{"created":"2023-05-15T12:36:24.251499+00:00","id":5695,"links":{},"metadata":{"_buckets":{"deposit":"6c253649-32cf-4670-b5de-448993c29c90"},"_deposit":{"created_by":3,"id":"5695","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"5695"},"status":"published"},"_oai":{"id":"oai:nitech.repo.nii.ac.jp:00005695","sets":["31"]},"author_link":["8514","14813","20492","20495","20496","20490","20489","20491"],"item_10001_alternative_title_24":{"attribute_name":"その他(別言語等)のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"Mimicry Attack Detection by Saving and Checking Control Data Stored on Call Stack"}]},"item_10001_biblio_info_28":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2012-09","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicPageEnd":"2085","bibliographicPageStart":"2075","bibliographicVolumeNumber":"53","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}]}]},"item_10001_description_38":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_10001_full_name_27":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{},{}],"names":[{"name":"Saito, Shoichi"}]}]},"item_10001_publisher_29":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_10001_source_id_30":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"03875806","subitem_source_identifier_type":"ISSN"}]},"item_10001_source_id_32":{"attribute_name":"書誌レコードID(NCID)","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_10001_version_type_33":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"冨永, 悠生"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"樫山, 武浩"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"瀧本, 栄二"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"桑原, 寛明"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"毛利, 公一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"齋藤, 彰一"},{"creatorName":"サイトウ, ショウイチ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"上原, 哲太郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"國枝, 義敏"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-01-27"}],"displaytype":"detail","filename":"SaitoShoichi_2012_P2.pdf","filesize":[{"value":"947.1 kB"}],"format":"application/pdf","license_note":"本著作物の著作権は情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文_fulltext","url":"https://nitech.repo.nii.ac.jp/record/5695/files/SaitoShoichi_2012_P2.pdf"},"version_id":"869a8412-8f96-4614-be20-32d5f291e585"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"コールスタックの制御データ検査によるスタック偽装攻撃検知","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"コールスタックの制御データ検査によるスタック偽装攻撃検知"}]},"item_type_id":"10001","owner":"3","path":["31"],"pubdate":{"attribute_name":"公開日","attribute_value":"2015-06-18"},"publish_date":"2015-06-18","publish_status":"0","recid":"5695","relation_version_is_last":true,"title":["コールスタックの制御データ検査によるスタック偽装攻撃検知"],"weko_creator_id":"3","weko_shared_id":3},"updated":"2023-05-15T14:11:16.308318+00:00"}