Contributions�� |
�
|
Num�ro�
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 615 ]
�
(Rev.1)� |
Revised baseline text for X.sr-ai:Security requirements for AI systems
�
� |
China Telecommunications Corporation
,
Soonchunhyang University (Korea (Rep. of))
� |
Q15/17
� |
2024-02-07 |
|
[ 614 ]
�
� |
Proposed tutorial: Using tools to support the development of Recommendations
�
� |
Broadcom Europe Ltd. (United Kingdom)
� |
QALL/17
� |
2024-02-06 |
|
[ 613 ]
�
� |
Proposal for new work item corrigendum 1 to X.1060 and new work item X.cdc csirt: Cyber Defence/Security Center and Computer Security Incident Response Team relationships
�
� |
Broadcom Europe Ltd. (United Kingdom)
,
Broadcom Corporation (United States)
,
Forum of Incident Response and Security Teams (FIRST) (United States)
� |
Q3/17
� |
2024-02-06 |
|
[ 612 ]
�
(Rev.1)� |
Comments on baseline text for X.1221 (X.stie) and X.1222 (X.taeii) - How the threat actors concept is used and why it is important/existential for security
�
� |
Broadcom Corporation (United States)
,
Broadcom Europe Ltd. (United Kingdom)
� |
Q4/17
� |
2024-02-06 |
|
[ 611 ]
�
� |
4th Revised baseline text for X.icd-schemas, Vendor agnostic security data schemas for integrated cyber defence solutions
�
� |
Broadcom Europe Ltd. (United Kingdom)
� |
Q15/17
� |
2024-02-06 |
|
[ 610 ]
�
� |
Proposal for new work item X.sa-iot: Technology requirements for security awareness of IoT devices
�
� |
China Mobile Communications Co. Ltd.
� |
Q6/17
� |
2024-02-06 |
|
[ 609 ]
�
� |
Proposal for new work item TR.sg-lmcs: Security guidelines of DLT-based lifecycle management for computing services
�
� |
Beijing Jiaotong University (China)
,
China Mobile Communications Co. Ltd.
� |
Q2/17
� |
2024-02-06 |
|
[ 608 ]
�
� |
Revised baseline text for X.tg-fdma: Technical guidelines for fraud detection of malicious applications in mobile devices
�
� |
Ant Group Co., Ltd. (China)
� |
Q7/17
� |
2024-02-06 |
|
[ 607 ]
�
� |
Revised baseline text for X.tc-ifd: Technical capabilities of interactive fraud detection
�
� |
Ant Group Co., Ltd. (China)
� |
Q7/17
� |
2024-02-06 |
|
[ 606 ]
�
� |
Proposal for ITU-T SG 17 as Lead Study Group for Child Online Protection
�
� |
Ghana
� |
QALL/17
� |
2024-02-06 |
|
[ 605 ]
�
� |
Proposal for new work item X.srm-fml: Security requirements and measures of federated machine learning
�
� |
China Information Communication Technologies Group
,
China Telecommunications Corporation
,
China Unicom
� |
Q15/17
� |
2024-02-06 |
|
[ 604 ]
�
� |
Revised baseline text for X.sf-dtea Security framework for detecting targeted email attacks
�
� |
Broadcom Corporation (United States)
� |
Q4/17
� |
2024-02-06 |
|
[ 603 ]
�
� |
Revised baseline text for the X.sec_QKDN_tn: Security requirements for the protection of quantum key distribution node (for consent)
�
� |
CAS Quantum Network Co. Ltd. (China)
,
QuantumCTek Co., Ltd. (China)
� |
Q15/17
� |
2024-02-06 |
|
[ 602 ]
�
(Rev.1)� |
A New Approach to Spam Email Detecting Using Machine Learning
�
Rev.1 submitted as a late Contribution
� |
Iran (Islamic Republic of)
� |
Q4/17
� |
2024-02-06 |
|
[ 601 ]
�
� |
Revised baseline text for X.gsm-cdc: Guideline on Security Metrics for CDC
�
� |
NEC Corporation (Japan)
� |
Q3/17
� |
2024-02-06 |
|
[ 600 ]
�
� |
Revised baseline text for X.srgsc: Security requirements and guidelines of application and service for smart city platform - clause 8
�
� |
China Telecommunications Corporation
� |
Q7/17
� |
2024-02-06 |
|
[ 599 ]
�
� |
5th Revised text for X.IMT-2020/5Gsec-srocvs: Security Requirements for the Operation of IMT-2020/5G Core Network to Support Vertical Services (for determination)
�
� |
China Telecommunications Corporation
� |
Q2/17
� |
2024-02-06 |
|
[ 598 ]
�
� |
2nd Revised text for X.SecaaS: Security threats to be identified in the domain of security as a service
�
� |
China Telecommunications Corporation
� |
Q15/17
� |
2024-02-06 |
|
[ 597 ]
�
� |
Proposal for new work item X.ckrp: Framework of cryptographic key resource pool for cloud computing
�
� |
China Telecommunications Corporation
,
ZTE Corporation (China)
� |
Q8/17
� |
2024-02-06 |
|
[ 596 ]
�
� |
Revised baseline text for X.5gsec-asra:Guidelines and Technical Requirements for 5G Network Asset Security Risk Analysis
�
� |
ZTE Corporation (China)
� |
Q2/17
� |
2024-02-06 |
|
[ 595 ]
�
� |
Revised baseline text for X.tg-fdma: Technical guidelines for fraud detection of malicious applications in mobile devices
�
� |
Vivo Mobile Communication Co., Ltd. (China)
� |
Q7/17
� |
2024-02-06 |
|
[ 594 ]
�
� |
3rd Revised baseline text for X.mt-integrity: Security guidelines for mobile terminal integrity protection
�
� |
China Information Communication Technologies Group
,
National Telecommunication Regulatory Authority (NTRA) (Egypt)
,
Vivo Mobile Communication Co., Ltd. (China)
� |
Q6/17
� |
2024-02-06 |
|
[ 593 ]
�
� |
3rd Revised baseline text for X.mt-feature: Security features for assessment of mobile terminal security
�
� |
China Information Communication Technologies Group
,
National Telecommunication Regulatory Authority (NTRA) (Egypt)
,
Vivo Mobile Communication Co., Ltd. (China)
� |
Q6/17
� |
2024-02-06 |
|
[ 592 ]
�
� |
Revised baseline text for X.idse: Evaluation methodology for in-vehicle intrusion detection systems
�
� |
China Telecommunications Corporation
� |
Q13/17
� |
2024-02-06 |
|
[ 591 ]
�
� |
Revised baseline text for X.srapi-cc: Security requirements of application programming interface (API) for cloud computing
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2024-02-06 |
|
[ 590 ]
�
� |
Revised baseline text for X.gdsml: Guidelines for data security using machine learning in big data infrastructure
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2024-02-06 |
|
[ 589 ]
�
� |
Revised baseline text for TR.smpa Security Middle Platform Architecture
�
� |
China Telecommunications Corporation
� |
Q15/17
� |
2024-02-06 |
|
[ 588 ]
�
(Rev.1)� |
Revised baseline text for X.asm-cc: Requirements of Attack Surface Management for cloud computing
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2024-02-06 |
|
[ 587 ]
�
� |
Revised baseline text for X.cs-ra: Cyber Security Reference Architecture
�
� |
Soonchunhyang University (Korea (Rep. of))
� |
Q1/17
� |
2024-02-06 |
|
[ 586 ]
�
(Rev.1)� |
Revised baseline text for X.soar-cc: Framework of Security Orchestration, Automation and Response for cloud computing
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2024-02-06 |
|
[ 585 ]
�
� |
Proposal for new work item X.cpn-tp-sec: Security requirements and architecture of transaction platform of computing power network
�
� |
China Information Communication Technologies Group
,
China Unicom
,
Institute of Computing Technology Chinese Academy of Sciences (China)
,
ZTE Corporation (China)
� |
Q2/17
� |
2024-02-06 |
|
[ 584 ]
�
� |
Proposal for new work item TR.saai: Guidelines for Security Evaluation on Artificial Intelligence Technology
�
� |
China Mobile Communications Co. Ltd.
� |
Q15/17
� |
2024-02-06 |
|
[ 583 ]
�
� |
Proposal for new work item TR.cs-uc: Use cases for extracting the security requirements for cyber security reference architecture
�
� |
Soonchunhyang University (Korea (Rep. of))
� |
Q1/17
� |
2024-02-06 |
|
[ 582 ]
�
� |
Proposal for new work item X.qsdlt-ca: Guidelines for quantum-safe DLT systems with crypto-agility
�
� |
China Mobile Communications Co. Ltd.
� |
Q14/17
� |
2024-02-06 |
|
[ 581 ]
�
� |
Proposal for new work item X.mbaas-sc-sec: Security requirements and framework of collaboration service for multiple blockchain as a service platforms
�
� |
China Information Communication Technologies Group
,
China Unicom
,
ZTE Corporation (China)
� |
Q8/17
� |
2024-02-06 |
|
[ 580 ]
�
� |
Proposal for new work item X.rf-dw: Requirements and application framework for digital watermarking
�
� |
China Mobile Communications Co. Ltd.
� |
Q7/17
� |
2024-02-06 |
|
[ 579 ]
�
(Rev.1)� |
Proposal for new work item X.gnssa-iot: Guidelines of network security situational awareness for IoT systems
�
� |
China Telecommunications Corporation
� |
Q6/17
� |
2024-02-06 |
|
[ 578 ]
�
� |
2nd Revised baseline text for X.sg-scmr: Security guidelines for selecting computing methods and resources from Cloud Service Providers
�
� |
China Mobile Communications Co. Ltd.
� |
Q8/17
� |
2024-02-06 |
|
[ 577 ]
�
� |
7th Revised baseline text for X.sg-dtn: Security Guidelines for Digital Twin Network(for consent)
�
� |
China Mobile Communications Co. Ltd.
� |
Q7/17
� |
2024-02-06 |
|
[ 576 ]
�
� |
Revised baseline text for X.DLT-dgi: Security requirements of DLT gateway for interoperability (update clauses 6-9)
�
� |
China Information Communication Technologies Group
,
China Unicom
� |
Q14/17
� |
2024-02-06 |
|
[ 575 ]
�
� |
5th Revised baseline text for TR.5Gsec-bsf: Guidelines of Built-in Security Framework for the Telecommunications Network
�
� |
China Mobile Communications Co. Ltd.
� |
Q2/17
� |
2024-02-06 |
|
[ 574 ]
�
� |
Revised baseline text for X.DLT-ccs-fr: Security requirements and framework of cross-chain service for DLT systems (update clauses 6-9)
�
� |
China Information Communication Technologies Group
,
China Unicom
� |
Q14/17
� |
2024-02-06 |
|
[ 573 ]
�
� |
Proposal for new work item TR.sd-cnc: Security guidelines for data of coordination of networking and computing
�
� |
China Mobile Communications Co. Ltd.
� |
Q2/17
� |
2024-02-06 |
|
[ 572 ]
�
� |
Revised baseline text for X.sr-iiot: Security requirements for the industrial Internet of things based smart manufacturing reference model
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2024-02-06 |
|
[ 571 ]
�
� |
3rd Revised baseline text for X.evpnc-sec: Security guidelines for electric vehicle plug and charge (PnC) services using vehicle identity (VID)
�
� |
Korea (Rep. of)
� |
Q13/17
� |
2024-02-06 |
|
[ 570 ]
�
� |
Proposal for new work item TP.divs: Rationale and initial approach of decentralized identity verification system (DIVS) based on verifiable data
�
� |
Korea (Rep. of)
� |
Q10/17
� |
2024-02-06 |
|
[ 569 ]
�
� |
Revised baseline text for X.ota-sec: Implementation and evaluation of security functions to support over-the-air (OTA) update capability in connected vehicles
�
� |
Korea (Rep. of)
� |
Q13/17
� |
2024-02-06 |
|
[ 568 ]
�
� |
Revised baseline text for X.af-sec: Evaluation methodologies for anonymization techniques using face images in autonomous vehicles
�
� |
Korea (Rep. of)
� |
Q13/17
� |
2024-02-06 |
|
[ 567 ]
�
� |
Proposal for new work item X.sc-ssc: Guidelines on Security Capabilities for Software Supply Chain
�
� |
China Telecommunications Corporation
� |
Q15/17
� |
2024-02-06 |
|
[ 566 ]
�
� |
Proposal for new work item X.sr-dpts: Security requirements for permissioned DLT-based distributed power trading systems
�
� |
Korea (Rep. of)
� |
Q14/17
� |
2024-02-06 |
Resultats:187 documents R�sultats :�
Pr�c�dent�-�
1 -
2 -
3 -
4
�-�Suivant
� |
T�l�chargement de multiples documents:�Formats et langues � prendre en compte (si disponibles):