


Остановите войну!
for scientists:


default search action
Nobukazu Yoshioka
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c120]Jati H. Husen, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hironori Takeuchi, Hiroshi Tanaka, Kazuki Munakata:
Extensible Modeling Framework for Reliable Machine Learning System Analysis. CAIN 2023: 94-95 - [c119]Rikuho Miyata, Hironori Washizaki, Kensuke Sumoto, Nobukazu Yoshioka, Yoshiaki Fukazawa, Takao Okubo:
Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure. SVM 2023: 14-17 - [c118]Masaomi Yamaguchi, Nobukazu Yoshioka:
Design by Contract Framework for Quantum Software. Q-SE@ICSE 2023: 24-25 - [c117]Jati H. Husen, Hironori Washizaki, Nobukazu Yoshioka, Hnin Thandar Tun, Yoshiaki Fukazawa, Hironori Takeuchi:
Metamodel-Based Multi-View Modeling Framework for Machine Learning Systems. MODELSWARD 2023: 194-201 - [i4]Masaomi Yamaguchi, Nobukazu Yoshioka:
Design by Contract Framework for Quantum Software. CoRR abs/2303.17750 (2023) - 2022
- [j24]Eduardo B. Fernández
, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns and the design of secure systems. Cybersecur. 5(1): 7 (2022) - [j23]Faeq Alrimawi
, Liliana Pasquale
, Deepak Mehta, Nobukazu Yoshioka
, Bashar Nuseibeh
:
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. IEEE Trans. Software Eng. 48(2): 120-134 (2022) - [c116]Jati H. Husen
, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hironori Takeuchi:
Traceable business-to-safety analysis framework for safety-critical machine learning systems. CAIN 2022: 50-51 - [c115]Jun Yajima, Maki Inui, Takanori Oikawa, Fumiyoshi Kasahara, Ikuya Morikawa, Nobukazu Yoshioka:
A new approach for machine learning security risk assessment: work in progress. CAIN 2022: 52-53 - [c114]Kensuke Sumoto, Kenta Kanakogi, Hironori Washizaki, Naohiko Tsuda, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hideyuki Kanuka:
Automatic labeling of the elements of a vulnerability report CVE with NLP. IRI 2022: 164-165 - [c113]Tomoko Kaneko, Yuji Takahashi, Shinichi Yamaguchi, Jyunji Hashimoto, Nobukazu Yoshioka:
Safety and Risk Analysis and Evaluation Methods for DNN Systems in Automated Driving. JCKBSE 2022: 83-96 - [c112]Jati H. Husen
, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Modeling tool for managing canvas-based models traceability in ML system development. MoDELS (Companion) 2022: 77-78 - [c111]Xun Zhang, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Detecting Design Patterns in UML Class Diagram Images using Deep Learning. SNPD 2022: 27-32 - 2021
- [j22]Tomoko Kaneko, Nobukazu Yoshioka:
CC-Case-Safety and Security Engineering Methodology. Int. J. Syst. Softw. Secur. Prot. 12(1): 1-20 (2021) - [j21]Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández
, Takehisa Kato, Hideyuki Kanuka, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development. Int. J. Syst. Softw. Secur. Prot. 12(2): 68-85 (2021) - [j20]Hironori Washizaki
, Tian Xia
, Natsumi Kamata, Yoshiaki Fukazawa
, Hideyuki Kanuka
, Takehisa Kato
, Masayuki Yoshino, Takao Okubo
, Shinpei Ogata
, Haruhiko Kaiya
, Atsuo Hazeyama
, Takafumi Tanaka, Nobukazu Yoshioka
, G. Priyalakshmi
:
Systematic Literature Review of Security Pattern Research. Inf. 12(1): 36 (2021) - [j19]Kenta Kanakogi, Hironori Washizaki
, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka
, Atsuo Hazeyama
, Nobukazu Yoshioka
:
Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques. Inf. 12(8): 298 (2021) - [j18]Eduardo B. Fernández
, Hironori Washizaki, Nobukazu Yoshioka, Takao Okubo:
The design of secure IoT applications using patterns: State of the art and directions for research. Internet Things 15: 100408 (2021) - [c110]Nobukazu Yoshioka, Jati H. Husen
, Hnin Thandar Tun, Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:
Landscape of Requirements Engineering for Machine Learning-based AI Systems. APSEC Workshops 2021: 5-8 - [c109]Hnin Thandar Tun, Jati H. Husen
, Nobukazu Yoshioka, Hironori Washizaki, Yoshiaki Fukazawa:
Goal-Centralized Metamodel Based Requirements Integration for Machine Learning Systems. APSEC Workshops 2021: 13-16 - [c108]Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Literature Review on Log Anomaly Detection Approaches Utilizing Online Parsing Methodology. APSEC 2021: 559-563 - [c107]Yasuhiro Watanabe, Hironori Washizaki, Kazunori Sakamoto, Daisuke Saito, Kiyoshi Honda, Naohiko Tsuda, Yoshiaki Fukazawa, Nobukazu Yoshioka:
Preliminary Literature Review of Machine Learning System Development Practices. COMPSAC 2021: 1407-1408 - [c106]Hironori Takeuchi, Takuo Doi, Hironori Washizaki, Satoshi Okuda, Nobukazu Yoshioka:
Enterprise Architecture based Representation of Architecture and Design Patterns for Machine Learning Systems. EDOC Workshops 2021: 245-250 - [c105]Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka:
Tracing CAPEC Attack Patterns from CVE Vulnerability Information using Natural Language Processing Technique. HICSS 2021: 1-9 - [c104]Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Online Log Parsing: Preliminary Literature Review. ISSRE Workshops 2021: 304-305 - [c103]Takuto Yamauchi, Takanori Hirano, Jialong Li, Takafumi Kawasaki, Yin Chen, Akira Tsuge, Tadashi Okoshi, Jin Nakazawa, Nobukazu Yoshioka, Georgios Palaiokrassas, Antonios Litke, Kenji Tei:
A Development Method for Safe Node-RED Systems using Discrete Controller Synthesis. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 130-137 - [c102]Jati H. Husen
, Hnin Thandar Tun, Nobukazu Yoshioka, Hironori Washizaki, Yoshiaki Fukazawa:
Goal-Oriented Machine Learning-Based Component Development Process. MoDELS (Companion) 2021: 643-644 - [c101]Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:
Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST). QRS Companion 2021: 806-815 - [c100]Hironori Washizaki, Atsuo Hazeyama, Takao Okubo, Hideyuki Kanuka, Shinpei Ogata, Nobukazu Yoshioka:
Analysis of IoT Pattern Descriptions. SERP4IoT 2021: 21-26 - [e1]Nobukazu Yoshioka, Hironori Washizaki, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto, Fuyuki Ishikawa, Foutse Khomh, Giuliano Antoniol:
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), Nara, Japan, December 4, 2018. CEUR Workshop Proceedings 2809, CEUR-WS.org 2021 [contents] - 2020
- [j17]Hironori Washizaki
, Shinpei Ogata
, Atsuo Hazeyama, Takao Okubo, Eduardo B. Fernández
, Nobukazu Yoshioka
:
Landscape of Architecture and Design Patterns for IoT Systems. IEEE Internet Things J. 7(10): 10091-10101 (2020) - [c99]Hironori Washizaki, Kenji Tei, Kazunori Ueda, Hayato Yamana
, Yoshiaki Fukazawa, Shinichi Honiden, Shoichi Okazaki, Nobukazu Yoshioka, Naoshi Uchihira:
Smart SE: Smart Systems and Services Innovative Professional Education Program. COMPSAC 2020: 1113-1114 - [c98]Takafumi Komoto, Kokichi Futatsugi, Nobukazu Yoshioka:
A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each Department. COMPSAC 2020: 1783-1788 - [c97]Haruhiko Kaiya, Wataru Fujita, Ryotaro Yamada, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling. JCKBSE 2020: 70-83 - [c96]Tomoko Kaneko
, Nobukazu Yoshioka
:
STAMP S&S: Layered Modeling for the Complexed System in the Society of AI/IoT. JCKBSE 2020: 122-131 - [c95]Haruhiko Kaiya, Shogo Tatsui, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
A Tool to Manage Traceability on Several Models and Its Use Case. KES 2020: 1449-1458 - [c94]Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:
STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT. QRS Companion 2020: 168-175
2010 – 2019
- 2019
- [c93]Fuyuki Ishikawa, Nobukazu Yoshioka:
How do engineers perceive difficulties in engineering of machine-learning systems?: questionnaire survey. CESSER-IP@ICSE 2019: 2-9 - [c92]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata
, Takao Okubo, Eduardo B. Fernández
:
Landscape of IoT patterns. SERP4IoT@ICSE 2019: 57-60 - [c91]Haruhiko Kaiya, Atsuo Hazeyama, Shinpei Ogata
, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques. KES 2019: 1075-1084 - [c90]Atsuo Hazeyama, Hikaru Miyahara, Takafumi Tanaka, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo, Nobukazu Yoshioka:
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base. RE Workshops 2019: 134-140 - [p1]Yijun Yu
, Nobukazu Yoshioka, Tetsuo Tamai:
Assessing Security and Privacy Behavioural Risks for Self-Protection Systems. Engineering Adaptive Software Systems 2019: 135-147 - [i3]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT Patterns. CoRR abs/1902.09718 (2019) - [i2]Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, Bashar Nuseibeh:
Incidents Are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. CoRR abs/1907.00199 (2019) - [i1]Yasuhiro Watanabe, Hironori Washizaki, Kazunori Sakamoto, Daisuke Saito, Kiyoshi Honda, Naohiko Tsuda, Yoshiaki Fukazawa, Nobukazu Yoshioka:
Preliminary Systematic Literature Review of Machine Learning System Development Process. CoRR abs/1910.05528 (2019) - 2018
- [j16]Eduardo B. Fernández
, Hironori Washizaki, Nobukazu Yoshioka:
Using Security Patterns to Develop Secure Systems - Ten Years Later. Int. J. Syst. Softw. Secur. Prot. 9(4): 46-57 (2018) - [c89]Eduardo B. Fernández
, Nobukazu Yoshioka, Hironori Washizaki:
Evaluating the degree of security of a system built using security patterns. ARES 2018: 43:1-43:8 - [c88]Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto:
Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild. WESPr-iMLSE@APSEC 2018: 1-2 - [c87]Fuyuki Ishikawa, Foutse Khomh, Nobukazu Yoshioka, Giuliano Antoniol:
Report of iMLSE-18: the 1st International Workshop on Machine Learning Systems Engineering. WESPr-iMLSE@APSEC 2018: 3-4 - [c86]Hua Cai, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes. WESPr-iMLSE@APSEC 2018: 18-25 - [c85]Eduardo B. Fernández, Nobukazu Yoshioka:
Using a variety of patterns in a secure software development methodology. WESPr-iMLSE@APSEC 2018: 26-32 - [c84]Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh
, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka:
Security Requirement Modeling Support System Using Software Security Knowledge Base. COMPSAC (2) 2018: 234-239 - [c83]Tian Xia, Hironori Washizaki, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata
, Eduardo B. Fernández
, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto
, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services. MODELSWARD 2018: 379-386 - 2017
- [j15]Yijun Yu
, Haruhiko Kaiya, Nobukazu Yoshioka, Zhenjiang Hu, Hironori Washizaki, Yingfei Xiong, Amin Hosseinian Far
:
Goal Modelling for Security Problem Matching and Pattern Enforcement. Int. J. Secur. Softw. Eng. 8(3): 42-57 (2017) - [c82]Haruhiko Kaiya, Nobukazu Yoshioka
, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata
, Takafumi Tanaka:
Eliciting Requirements for Improving Users' Behavior Using Transparency. APRES 2017: 41-56 - [c81]Haruhiko Kaiya, Ryohei Sato, Atsuo Hazeyama, Shinpei Ogata
, Takao Okubo, Takafumi Tanaka, Nobukazu Yoshioka
, Hironori Washizaki:
Preliminary Systematic Literature Review of Software and Systems Traceability. KES 2017: 1141-1150 - 2016
- [j14]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki, Madiha H. Syed:
Modeling and Security in Cloud Ecosystems. Future Internet 8(2): 13 (2016) - [j13]Masatoshi Yoshizawa, Hironori Washizaki
, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
:
Implementation Support of Security Design Patterns Using Test Templates . Inf. 7(2): 34 (2016) - [c80]Shigetoshi Yokoyama, Yoshinobu Masatani, Tazro Ohta
, Osamu Ogasawara
, Nobukazu Yoshioka, Kai Liu, Kento Aida:
Reproducible Scientific Computing Environment with Overlay Cloud Architecture. CLOUD 2016: 774-781 - [c79]Takafumi Komoto, Kokichi Futatsugi, Nobukazu Yoshioka
:
Assessing Business Processes by Checking Transaction Documents for Inconsistency Risks and a Tool for Risk Assessment. BMSD 2016: 70-82 - [c78]Atsuo Hazeyama, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo:
Literature Survey on Technologies for Developing Privacy-Aware Software. RE Workshops 2016: 86-91 - [c77]Hironori Washizaki
, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takehisa Kato, Shinpei Ogata
, Haruhiko Kaiya, Eduardo B. Fernández
, Hideyuki Kanuka
, Yuki Kondo, Nobukazu Yoshioka
, Takao Okubo, Atsuo Hazeyama:
A Metamodel for Security and Privacy Knowledge in Cloud Services. SERVICES 2016: 142-143 - [c76]Haruhiko Kaiya, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Atsuo Hazeyama:
Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models. SoMeT 2016: 155-166 - 2015
- [j12]Seiji Munetoh
, Nobukazu Yoshioka:
Method Using Command Abstraction Library for Iterative Testing Security of Web Applications. Int. J. Secur. Softw. Eng. 6(3): 26-49 (2015) - [j11]Takanori Sasaki, Nobukazu Yoshioka, Yasuyuki Tahara, Akihiko Ohsuga:
A Method for Efficient Extensibility Improvements in Embedded Software Evolution. J. Softw. 10(12): 1375-1388 (2015) - [c75]Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka
, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki
, Haruhiko Kaiya, Takao Okubo:
Case Base for Secure Software Development Using Software Security Knowledge Base. COMPSAC Workshops 2015: 97-103 - [c74]Fuyuki Ishikawa, Nobukazu Yoshioka, Yoshinori Tanabe:
Keys and Roles of Formal Methods Education for Industry: 10 Year Experience with Top SE Program. FMSEE&T@FM 2015: 35-42 - [c73]Takanori Kobashi, Masatoshi Yoshizawa, Hironori Washizaki
, Yoshiaki Fukazawa, Nobukazu Yoshioka
, Takao Okubo, Haruhiko Kaiya:
TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing. ICST 2015: 1-8 - [c72]Masahito Saito, Atsuo Hazeyama, Nobukazu Yoshioka
, Takanori Kobashi, Hironori Washizaki
, Haruhiko Kaiya, Takao Okubo:
A Case-based Management System for Secure Software Development Using Software Security Knowledge. KES 2015: 1092-1100 - [c71]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
:
Patterns for security and privacy in cloud ecosystems. ESPRE 2015: 13-18 - 2014
- [j10]Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takao Okubo, Yoshiaki Fukazawa:
Validating Security Design Pattern Applications by Testing Design Models. Int. J. Secur. Softw. Eng. 5(4): 1-30 (2014) - [j9]Takao Okubo, Kenji Taguchi, Haruhiko Kaiya, Nobukazu Yoshioka
:
MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals. J. Inf. Process. 22(3): 536-546 (2014) - [c70]Masatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki
, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
:
Verifying Implementation of Security Design Patterns Using a Test Template. ARES 2014: 178-183 - [c69]Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya:
Requirements Refinement and Exploration of Architecture for Security and Other NFRs. CAiSE Workshops 2014: 286-298 - [c68]Haruhiko Kaiya, Sho Kono, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, Kenji Kaijiri:
Security Requirements Analysis Using Knowledge in CAPEC. CAiSE Workshops 2014: 343-348 - [c67]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements and analysis of secure systems. CIbSE 2014: 437-450 - [c66]Shigetoshi Yokoyama, Nobukazu Yoshioka
:
A Distributed Cloud Architecture for Academic Community Cloud. CLOSER (Selected Papers) 2014: 169-186 - [c65]Shigetoshi Yokoyama, Nobukazu Yoshioka:
On-demand Cloud Architecture for Academic Community Cloud - Another Approach to Inter-cloud Collaboration. CLOSER 2014: 661-670 - [c64]Takao Okubo, Nobukazu Yoshioka
, Haruhiko Kaiya:
Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View. HASE 2014: 201-205 - [c63]Takanori Sasaki, Nobukazu Yoshioka
, Yasuyuki Tahara, Akihiko Ohsuga:
Evaluation of Flexibility to Changes Focusing on the Variable Structures in Legacy Software. JCKBSE 2014: 252-269 - [c62]Takao Okubo, Yoshio Kakizaki
, Takanori Kobashi, Hironori Washizaki, Shinpei Ogata, Haruhiko Kaiya, Nobukazu Yoshioka:
Security and Privacy Behavior Definition for Behavior Driven Development. PROFES 2014: 306-309 - [c61]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements specification and analysis of secure systems. WER 2014 - [c60]Shigetoshi Yokoyama, Atsushi Matsumoto, Nobukazu Yoshioka
:
Network traffic optimization architecture for scalability in academic inter-cloud computing environments. HotTopiCS@ICPE 2014: 1:1-1:6 - 2013
- [c59]Takanori Kobashi, Nobukazu Yoshioka
, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki
, Yoshiaki Fukazawa:
Validating Security Design Patterns Application Using Model Testing. ARES 2013: 62-71 - [c58]Seiji Munetoh
, Nobukazu Yoshioka
:
Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development. ARES 2013: 350-359 - [c57]Haruhiko Kaiya, Takao Okubo, Nobuyuki Kanaya, Yuji Suzuki, Shinpei Ogata
, Kenji Kaijiri, Nobukazu Yoshioka
:
Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities. CAiSE Workshops 2013: 478-489 - [c56]Seiji Munetoh
, Nobukazu Yoshioka
:
RAILROADMAP: An Agile Security Testing Framework for Web-application Development. ICST 2013: 491-492 - 2012
- [j8]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns. Int. J. Secur. Softw. Eng. 3(1): 37-61 (2012) - [c55]Shigetoshi Yokoyama, Nobukazu Yoshioka
:
Cluster as a Service for Self-Deployable Cloud Applications. CCGRID 2012: 703-704 - [c54]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
:
Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model. COMPSAC Workshops 2012: 367-372 - [c53]Shigetoshi Yokoyama, Nobukazu Yoshioka
, Takahiro Shida:
edubase cloud: cloud platform for cloud education. EduRex@ICSE 2012: 17-20 - [c52]Shigetoshi Yokoyama, Nobukazu Yoshioka
, Takahiro Shida:
Cloud in a cloud for cloud education. PESOS@ICSE 2012: 63-64 - [c51]Shigetoshi Yokoyama, Nobukazu Yoshioka
:
Dodai-Deploy: Fast Cluster Deployment Tool. ICWS 2012: 681-682 - [c50]Gideon D. Bibu, Nobukazu Yoshioka
, Julian A. Padget
:
System security requirements analysis with answer set programming. RESS 2012: 10-13 - [c49]Shigetoshi Yokoyama, Nobukazu Yoshioka
:
An Academic Community Cloud Architecture for Science Applications. SAINT 2012: 108-112 - [c48]Yoshiyuki Asai, Takeshi Abe
, Masao Okita, Tomohiro Okuyama, Nobukazu Yoshioka
, Shigetoshi Yokoyama, Masaru Nagaku, Kenichi Hagihara, Hiroaki Kitano:
Multilevel Modeling of Physiological Systems and Simulation Platform: PhysioDesigner, Flint and Flint K3 Service. SAINT 2012: 215-219 - [c47]Shigetoshi Yokoyama, Nobukazu Yoshioka
, Motonobu Ichimura:
A Network-Aware Object Storage Service. SC Companion 2012: 556-561 - 2011
- [j7]Shunichiro Suenaga, Nobukazu Yoshioka
, Shinichi Honiden:
Group Migration by Mobile Agents in Wireless Sensor Networks. Comput. J. 54(3): 345-355 (2011) - [c46]Eduardo B. Fernández
, Hironori Washizaki
, Nobukazu Yoshioka
, Michael VanHilst:
An Approach to Model-based Development of Secure and Reliable Systems. ARES 2011: 260-265 - [c45]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
:
Effective Security Impact Analysis with Patterns for Software Enhancement. ARES 2011: 527-534 - [c44]Eduardo B. Fernández
, Nobukazu Yoshioka
:
Two patterns for distributed systems: enterprise service bus (ESB) and distributed publish/subscribe. PLoP 2011: 8:1-8:10 - [c43]Hiroyuki Nakagawa
, Nobukazu Yoshioka
, Akihiko Ohsuga, Shinichi Honiden:
IMPULSE: a design framework for multi-agent systems based on model transformation. SAC 2011: 1411-1418 - [c42]Keiko Hashizume, Eduardo B. Fernández, Nobukazu Yoshioka:
Misuse Patterns for Cloud Computing. SEKE 2011: 683-686 - [c41]Takafumi Komoto, Kenji Taguchi, Haralambos Mouratidis
, Nobukazu Yoshioka
, Kokichi Futatsugi:
A Modelling Framework to Support Internal Control. SSIRI (Companion) 2011: 187-193 - 2010
- [c40]Yuki Shiroma, Hironori Washizaki
, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka
:
Model-Driven Security Patterns Application Based on Dependences among Patterns. ARES 2010: 555-559 - [c39]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
, Michael VanHilst:
Measuring the Level of Security Introduced by Security Patterns. ARES 2010: 565-568 - [c38]Benjamin Schleinzer, Nobukazu Yoshioka
:
A security pattern for data integrity in P2P systems. PLoP 2010: 17:1-17:5 - [c37]Hiroyuki Nakagawa
, Nobukazu Yoshioka
, Akihiko Ohsuga, Shinichi Honiden:
A Framework for Validating Task Assignment in Multiagent Systems Using Requirements Importance. PRIMA 2010: 443-458 - [c36]Kenji Taguchi, Nobukazu Yoshioka
, Takayuki Tobita, Hiroyuki Kaneko:
Aligning Security Requirements and Security Assurance Using the Common Criteria. SSIRI 2010: 69-77
2000 – 2009
- 2009
- [j6]Yasuyuki Tahara, Nobukazu Yoshioka
, Kenji Taguchi, Toshiaki Aoki
, Shinichi Honiden:
Evolution of a course on model checking for practical applications. ACM SIGCSE Bull. 41(2): 38-44 (2009) - [c35]