  • 2018.1 - Now

    技術研究組合制御システムセキュリティセンター 非専従研究員

  • 2023.9 - 2024.3

    Waseda University   School of Fundamental Science and Engineering

  • 2019.4 - 2024.3

    Chuo University   Faculty of Global Informatics   Associate Professor

  • 2019.6 - 2023.3

    Waseda University   理工学術院研究院   客員准教授

  • 2007.4 - 2019.3

    株式会社 三菱総合研究所

  • 2012.6 - 2014.12

    技術研究組合制御システムセキュリティセンター(出向)

  • 2011.11 - 2012.3

    University of Tsukuba   Graduate School of Systems and Information Engineering

  • 2010.9 - 2011.3

    Tokyo University of Agriculture and Technology   Faculty of Engineering

  • 2009.8 - 2010.3

    University of Miyazaki   Faculty of Engineering

▼display all

Professional Memberships

  • 2022.11 - Now

    電子情報通信学会

  • 2019.9 - Now

    The Institute of Electrical Engineers of Japan

  • 2009.9 - Now

    情報処理学会

Research Areas

  • Informatics / Software

Papers

  • Prototype Experimental Environment Using Actual Equipment for Remote Control Security Verification Reviewed

    Masatoshi Enomoto, Kenji Sawada, Shu Hosokawa, Kazutaka Matsuzaki

    2023 IEEE 12th Global Conference on Consumer Electronics (GCCE) OS-ACE   2023.10

     More details

  • Long-distance Remote Security Diagnostics during Maintenance Testing: A Practical Application and Evaluation Reviewed

    Kazutaka Matsuzaki, Masatoshi Enomoto, Kenji Sawada

    The Seventeenth International Conference on Emerging Security Information, Systems and Technologies SECURWARE 2023   2023.9

     More details

  • Developing REM Sleep Prediction Models Using Smart Home Sensor Data Reviewed

    Atsuya Tsuda, Kazutaka Matsuzaki, Yuichi Sei

    2023 IEEE World Conference on Applied Intelligence and Computing (AIC 2023)   2023.7

     More details

  • Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis. Reviewed

    Kazutaka Matsuzaki, Kenji Sawada, Shinichi Honiden

    SECRYPT - 20th International Conference on Security and Cryptography   805 - 812   2023

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.5220/0012132600003555

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/secrypt/secrypt2023.html#MatsuzakiSH23

  • Enhancing ICS Security Diagnostics with Pseudo-Greybox Fuzzing During Maintenance Testing. Reviewed

    Kazutaka Matsuzaki, Shinichi Honiden

    ICSOFT - 18th International Conference on Software Technologies   660 - 667   2023

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.5220/0012137100003538

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icsoft/icsoft2023.html#MatsuzakiH23

  • On Challenges in the Cloud-based Security Diagnosis of Cyber-Physical Systems

    Kazutaka Matsuzaki

    2   91 - 101   2022.3

     More details

  • Cybersecurity Evaluation Methodology for Distributed Energy Resources: Industrial Demonstration Reviewed

    Kazutaka Matsuzaki, Naota Sawabe, Ryo Maeda, Dai Suzuki, Takahiro Matsuura, Hiromu Hamada

    IECON 2020 - 46th Annual Conference of the IEEE Industrial Electronics Society   2169 - 2174   2020.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Testbed for Enhancing Control System Security Reviewed

    Masatoshi Enomoto, Shu Hosokawa, Kazutaka Matsuzaki

    World Engineering Conference and Convention 2015   2015

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Applicability of Existing Anonymization Methods to Large Location History Data in Urban Travel Reviewed

    Rie Shigetomi Yamaguchi, Keiichi Hirota, Koki Hamada, Katsumi Takahashi, Kazutaka Matsuzaki, Jun Sakuma, Yasuyuki Shirai

    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC)   997 - 1004   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Service providers want to know user attributes and recorded information in order to improve more satisfaction of the people, or the efficiency of their services by offering services specialized to the users' preferences. However, since they choose wrong way to collect, classify, analysis, use or disclose to others, of personal information, it may exceed the explicit or implicit of the user regarding the provision of personal information. So far, many anonymization methods for those data have been proposed to solve this problem. As one of anonymous method, we focus on k-anonymization technique to realize a "'forest from the trees' as described above. In papers in which these methods are proposed, only qualitative analyze or examples are shown that demonstrate the usefulness of anonymized data, which are the outputs of those methods. Since it is generally said that, if the size of data gets bigger, the anonymization of data becomes easier, those methods have not been applied to real huge data. In this paper, we transform the travel records of 722,000 people traveling by train in the Tokyo area with our proposed anonymization methods, analyze the degree to which each of the results is useful, and conclude that the results are useless even when anonymity level is set to low.

    DOI: 10.1109/ICSMC.2012.6377859

    Web of Science

    researchmap

  • Practical IT Training Courses using Open-Source Software

    Jun Iio, Kazutaka Matsuzaki, Hiroyuki Shimizu, Yasuyuki Shirai

    Journal of Economics, Memoirs of the Faculty of Law and Literature, Shimane University, Special Issue, Open Source Policy and Promotion of IT Industries in East Asia   ( 37 )   37 - 42   2010.11

     More details

    Language:English   Publishing type:Research paper (bulletin of university, research institution)  

    researchmap

  • Practical Education Courses on Open-Source Software in Japanese Higher Education

    Jun Iio, Kazutaka Matsuzaki, Hiroyuki Shimizu, Yasuyuki Shirai

    OSS 2010 Workshop, Open Source Policy and Promotion of IT Industries in East Asia, T. Noda et al. (Eds.)   9 - 14   2010.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Flexible Bloom Filters for Searching Textual Objects Reviewed

    Yuichi Sei, Kazutaka Matsuzaki, Shinichi Honiden

    AGENTS AND PEER-TO-PEER COMPUTING   5319   110 - 121   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER-VERLAG BERLIN  

    Efficient object searching mechanisms are essential in large-scale networks. Many studies have been done on distributed hash tables (DHTs), which are a kind of peer-to-peer system. In DHT networks, we can certainly get the desired objects if they exist. However, multi-word searches generate much communication traffic. Many studies have tried to reduce this traffic by using bloom filters, which are space-efficient probabilistic data structures. In using such filters, all nodes in a DHT must share their false positive rate parameter. However, the best false positive rate differs from one node to another. In this paper, we provide a method of determining the best false positive rate, and we use a new filter called a flexible bloom filter, to which each node can set the approximately best false positive rate. Experiments showed that the flexible bloom filter was able to greatly reduce the traffic.

    DOI: 10.1007/978-3-642-11368-0_9

    Web of Science

    researchmap

  • variable‐size DBFによる分散ハッシュテーブルのトラヒック量削減

    清雄一, 松崎和賢, 本位田真一

    電子情報通信学会論文誌 D   J90-D ( 9 )   2378 - 2387   2007.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    J-GLOBAL

    researchmap

  • Using Ringed Bloom Filters to Reduce the Communication Traffic on a Distributed Hash Table

    清雄一, 松崎和賢, 本位田真一

    情報処理学会論文誌   48 ( 7 )   2267 - 2277   2007.7

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Ringed Bloom Filterによる分散ハッシュテーブルのトラフィック量削減 Invited Reviewed

    清雄一, 松崎和賢, 本位田真一

    情報処理学会論文誌   48 ( 7 )   2349 - 2364   2007.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Increasing the ease of deployment in ubiquitous environments Reviewed

    Kazutaka Matsuzaki, Shinichi Honiden

    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS   581 - +   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE COMPUTER SOC  

    In the near future, applications with location-aware capabilities could be major development targets in the software industry. The current development frameworks rarely pay attention to developing applications for multiple ubiquitous environments. From the perspective of porting or updating applications, there are two dependencies: spatial and localized. These are dependencies on a single environment in which an application is deployed. We propose a new framework that uses a spatio-temporal scope (STS) model to ease deployment of location-aware applications by lessening these dependencies. We describe our model and explain the roles of the STS in the development stages of an application.

    DOI: 10.1109/PERCOMW.2007.57

    Web of Science

    researchmap

  • A Programing Support Framework for Dynamic Process Deployment in Ubiquitous Environment

    松崎和賢, 本位田真一

    情報処理学会論文誌   47 ( 12 )   3188 - 3202   2006.12

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • An Algorithm to Reduce the Communication Traffic for Multi‐word Search in Distributed Hash Table

    清雄一, 松崎和賢, 本位田真一

    情報処理学会論文誌   47 ( 5 )   1354 - 1362   2006.5

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Reduction of the Communication Traffic for Multi-word Searches in DHTs. Reviewed

    Yuichi Sei, Kazutaka Matsuzaki, Shinichi Honiden

    2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November - 1 December 2006, Sydney, Aus   14   2006

     More details

    Language:English   Publisher:IEEE Computer Society  

    DOI: 10.1109/CIMCA.2006.174

    researchmap

  • An algorithm to reduce the communication traffic for multi-word searches in a distributed hash table Reviewed

    Yuichi Sei, Kazutaka Matsuzaki, Shinichi Honiden

    FOURTH IFIP INTERNATIONAL CONFERENCE ON THEORETICAL COMPUTER SCIENCE - TCS 2006   209   115 - +   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER  

    In distributed hash tables, much communication traffic comes from multi-word searches. The aim of this work is to reduce the amount of traffic by using a bloom filter, which is a space-efficient probabilistic data structure used to test whether or not an element is a member of a set. However, bloom filters have a limited role if several sets have different numbers of elements. In the proposed method, extra data storage is generated when contents' keys are registered in a distributed hash table system. Accordingly, we propose a "divided bloom filter" to Solve the problem of a normal bloom filter. Using the divided bloom filter, we aim to reduce both the amount of communication traffic and the amount of data storage.

    Web of Science

    researchmap

  • Location Scope: Development Support for Location‐awareness Software

    松崎和賢, 吉岡信和, 本位田真一

    情報処理学会論文誌   46 ( 12 )   2925 - 2939   2005.12

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Location Scope : A Conceptual Event Modeling for Location-Aware Application Development Reviewed

    Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Honiden

    2nd International Workshop on Mobility Aware Technologies and Applications, October 17-19, 2005, Montreal, Canada   2005.10

     More details

    Language:English  

    researchmap

  • Flexible and maintainable contents activities in ubiquitous environment Reviewed

    K Matsuzaki, N Yoshioka, S Honiden

    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2005: OTM 2005 WORKSHOPS, PROCEEDINGS   3762   14 - 15   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER-VERLAG BERLIN  

    In future ubiquitous environments, contents (data, movie, text, graphics, etc.) will be more sophisticated and context-aware so that they can enrich user experience. We have proposed the Active Contents (AC) framework, which is based on contents encapsulation with program and aspect definition to allow contents to behave actively. AC can be seen as a software component with several viewpoints of contributors (planner, designer, programmer, etc.). The problem is about maintainability of AC which is modified by the contributors based on their own viewpoints.
    In this position paper, we propose a mechanism to allow such contributors to modify AC with context-aware aspect. In our mechanism, based on location binding analysis for AC, parallel executions to be performed at a sepaxate location axe detected and automatically executed using workflow-aware communication.

    DOI: 10.1007/11575863_7

    Web of Science

    researchmap

  • Location-aware Application Development Methodology using Mobile Agent-based System Reviewed

    K. Matsuzaki, N. Yoshioka, S. Honiden

    International Workshop on Mobility Aware Technologies and Applications (MATA2004), October 20-22, 2004 - Florian?polis, Brazil   2004.10

     More details

    Language:English  

    researchmap

  • モバイルエージェントを用いたユビキタスアプリケーション開発法 Invited Reviewed

    Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Honiden

    International Workshop on Ubiquitous Computing (IWUC 2004)   2004.4

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Ubiquitous Application Development using a Mobile Agent-based System. Reviewed

    Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Honiden

    Ubiquitous Computing - Proceedings of the 1st International Workshop on Ubiquitous Computing, IWUC 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004   204 - 212   2004

     More details

    Language:English   Publisher:INSTICC Press  

    researchmap

  • Development methodology for location-aware mobile agent Reviewed

    K Matsuzaki, N Yoshioka, S Honiden

    MOBILITY AWARE TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS   3284   13 - 26   2004

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER-VERLAG BERLIN  

    We describe a methodology which enables development of flexible and reusable mobile agent applications for location aware indoor environments. The methodology, which is named "Workflow-awareness model" (WFA), is based on a concept where a pair of mobile agents cooperate to perform a given task to realize separation of concerns for software maintenance. The paper outlines the methodology, and shows how the concepts work in the prototype environment. Usefulness of this methodology concerning its efficiency and software engineering aspects are analyzed.

    DOI: 10.1007/978-3-540-30178-3_2

    Web of Science

    researchmap

  • The methodology for developing mobile agent application for ubiquitous environment

    Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Honiden

    Transactions of the Japanese Society for Artificial Intelligence   19 ( 4 )   311 - 321   2004

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    A methodology which enables a flexible and reusable development of mobile agent application to a mobility aware indoor environment is provided in this study. The methodology is named Workflow-awareness model based on a concept of a pair of mobile agents cooperating to perform a given task. A monolithic mobile agent application with numerous concerns in a mobility aware setting is divided into a master agent (MA) and a shadow agent (SA) according to a type of tasks. The MA executes a main application logic which includes monitoring a user's physical movement and coordinating various services. The SA performs additional tasks depending on environments to aid the MA in achieving efficient execution without losing application logic. "Workflow-awareness (WFA) " means that the SA knows the MA's execution state transition so that the SA can provide a proper task at a proper timing. A prototype implementation of the methodology is done with a practical use of AspectJ. AspectJ is used to automate WFA by weaving communication modules to both MA and SA. Usefulness of this methodology concerning its efficiency and software engineering aspects are analyzed. As for the effectiveness, the overhead of WFA is relatively small to the whole expenditure time. And from the view of the software engineering, WFA is possible to provide a mechanism to deploy one application in various situations.

    DOI: 10.1527/tjsai.19.311

    Scopus

    J-GLOBAL

    researchmap

▼display all

MISC

  • 鉄道分野のサイバーセキュリティ : 2021-22年に押さえておきたい動向

    松崎 和賢

    JREA   64 ( 3 )   44831 - 44834   2021.3

     More details

    Language:Japanese   Publishing type:Article, review, commentary, editorial, etc. (scientific journal)   Publisher:日本鉄道技術協会  

    researchmap

  • N/A

    Railway Research-Culture Promotion Foundation Annual Review   22   2020.5

     More details

    Authorship:Lead author   Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • ビッグデータ斜め読み―流行に惑わされないための要点と将来展望―

    吉田圭吾, 松崎和賢

    情報処理   53 ( 9 )   968 - 973   2012.8

     More details

Presentations

  • ゲーミフィケーションを活用した児童・生徒向け 情報セキュリティ学習プログラムの開発

    津田 敦哉, 松崎 和賢

    情報処理学会 コンピュータと教育研究会 169回研究発表会  2023.3 

     More details

  • Examining Robust REM Sleep Prediction Models Using Smart Home Sensor Data

    2023.2 

     More details

  • 再生可能エネルギーシステムの遠隔制御におけるセキュリティ評価環境の構築

    松崎和賢, 澤田賢治

    2019年 電気学会 電子・情報・システム部門大会  2019.9 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 産業制御システムのネットワークログを対象としたインシデント分析手法の開発

    石黒正揮, 松本尭, 松崎和賢, 澤部直太, 井上信吾, 高橋茂, 村瀬一郎, 清水良昭, 木内誠, 平川博宣, 久保智

    情報処理学会シンポジウムシリーズ(CD-ROM)  2013.10 

     More details

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • OSSを題材に用いた実践的情報技術教育の実施と評価

    飯野淳, 松崎和賢, 清水浩行, 白井康之

    情報処理学会シンポジウム論文集  2010.8 

     More details

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • Development and Evaluation of Personal Data Anonymization Platform in Information Grand Voyage Project

    廣田啓一, 保木野昌稔, 藤木由里, 松崎和賢, 吉田圭吾, 赤井健一郎, 高橋克巳, 白井康之, 山口利恵

    電子情報通信学会技術研究報告  2010.6 

     More details

    Language:Japanese  

    researchmap

  • 集団の行動履歴情報に基づく滞留の時空間特性抽出と行動パターン分析

    吉田圭吾, 小池亜弥, 松崎和賢, 小関悠, 白井康之

    土木計画学研究・講演集(CD-ROM)  2010.6 

     More details

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • パーソントリップデータにおける匿名性に関する考察

    松崎和賢, 廣田啓一, 高橋克巳, 白井康之

    土木計画学研究・講演集(CD-ROM)  2010.6 

     More details

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • オープンソースソフトウェアを活用した実践的情報技術教育の試み

    飯尾淳, 松崎和賢, 清水浩行, 白井康之, 杉原井康男

    情報処理学会シンポジウム論文集  2009.8 

     More details

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • 日常生活習慣パターン把握に基づくスポーツジムの新たな指導サービスの創出

    荒木次郎, 小池亜弥, 松崎和賢, 小関悠, 白井康之

    人工知能学会全国大会論文集(CD-ROM)  2009 

     More details

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • OSS‐based Practical Learning Guidances for Basic IT Knowledge

    白井康之, 松崎和賢, 飯尾淳, 比屋根一雄, 杉原井康男

    情報処理学会シンポジウム論文集  2008.8 

     More details

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • Ringed Bloom Filterによる分散ハッシュテーブルのトラフィック量削減

    清雄一, 松崎和賢, 本位田真一

    情報処理学会シンポジウム論文集  2006.7 

     More details

    Event date: 2006.7    

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • 自己制御型コンテンツのポリシーに基づく開発支援手法の提案

    松崎和賢, 吉岡信和, 本位田真一

    合同エージェントワークショップ&シンポジウム2005 (JAWS2005) (2005).  2005.3 

     More details

    Event date: 2005.3    

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • 位置指向設計プロセス:モバイル環境における状況依存アプリケーションのアスペクト指向設計

    松崎和賢, 吉岡信和, 本位田真一

    ソフトウェア工学の基礎XI,日本ソフトウェア科学会  2004.3 

     More details

    Event date: 2004.3    

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • 位置情報を利用するエージェントのロケーション指向設計

    松崎和賢, 吉岡信和, 本位田真一

    エージェント合同シンポジウム(JAWS 2004)論文集  2004.3 

     More details

    Event date: 2004.3    

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

  • Bee‐gent expanded framework for cooperative mobile activity.

    松崎和賢, 吉岡信和, 本位田真一

    エージェント合同シンポジウム(JAWS2002)講演論文集 平成14年  2002 

     More details

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    researchmap

▼display all

Research Projects

  • ユビキタス機械学習社会におけるプライバシ保護基盤

    Grant number:21H03496  2021.4 - 2025.3

    日本学術振興会  科学研究費助成事業  基盤研究(B)  電気通信大学

    清 雄一, 大須賀 昭彦, 田原 康之, 松崎 和賢

      More details

    Grant amount: \16770000 ( Direct Cost: \12900000 、 Indirect Cost: \3870000 )

    researchmap

  • 日本におけるDXの社会的インパクトに関する研究

    2021.10 - 2024.3

    東京財団政策研究所 

    須藤 修, 加藤 綾子, 原 翔子, 満永 拓邦

      More details

    Authorship:Coinvestigator(s) 

    researchmap

  • 鉄道分野におけるサイバーセキュリティ対策要件の動向予測

    2019.9 - 2020.3

    一般財団法人研友社 

    松崎 和賢

      More details

    Grant type:Competitive

    researchmap

Teaching Experience

  • プログラム解析

    2019 - Now   Institution:国立情報学研究所GRACEセンタートップエスイープロジェクト

  • セキュリティ・プライバシ・法令

    2019 - Now   Institution:早稲田大学スマートエスイー

Committee Memberships

  • 2023.8 - Now

    電気学会   カーボンニュートラル実現に向けた需要家電力資源の柔軟性の活用検討調査専門委員会  

  • 2023.7 - Now

    情報処理推進機構   「サイバーインシデントに係る事故調査」機能の整備に関わる技術検討委員会  

  • 2019.3 - Now

    公益財団法人鉄道総合技術研究所   セキュリティ作業部会(IEC TC9)  

  • 2019.10 - 2022

    電気学会   IoT 普及・拡大に向けたシステムセキュリティ特別調査専門委員会  

  • 2019 - 2022

    経済産業省   IoT機器等の検証サービスのあり方に係る検討会  

  • 2021.2 - 2021.3

    情報処理推進機構   デジタル化時代における安全・ガバナンスのあり方に関する検討会  

  • 2020.7 - 2021.3

    経済産業省   スマート保安技術導入に伴う自家用電気工作物の点検等の在り方検討 WG  

  • 2020.8 - 2020.11

    経済産業省   大規模火力発電所の遠隔監視に係る規制の在り方検討委員会  

▼display all