Stop the war!
Остановите войну!
for scientists:
default search action
Nobukazu Yoshioka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j29]Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection Methods. IEEE Access 12: 78193-78218 (2024) - [j28]Hironori Takeuchi, Jati H. Husen, Hnin Thandar Tun, Hironori Washizaki, Nobukazu Yoshioka:
Enterprise architecture-based metamodel for machine learning projects and its management. Future Gener. Comput. Syst. 161: 135-145 (2024) - [j27]Kensuke Sumoto, Kenta Kanakogi, Hironori Washizaki, Naohiko Tsuda, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hideyuki Kanuka:
Automated Labeling of Entities in CVE Vulnerability Descriptions with Natural Language Processing. IEICE Trans. Inf. Syst. 107(5): 674-682 (2024) - [j26]Jati H. Husen, Hironori Washizaki, Jomphon Runpakprakun, Nobukazu Yoshioka, Hnin Thandar Tun, Yoshiaki Fukazawa, Hironori Takeuchi:
Integrated multi-view modeling for reliable machine learning-intensive software engineering. Softw. Qual. J. 32(3): 1239-1285 (2024) - [c134]Junji Hashimoto, Nobukazu Yoshioka:
A Domain Specific Language for Specification of Risk-oriented Object Detection Requirements. CAIN 2024: 267-268 - [c133]Hironori Washizaki, Nobukazu Yoshioka:
AI Security Continuum: Concept and Challenges. CAIN 2024: 269-270 - [c132]Jati H. Husen, Jomphon Runpakprakun, Sun Chang, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Evaluation of The Generality of Multi-view Modeling Framework for ML Systems. CAIN 2024: 284-285 - [c131]Hiroshi Tanaka, Masaru Ide, Jun Yajima, Sachiko Onodera, Kazuki Munakata, Nobukazu Yoshioka:
Taxonomy of Generative AI Applications for Risk Assessment. CAIN 2024: 288-289 - [c130]Yuya Sasaki, Hironori Washizaki, Jialong Li, Dominik Sander, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Systematic Literature Review of Prompt Engineering Patterns in Software Engineering. COMPSAC 2024: 670-675 - [c129]Paolo Arcaini, Fuyuki Ishikawa, Lei Ma, Yuta Maezawa, Nobukazu Yoshioka, Fuyuan Zhang:
Technical Briefing on Deep Neural Network Repair. ICSE Companion 2024: 428-430 - [c128]Xingfang Wu, Heng Li, Nobukazu Yoshioka, Hironori Washizaki, Foutse Khomh:
Refining GPT-3 Embeddings with a Siamese Structure for Technical Post Duplicate Detection. SANER 2024: 114-125 - 2023
- [j25]Jun Yajima, Maki Inui, Takanori Oikawa, Fumiyoshi Kasahara, Kentaro Tsuji, Ikuya Morikawa, Nobukazu Yoshioka:
ASRA-Q: AI Security Risk Assessment by Selective Questions. J. Inf. Process. 31: 654-666 (2023) - [c127]Weitao Pan, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa, Foutse Khomh, Yann-Gaël Guéhéneuc:
A Machine Learning Based Approach to Detect Machine Learning Design Patterns. APSEC 2023: 574-578 - [c126]Jati H. Husen, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hironori Takeuchi, Hiroshi Tanaka, Kazuki Munakata:
Extensible Modeling Framework for Reliable Machine Learning System Analysis. CAIN 2023: 94-95 - [c125]Hiroshi Tanaka, Masaru Ide, Kazuki Munakata, Hironori Washizaki, Nobukazu Yoshioka:
Activity-based modeling strategy for reliable machine learning system analysis targeting GUI-based applications. DSA 2023: 135-143 - [c124]Scott Lupton, Lena Yu, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Assessment of Real-World Incident Detection Through a Component-Based Online Log Anomaly Detection Pipeline Framework. DSA 2023: 477-478 - [c123]Takuma Tsuchida, Rikuho Miyata, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Automatic Detection of Abstract-Concrete Relationships between Attack Patterns of ATT&CK and CAPEC with Fine-tuned BERT. DSA 2023: 589-590 - [c122]Jomphon Runpakprakun, Jati H. Husen, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Towards Integrated Model-Based Machine Learning Experimentation Framework. DSA 2023: 593-594 - [c121]Hironori Takeuchi, Jati H. Husen, Hnin Thandar Tun, Hironori Washizaki, Nobukazu Yoshioka:
Enterprise Architecture-based Metamodel for a Holistic Business - IT Alignment View on Machine Learning Projects. ICEBE 2023: 8-15 - [c120]Rikuho Miyata, Hironori Washizaki, Kensuke Sumoto, Nobukazu Yoshioka, Yoshiaki Fukazawa, Takao Okubo:
Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure. SVM 2023: 14-17 - [c119]Masaomi Yamaguchi, Nobukazu Yoshioka:
Design by Contract Framework for Quantum Software. Q-SE@ICSE 2023: 24-25 - [c118]Jati H. Husen, Hironori Washizaki, Nobukazu Yoshioka, Hnin Thandar Tun, Yoshiaki Fukazawa, Hironori Takeuchi:
Metamodel-Based Multi-View Modeling Framework for Machine Learning Systems. MODELSWARD 2023: 194-201 - [c117]Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Log Drift Impact on Online Anomaly Detection Workflows. PROFES (1) 2023: 267-283 - [i5]Masaomi Yamaguchi, Nobukazu Yoshioka:
Design by Contract Framework for Quantum Software. CoRR abs/2303.17750 (2023) - [i4]Xingfang Wu, Heng Li, Nobukazu Yoshioka, Hironori Washizaki, Foutse Khomh:
Refining GPT-3 Embeddings with a Siamese Structure for Technical Post Duplicate Detection. CoRR abs/2312.15068 (2023) - 2022
- [j24]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns and the design of secure systems. Cybersecur. 5(1): 7 (2022) - [j23]Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, Bashar Nuseibeh:
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. IEEE Trans. Software Eng. 48(2): 120-134 (2022) - [c116]Jati H. Husen, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hironori Takeuchi:
Traceable business-to-safety analysis framework for safety-critical machine learning systems. CAIN 2022: 50-51 - [c115]Jun Yajima, Maki Inui, Takanori Oikawa, Fumiyoshi Kasahara, Ikuya Morikawa, Nobukazu Yoshioka:
A new approach for machine learning security risk assessment: work in progress. CAIN 2022: 52-53 - [c114]Kensuke Sumoto, Kenta Kanakogi, Hironori Washizaki, Naohiko Tsuda, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hideyuki Kanuka:
Automatic labeling of the elements of a vulnerability report CVE with NLP. IRI 2022: 164-165 - [c113]Tomoko Kaneko, Yuji Takahashi, Shinichi Yamaguchi, Jyunji Hashimoto, Nobukazu Yoshioka:
Safety and Risk Analysis and Evaluation Methods for DNN Systems in Automated Driving. JCKBSE 2022: 83-96 - [c112]Jati H. Husen, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Modeling tool for managing canvas-based models traceability in ML system development. MoDELS (Companion) 2022: 77-78 - [c111]Xun Zhang, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Detecting Design Patterns in UML Class Diagram Images using Deep Learning. SNPD 2022: 27-32 - 2021
- [j22]Tomoko Kaneko, Nobukazu Yoshioka:
CC-Case-Safety and Security Engineering Methodology. Int. J. Syst. Softw. Secur. Prot. 12(1): 1-20 (2021) - [j21]Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández, Takehisa Kato, Hideyuki Kanuka, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development. Int. J. Syst. Softw. Secur. Prot. 12(2): 68-85 (2021) - [j20]Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G. Priyalakshmi:
Systematic Literature Review of Security Pattern Research. Inf. 12(1): 36 (2021) - [j19]Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka:
Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques. Inf. 12(8): 298 (2021) - [j18]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Takao Okubo:
The design of secure IoT applications using patterns: State of the art and directions for research. Internet Things 15: 100408 (2021) - [c110]Nobukazu Yoshioka, Jati H. Husen, Hnin Thandar Tun, Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:
Landscape of Requirements Engineering for Machine Learning-based AI Systems. APSEC Workshops 2021: 5-8 - [c109]Hnin Thandar Tun, Jati H. Husen, Nobukazu Yoshioka, Hironori Washizaki, Yoshiaki Fukazawa:
Goal-Centralized Metamodel Based Requirements Integration for Machine Learning Systems. APSEC Workshops 2021: 13-16 - [c108]Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Literature Review on Log Anomaly Detection Approaches Utilizing Online Parsing Methodology. APSEC 2021: 559-563 - [c107]Yasuhiro Watanabe, Hironori Washizaki, Kazunori Sakamoto, Daisuke Saito, Kiyoshi Honda, Naohiko Tsuda, Yoshiaki Fukazawa, Nobukazu Yoshioka:
Preliminary Literature Review of Machine Learning System Development Practices. COMPSAC 2021: 1407-1408 - [c106]Hironori Takeuchi, Takuo Doi, Hironori Washizaki, Satoshi Okuda, Nobukazu Yoshioka:
Enterprise Architecture based Representation of Architecture and Design Patterns for Machine Learning Systems. EDOC Workshops 2021: 245-250 - [c105]Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka:
Tracing CAPEC Attack Patterns from CVE Vulnerability Information using Natural Language Processing Technique. HICSS 2021: 1-9 - [c104]Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Online Log Parsing: Preliminary Literature Review. ISSRE Workshops 2021: 304-305 - [c103]Takuto Yamauchi, Takanori Hirano, Jialong Li, Takafumi Kawasaki, Yin Chen, Akira Tsuge, Tadashi Okoshi, Jin Nakazawa, Nobukazu Yoshioka, Georgios Palaiokrassas, Antonios Litke, Kenji Tei:
A Development Method for Safe Node-RED Systems using Discrete Controller Synthesis. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 130-137 - [c102]Jati H. Husen, Hnin Thandar Tun, Nobukazu Yoshioka, Hironori Washizaki, Yoshiaki Fukazawa:
Goal-Oriented Machine Learning-Based Component Development Process. MoDELS (Companion) 2021: 643-644 - [c101]Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:
Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST). QRS Companion 2021: 806-815 - [c100]Hironori Washizaki, Atsuo Hazeyama, Takao Okubo, Hideyuki Kanuka, Shinpei Ogata, Nobukazu Yoshioka:
Analysis of IoT Pattern Descriptions. SERP4IoT 2021: 21-26 - [e1]Nobukazu Yoshioka, Hironori Washizaki, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto, Fuyuki Ishikawa, Foutse Khomh, Giuliano Antoniol:
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), Nara, Japan, December 4, 2018. CEUR Workshop Proceedings 2809, CEUR-WS.org 2021 [contents] - 2020
- [j17]Hironori Washizaki, Shinpei Ogata, Atsuo Hazeyama, Takao Okubo, Eduardo B. Fernández, Nobukazu Yoshioka:
Landscape of Architecture and Design Patterns for IoT Systems. IEEE Internet Things J. 7(10): 10091-10101 (2020) - [c99]Hironori Washizaki, Kenji Tei, Kazunori Ueda, Hayato Yamana, Yoshiaki Fukazawa, Shinichi Honiden, Shoichi Okazaki, Nobukazu Yoshioka, Naoshi Uchihira:
Smart SE: Smart Systems and Services Innovative Professional Education Program. COMPSAC 2020: 1113-1114 - [c98]Takafumi Komoto, Kokichi Futatsugi, Nobukazu Yoshioka:
A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each Department. COMPSAC 2020: 1783-1788 - [c97]Haruhiko Kaiya, Wataru Fujita, Ryotaro Yamada, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling. JCKBSE 2020: 70-83 - [c96]Tomoko Kaneko, Nobukazu Yoshioka:
STAMP S&S: Layered Modeling for the Complexed System in the Society of AI/IoT. JCKBSE 2020: 122-131 - [c95]Haruhiko Kaiya, Shogo Tatsui, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
A Tool to Manage Traceability on Several Models and Its Use Case. KES 2020: 1449-1458 - [c94]Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:
STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT. QRS Companion 2020: 168-175
2010 – 2019
- 2019
- [c93]Fuyuki Ishikawa, Nobukazu Yoshioka:
How do engineers perceive difficulties in engineering of machine-learning systems?: questionnaire survey. CESSER-IP@ICSE 2019: 2-9 - [c92]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT patterns. SERP4IoT@ICSE 2019: 57-60 - [c91]Haruhiko Kaiya, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques. KES 2019: 1075-1084 - [c90]Atsuo Hazeyama, Hikaru Miyahara, Takafumi Tanaka, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo, Nobukazu Yoshioka:
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base. RE Workshops 2019: 134-140 - [p1]Yijun Yu, Nobukazu Yoshioka, Tetsuo Tamai:
Assessing Security and Privacy Behavioural Risks for Self-Protection Systems. Engineering Adaptive Software Systems 2019: 135-147 - [i3]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT Patterns. CoRR abs/1902.09718 (2019) - [i2]Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, Bashar Nuseibeh:
Incidents Are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. CoRR abs/1907.00199 (2019) - [i1]Yasuhiro Watanabe, Hironori Washizaki, Kazunori Sakamoto, Daisuke Saito, Kiyoshi Honda, Naohiko Tsuda, Yoshiaki Fukazawa, Nobukazu Yoshioka:
Preliminary Systematic Literature Review of Machine Learning System Development Process. CoRR abs/1910.05528 (2019) - 2018
- [j16]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka:
Using Security Patterns to Develop Secure Systems - Ten Years Later. Int. J. Syst. Softw. Secur. Prot. 9(4): 46-57 (2018) - [c89]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki:
Evaluating the degree of security of a system built using security patterns. ARES 2018: 43:1-43:8 - [c88]Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto:
Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild. WESPr-iMLSE@APSEC 2018: 1-2 - [c87]Fuyuki Ishikawa, Foutse Khomh, Nobukazu Yoshioka, Giuliano Antoniol:
Report of iMLSE-18: the 1st International Workshop on Machine Learning Systems Engineering. WESPr-iMLSE@APSEC 2018: 3-4 - [c86]Hua Cai, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes. WESPr-iMLSE@APSEC 2018: 18-25 - [c85]Eduardo B. Fernández, Nobukazu Yoshioka:
Using a variety of patterns in a secure software development methodology. WESPr-iMLSE@APSEC 2018: 26-32 - [c84]Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka:
Security Requirement Modeling Support System Using Software Security Knowledge Base. COMPSAC (2) 2018: 234-239 - [c83]Tian Xia, Hironori Washizaki, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services. MODELSWARD 2018: 379-386 - 2017
- [j15]Yijun Yu, Haruhiko Kaiya, Nobukazu Yoshioka, Zhenjiang Hu, Hironori Washizaki, Yingfei Xiong, Amin Hosseinian Far:
Goal Modelling for Security Problem Matching and Pattern Enforcement. Int. J. Secur. Softw. Eng. 8(3): 42-57 (2017) - [c82]Haruhiko Kaiya, Nobukazu Yoshioka, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata, Takafumi Tanaka:
Eliciting Requirements for Improving Users' Behavior Using Transparency. APRES 2017: 41-56 - [c81]Haruhiko Kaiya, Ryohei Sato, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Takafumi Tanaka, Nobukazu Yoshioka, Hironori Washizaki:
Preliminary Systematic Literature Review of Software and Systems Traceability. KES 2017: 1141-1150 - 2016
- [j14]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Madiha H. Syed:
Modeling and Security in Cloud Ecosystems. Future Internet 8(2): 13 (2016) - [j13]Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Implementation Support of Security Design Patterns Using Test Templates . Inf. 7(2): 34 (2016) - [c80]Shigetoshi Yokoyama, Yoshinobu Masatani, Tazro Ohta, Osamu Ogasawara, Nobukazu Yoshioka, Kai Liu, Kento Aida:
Reproducible Scientific Computing Environment with Overlay Cloud Architecture. CLOUD 2016: 774-781 - [c79]Takafumi Komoto, Kokichi Futatsugi, Nobukazu Yoshioka:
Assessing Business Processes by Checking Transaction Documents for Inconsistency Risks and a Tool for Risk Assessment. BMSD 2016: 70-82 - [c78]Atsuo Hazeyama, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo:
Literature Survey on Technologies for Developing Privacy-Aware Software. RE Workshops 2016: 86-91 - [c77]Hironori Washizaki, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takehisa Kato, Shinpei Ogata, Haruhiko Kaiya, Eduardo B. Fernández, Hideyuki Kanuka, Yuki Kondo, Nobukazu Yoshioka, Takao Okubo, Atsuo Hazeyama:
A Metamodel for Security and Privacy Knowledge in Cloud Services. SERVICES 2016: 142-143 - [c76]Haruhiko Kaiya, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Atsuo Hazeyama:
Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models. SoMeT 2016: 155-166 - 2015
- [j12]Seiji Munetoh, Nobukazu Yoshioka:
Method Using Command Abstraction Library for Iterative Testing Security of Web Applications. Int. J. Secur. Softw. Eng. 6(3): 26-49 (2015) - [j11]Takanori Sasaki, Nobukazu Yoshioka, Yasuyuki Tahara, Akihiko Ohsuga:
A Method for Efficient Extensibility Improvements in Embedded Software Evolution. J. Softw. 10(12): 1375-1388 (2015) - [c75]Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo:
Case Base for Secure Software Development Using Software Security Knowledge Base. COMPSAC Workshops 2015: 97-103 - [c74]Fuyuki Ishikawa, Nobukazu Yoshioka, Yoshinori Tanabe:
Keys and Roles of Formal Methods Education for Industry: 10 Year Experience with Top SE Program. FMSEE&T@FM 2015: 35-42 - [c73]Takanori Kobashi, Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya:
TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing. ICST 2015: 1-8 - [c72]Masahito Saito, Atsuo Hazeyama, Nobukazu Yoshioka, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo:
A Case-based Management System for Secure Software Development Using Software Security Knowledge. KES 2015: 1092-1100 - [c71]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki:
Patterns for security and privacy in cloud ecosystems. ESPRE 2015: 13-18 - 2014
- [j10]Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takao Okubo, Yoshiaki Fukazawa:
Validating Security Design Pattern Applications by Testing Design Models. Int. J. Secur. Softw. Eng. 5(4): 1-30 (2014) - [j9]Takao Okubo, Kenji Taguchi, Haruhiko Kaiya, Nobukazu Yoshioka:
MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals. J. Inf. Process. 22(3): 536-546 (2014) - [c70]Masatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Verifying Implementation of Security Design Patterns Using a Test Template. ARES 2014: 178-183 - [c69]Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya:
Requirements Refinement and Exploration of Architecture for Security and Other NFRs. CAiSE Workshops 2014: 286-298 - [c68]Haruhiko Kaiya, Sho Kono, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, Kenji Kaijiri:
Security Requirements Analysis Using Knowledge in CAPEC. CAiSE Workshops 2014: 343-348 - [c67]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements and analysis of secure systems. CIbSE 2014: 437-450 - [c66]Shigetoshi Yokoyama, Nobukazu Yoshioka:
A Distributed Cloud Architecture for Academic Community Cloud. CLOSER (Selected Papers) 2014: 169-186 - [c65]Shigetoshi Yokoyama, Nobukazu Yoshioka:
On-demand Cloud Architecture for Academic Community Cloud - Another Approach to Inter-cloud Collaboration. CLOSER 2014: 661-670 - [c64]Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya:
Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View. HASE 2014: 201-205 - [c63]Takanori Sasaki, Nobukazu Yoshioka, Yasuyuki Tahara, Akihiko Ohsuga:
Evaluation of Flexibility to Changes Focusing on the Variable Structures in Legacy Software. JCKBSE 2014: 252-269 - [c62]Takao Okubo, Yoshio Kakizaki, Takanori Kobashi, Hironori Washizaki, Shinpei Ogata, Haruhiko Kaiya, Nobukazu Yoshioka:
Security and Privacy Behavior Definition for Behavior Driven Development. PROFES 2014: 306-309 - [c61]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements specification and analysis of secure systems. WER 2014 - [c60]Shigetoshi Yokoyama, Atsushi Matsumoto, Nobukazu Yoshioka:
Network traffic optimization architecture for scalability in academic inter-cloud computing environments. HotTopiCS@ICPE 2014: 1:1-1:6 - 2013
- [c59]Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Yoshiaki Fukazawa:
Validating Security Design Patterns Application Using Model Testing. ARES 2013: 62-71 - [c58]Seiji Munetoh, Nobukazu Yoshioka:
Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development. ARES 2013: 350-359 - [c57]Haruhiko Kaiya, Takao Okubo, Nobuyuki Kanaya, Yuji Suzuki, Shinpei Ogata, Kenji Kaijiri, Nobukazu Yoshioka:
Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities. CAiSE Workshops 2013: 478-489 - [c56]Seiji Munetoh, Nobukazu Yoshioka:
RAILROADMAP: An Agile Security Testing Framework for Web-application Development. ICST 2013: 491-492 - 2012
- [j8]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns. Int. J. Secur. Softw. Eng. 3(1): 37-61 (2012) - [c55]