


default search action
Nobukazu Yoshioka
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Scott Lupton
, Hironori Washizaki
, Nobukazu Yoshioka, Yoshiaki Fukazawa
:
Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection Methods. IEEE Access 12: 78193-78218 (2024) - [j28]Hironori Takeuchi
, Jati H. Husen, Hnin Thandar Tun, Hironori Washizaki, Nobukazu Yoshioka:
Enterprise architecture-based metamodel for machine learning projects and its management. Future Gener. Comput. Syst. 161: 135-145 (2024) - [j27]Kensuke Sumoto, Kenta Kanakogi, Hironori Washizaki, Naohiko Tsuda, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hideyuki Kanuka:
Automated Labeling of Entities in CVE Vulnerability Descriptions with Natural Language Processing. IEICE Trans. Inf. Syst. 107(5): 674-682 (2024) - [j26]Jati H. Husen, Hironori Washizaki, Jomphon Runpakprakun, Nobukazu Yoshioka, Hnin Thandar Tun, Yoshiaki Fukazawa, Hironori Takeuchi:
Integrated multi-view modeling for reliable machine learning-intensive software engineering. Softw. Qual. J. 32(3): 1239-1285 (2024) - [c137]Junji Hashimoto
, Nobukazu Yoshioka
:
A Domain Specific Language for Specification of Risk-oriented Object Detection Requirements. CAIN 2024: 267-268 - [c136]Hironori Washizaki
, Nobukazu Yoshioka
:
AI Security Continuum: Concept and Challenges. CAIN 2024: 269-270 - [c135]Jati H. Husen
, Jomphon Runpakprakun
, Sun Chang
, Hironori Washizaki
, Hnin Thandar Tun
, Nobukazu Yoshioka
, Yoshiaki Fukazawa
:
Evaluation of The Generality of Multi-view Modeling Framework for ML Systems. CAIN 2024: 284-285 - [c134]Hiroshi Tanaka
, Masaru Ide
, Jun Yajima
, Sachiko Onodera
, Kazuki Munakata
, Nobukazu Yoshioka
:
Taxonomy of Generative AI Applications for Risk Assessment. CAIN 2024: 288-289 - [c133]Yuya Sasaki, Hironori Washizaki, Jialong Li, Dominik Sander, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Systematic Literature Review of Prompt Engineering Patterns in Software Engineering. COMPSAC 2024: 670-675 - [c132]Paolo Arcaini
, Fuyuki Ishikawa
, Lei Ma
, Yuta Maezawa
, Nobukazu Yoshioka
, Fuyuan Zhang
:
Technical Briefing on Deep Neural Network Repair. ICSE Companion 2024: 428-430 - [c131]Hironori Washizaki, Nobukazu Yoshioka:
AI Engineering Continuum: Concept and Expected Foundation. IISA 2024: 1-4 - [c130]Scott Lupton, Hironori Washizaki, Naoyasu Ubayashi, Nobukazu Yoshioka:
n-Pipeline Log Anomaly Detection Drift Mitigation. ISSRE (Workshops) 2024: 117-118 - [c129]Takumi Ayukawa, Jati H. Husen, Nobukazu Yoshioka, Hironori Washizaki, Naoyasu Ubayashi:
Toward Pattern-Oriented Machine Learning Reliability Argumentation. ISSRE (Workshops) 2024: 121-122 - [c128]Xingfang Wu, Heng Li, Nobukazu Yoshioka, Hironori Washizaki, Foutse Khomh:
Refining GPT-3 Embeddings with a Siamese Structure for Technical Post Duplicate Detection. SANER 2024: 114-125 - [i6]Haowei Cheng, Jati H. Husen, Sien Reeve Ordonez Peralta, Bowen Jiang, Nobukazu Yoshioka, Naoyasu Ubayashi, Hironori Washizaki:
Generative AI for Requirements Engineering: A Systematic Literature Review. CoRR abs/2409.06741 (2024) - 2023
- [j25]Jun Yajima
, Maki Inui, Takanori Oikawa, Fumiyoshi Kasahara, Kentaro Tsuji, Ikuya Morikawa, Nobukazu Yoshioka:
ASRA-Q: AI Security Risk Assessment by Selective Questions. J. Inf. Process. 31: 654-666 (2023) - [c127]Weitao Pan, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa, Foutse Khomh, Yann-Gaël Guéhéneuc:
A Machine Learning Based Approach to Detect Machine Learning Design Patterns. APSEC 2023: 574-578 - [c126]Jati H. Husen
, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hironori Takeuchi, Hiroshi Tanaka
, Kazuki Munakata:
Extensible Modeling Framework for Reliable Machine Learning System Analysis. CAIN 2023: 94-95 - [c125]Hiroshi Tanaka
, Masaru Ide, Kazuki Munakata, Hironori Washizaki, Nobukazu Yoshioka:
Activity-based modeling strategy for reliable machine learning system analysis targeting GUI-based applications. DSA 2023: 135-143 - [c124]Scott Lupton, Lena Yu, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Assessment of Real-World Incident Detection Through a Component-Based Online Log Anomaly Detection Pipeline Framework. DSA 2023: 477-478 - [c123]Takuma Tsuchida, Rikuho Miyata, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Automatic Detection of Abstract-Concrete Relationships between Attack Patterns of ATT&CK and CAPEC with Fine-tuned BERT. DSA 2023: 589-590 - [c122]Jomphon Runpakprakun, Jati H. Husen
, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Towards Integrated Model-Based Machine Learning Experimentation Framework. DSA 2023: 593-594 - [c121]Hironori Takeuchi, Jati H. Husen, Hnin Thandar Tun, Hironori Washizaki, Nobukazu Yoshioka:
Enterprise Architecture-based Metamodel for a Holistic Business - IT Alignment View on Machine Learning Projects. ICEBE 2023: 8-15 - [c120]Rikuho Miyata, Hironori Washizaki, Kensuke Sumoto, Nobukazu Yoshioka, Yoshiaki Fukazawa, Takao Okubo:
Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure. SVM 2023: 14-17 - [c119]Masaomi Yamaguchi
, Nobukazu Yoshioka:
Design by Contract Framework for Quantum Software. Q-SE@ICSE 2023: 24-25 - [c118]Jati H. Husen, Hironori Washizaki, Nobukazu Yoshioka, Hnin Thandar Tun, Yoshiaki Fukazawa, Hironori Takeuchi:
Metamodel-Based Multi-View Modeling Framework for Machine Learning Systems. MODELSWARD 2023: 194-201 - [c117]Scott Lupton
, Hironori Washizaki
, Nobukazu Yoshioka
, Yoshiaki Fukazawa
:
Log Drift Impact on Online Anomaly Detection Workflows. PROFES (1) 2023: 267-283 - [i5]Masaomi Yamaguchi, Nobukazu Yoshioka:
Design by Contract Framework for Quantum Software. CoRR abs/2303.17750 (2023) - [i4]Xingfang Wu
, Heng Li, Nobukazu Yoshioka, Hironori Washizaki, Foutse Khomh:
Refining GPT-3 Embeddings with a Siamese Structure for Technical Post Duplicate Detection. CoRR abs/2312.15068 (2023) - 2022
- [j24]Eduardo B. Fernández
, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns and the design of secure systems. Cybersecur. 5(1): 7 (2022) - [j23]Faeq Alrimawi
, Liliana Pasquale
, Deepak Mehta, Nobukazu Yoshioka
, Bashar Nuseibeh
:
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. IEEE Trans. Software Eng. 48(2): 120-134 (2022) - [c116]Jati H. Husen
, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hironori Takeuchi:
Traceable business-to-safety analysis framework for safety-critical machine learning systems. CAIN 2022: 50-51 - [c115]Jun Yajima
, Maki Inui, Takanori Oikawa, Fumiyoshi Kasahara, Ikuya Morikawa, Nobukazu Yoshioka:
A new approach for machine learning security risk assessment: work in progress. CAIN 2022: 52-53 - [c114]Kensuke Sumoto, Kenta Kanakogi, Hironori Washizaki, Naohiko Tsuda, Nobukazu Yoshioka, Yoshiaki Fukazawa, Hideyuki Kanuka:
Automatic labeling of the elements of a vulnerability report CVE with NLP. IRI 2022: 164-165 - [c113]Tomoko Kaneko, Yuji Takahashi, Shinichi Yamaguchi, Jyunji Hashimoto, Nobukazu Yoshioka:
Safety and Risk Analysis and Evaluation Methods for DNN Systems in Automated Driving. JCKBSE 2022: 83-96 - [c112]Jati H. Husen
, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Modeling tool for managing canvas-based models traceability in ML system development. MoDELS (Companion) 2022: 77-78 - [c111]Xun Zhang, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Detecting Design Patterns in UML Class Diagram Images using Deep Learning. SNPD 2022: 27-32 - 2021
- [j22]Tomoko Kaneko, Nobukazu Yoshioka:
CC-Case-Safety and Security Engineering Methodology. Int. J. Syst. Softw. Secur. Prot. 12(1): 1-20 (2021) - [j21]Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández
, Takehisa Kato, Hideyuki Kanuka, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development. Int. J. Syst. Softw. Secur. Prot. 12(2): 68-85 (2021) - [j20]Hironori Washizaki
, Tian Xia
, Natsumi Kamata, Yoshiaki Fukazawa
, Hideyuki Kanuka
, Takehisa Kato
, Masayuki Yoshino, Takao Okubo
, Shinpei Ogata
, Haruhiko Kaiya
, Atsuo Hazeyama
, Takafumi Tanaka, Nobukazu Yoshioka
, G. Priyalakshmi
:
Systematic Literature Review of Security Pattern Research. Inf. 12(1): 36 (2021) - [j19]Kenta Kanakogi, Hironori Washizaki
, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka
, Atsuo Hazeyama
, Nobukazu Yoshioka
:
Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques. Inf. 12(8): 298 (2021) - [j18]Eduardo B. Fernández
, Hironori Washizaki, Nobukazu Yoshioka, Takao Okubo:
The design of secure IoT applications using patterns: State of the art and directions for research. Internet Things 15: 100408 (2021) - [c110]Nobukazu Yoshioka, Jati H. Husen
, Hnin Thandar Tun, Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:
Landscape of Requirements Engineering for Machine Learning-based AI Systems. APSEC Workshops 2021: 5-8 - [c109]Hnin Thandar Tun, Jati H. Husen
, Nobukazu Yoshioka, Hironori Washizaki, Yoshiaki Fukazawa:
Goal-Centralized Metamodel Based Requirements Integration for Machine Learning Systems. APSEC Workshops 2021: 13-16 - [c108]Scott Lupton
, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Literature Review on Log Anomaly Detection Approaches Utilizing Online Parsing Methodology. APSEC 2021: 559-563 - [c107]Yasuhiro Watanabe, Hironori Washizaki, Kazunori Sakamoto, Daisuke Saito, Kiyoshi Honda, Naohiko Tsuda, Yoshiaki Fukazawa, Nobukazu Yoshioka:
Preliminary Literature Review of Machine Learning System Development Practices. COMPSAC 2021: 1407-1408 - [c106]Hironori Takeuchi, Takuo Doi, Hironori Washizaki, Satoshi Okuda, Nobukazu Yoshioka:
Enterprise Architecture based Representation of Architecture and Design Patterns for Machine Learning Systems. EDOC Workshops 2021: 245-250 - [c105]Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka:
Tracing CAPEC Attack Patterns from CVE Vulnerability Information using Natural Language Processing Technique. HICSS 2021: 1-9 - [c104]Scott Lupton
, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Online Log Parsing: Preliminary Literature Review. ISSRE Workshops 2021: 304-305 - [c103]Takuto Yamauchi, Takanori Hirano, Jialong Li, Takafumi Kawasaki, Yin Chen, Akira Tsuge, Tadashi Okoshi, Jin Nakazawa, Nobukazu Yoshioka, Georgios Palaiokrassas, Antonios Litke, Kenji Tei:
A Development Method for Safe Node-RED Systems using Discrete Controller Synthesis. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 130-137 - [c102]Jati H. Husen
, Hnin Thandar Tun, Nobukazu Yoshioka, Hironori Washizaki, Yoshiaki Fukazawa:
Goal-Oriented Machine Learning-Based Component Development Process. MoDELS (Companion) 2021: 643-644 - [c101]Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:
Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST). QRS Companion 2021: 806-815 - [c100]Hironori Washizaki, Atsuo Hazeyama, Takao Okubo, Hideyuki Kanuka, Shinpei Ogata, Nobukazu Yoshioka:
Analysis of IoT Pattern Descriptions. SERP4IoT 2021: 21-26 - [e1]Nobukazu Yoshioka, Hironori Washizaki, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto, Fuyuki Ishikawa, Foutse Khomh, Giuliano Antoniol:
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), Nara, Japan, December 4, 2018. CEUR Workshop Proceedings 2809, CEUR-WS.org 2021 [contents] - 2020
- [j17]Hironori Washizaki
, Shinpei Ogata
, Atsuo Hazeyama, Takao Okubo, Eduardo B. Fernández
, Nobukazu Yoshioka
:
Landscape of Architecture and Design Patterns for IoT Systems. IEEE Internet Things J. 7(10): 10091-10101 (2020) - [c99]Hironori Washizaki, Kenji Tei, Kazunori Ueda, Hayato Yamana
, Yoshiaki Fukazawa, Shinichi Honiden, Shoichi Okazaki, Nobukazu Yoshioka, Naoshi Uchihira
:
Smart SE: Smart Systems and Services Innovative Professional Education Program. COMPSAC 2020: 1113-1114 - [c98]Takafumi Komoto, Kokichi Futatsugi, Nobukazu Yoshioka:
A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each Department. COMPSAC 2020: 1783-1788 - [c97]Haruhiko Kaiya, Wataru Fujita, Ryotaro Yamada, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling. JCKBSE 2020: 70-83 - [c96]Tomoko Kaneko
, Nobukazu Yoshioka
:
STAMP S&S: Layered Modeling for the Complexed System in the Society of AI/IoT. JCKBSE 2020: 122-131 - [c95]Haruhiko Kaiya, Shogo Tatsui, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
A Tool to Manage Traceability on Several Models and Its Use Case. KES 2020: 1449-1458 - [c94]Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:
STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT. QRS Companion 2020: 168-175
2010 – 2019
- 2019
- [c93]Fuyuki Ishikawa, Nobukazu Yoshioka:
How do engineers perceive difficulties in engineering of machine-learning systems?: questionnaire survey. CESSER-IP@ICSE 2019: 2-9 - [c92]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata
, Takao Okubo, Eduardo B. Fernández
:
Landscape of IoT patterns. SERP4IoT@ICSE 2019: 57-60 - [c91]Haruhiko Kaiya, Atsuo Hazeyama, Shinpei Ogata
, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques. KES 2019: 1075-1084 - [c90]Atsuo Hazeyama, Hikaru Miyahara, Takafumi Tanaka, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo, Nobukazu Yoshioka:
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base. RE Workshops 2019: 134-140 - [p1]Yijun Yu
, Nobukazu Yoshioka, Tetsuo Tamai:
Assessing Security and Privacy Behavioural Risks for Self-Protection Systems. Engineering Adaptive Software Systems 2019: 135-147 - [i3]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT Patterns. CoRR abs/1902.09718 (2019) - [i2]Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, Bashar Nuseibeh:
Incidents Are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. CoRR abs/1907.00199 (2019) - [i1]Yasuhiro Watanabe, Hironori Washizaki, Kazunori Sakamoto, Daisuke Saito, Kiyoshi Honda, Naohiko Tsuda, Yoshiaki Fukazawa, Nobukazu Yoshioka:
Preliminary Systematic Literature Review of Machine Learning System Development Process. CoRR abs/1910.05528 (2019) - 2018
- [j16]Eduardo B. Fernández
, Hironori Washizaki, Nobukazu Yoshioka:
Using Security Patterns to Develop Secure Systems - Ten Years Later. Int. J. Syst. Softw. Secur. Prot. 9(4): 46-57 (2018) - [c89]Eduardo B. Fernández
, Nobukazu Yoshioka, Hironori Washizaki:
Evaluating the degree of security of a system built using security patterns. ARES 2018: 43:1-43:8 - [c88]Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto:
Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild. WESPr-iMLSE@APSEC 2018: 1-2 - [c87]Fuyuki Ishikawa, Foutse Khomh, Nobukazu Yoshioka, Giuliano Antoniol:
Report of iMLSE-18: the 1st International Workshop on Machine Learning Systems Engineering. WESPr-iMLSE@APSEC 2018: 3-4 - [c86]Hua Cai, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes. WESPr-iMLSE@APSEC 2018: 18-25 - [c85]Eduardo B. Fernández, Nobukazu Yoshioka:
Using a variety of patterns in a secure software development methodology. WESPr-iMLSE@APSEC 2018: 26-32 - [c84]Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura
, Seiji Munetoh
, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka:
Security Requirement Modeling Support System Using Software Security Knowledge Base. COMPSAC (2) 2018: 234-239 - [c83]Tian Xia, Hironori Washizaki, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata
, Eduardo B. Fernández
, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto
, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services. MODELSWARD 2018: 379-386 - 2017
- [j15]Yijun Yu
, Haruhiko Kaiya, Nobukazu Yoshioka, Zhenjiang Hu, Hironori Washizaki, Yingfei Xiong, Amin Hosseinian Far
:
Goal Modelling for Security Problem Matching and Pattern Enforcement. Int. J. Secur. Softw. Eng. 8(3): 42-57 (2017) - [c82]Haruhiko Kaiya, Nobukazu Yoshioka
, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata
, Takafumi Tanaka:
Eliciting Requirements for Improving Users' Behavior Using Transparency. APRES 2017: 41-56 - [c81]Haruhiko Kaiya, Ryohei Sato, Atsuo Hazeyama, Shinpei Ogata
, Takao Okubo, Takafumi Tanaka, Nobukazu Yoshioka
, Hironori Washizaki:
Preliminary Systematic Literature Review of Software and Systems Traceability. KES 2017: 1141-1150 - 2016
- [j14]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
, Madiha H. Syed:
Modeling and Security in Cloud Ecosystems. Future Internet 8(2): 13 (2016) - [j13]Masatoshi Yoshizawa, Hironori Washizaki
, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
:
Implementation Support of Security Design Patterns Using Test Templates . Inf. 7(2): 34 (2016) - [c80]Shigetoshi Yokoyama, Yoshinobu Masatani, Tazro Ohta
, Osamu Ogasawara
, Nobukazu Yoshioka, Kai Liu, Kento Aida:
Reproducible Scientific Computing Environment with Overlay Cloud Architecture. CLOUD 2016: 774-781 - [c79]Takafumi Komoto, Kokichi Futatsugi, Nobukazu Yoshioka
:
Assessing Business Processes by Checking Transaction Documents for Inconsistency Risks and a Tool for Risk Assessment. BMSD 2016: 70-82 - [c78]Atsuo Hazeyama, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo:
Literature Survey on Technologies for Developing Privacy-Aware Software. RE Workshops 2016: 86-91 - [c77]Hironori Washizaki
, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takehisa Kato, Shinpei Ogata
, Haruhiko Kaiya, Eduardo B. Fernández
, Hideyuki Kanuka
, Yuki Kondo, Nobukazu Yoshioka
, Takao Okubo, Atsuo Hazeyama:
A Metamodel for Security and Privacy Knowledge in Cloud Services. SERVICES 2016: 142-143 - [c76]Haruhiko Kaiya, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Atsuo Hazeyama:
Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models. SoMeT 2016: 155-166 - 2015
- [j12]Seiji Munetoh
, Nobukazu Yoshioka:
Method Using Command Abstraction Library for Iterative Testing Security of Web Applications. Int. J. Secur. Softw. Eng. 6(3): 26-49 (2015) - [j11]Takanori Sasaki, Nobukazu Yoshioka, Yasuyuki Tahara, Akihiko Ohsuga:
A Method for Efficient Extensibility Improvements in Embedded Software Evolution. J. Softw. 10(12): 1375-1388 (2015) - [c75]Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka
, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki
, Haruhiko Kaiya, Takao Okubo:
Case Base for Secure Software Development Using Software Security Knowledge Base. COMPSAC Workshops 2015: 97-103 - [c74]Fuyuki Ishikawa, Nobukazu Yoshioka, Yoshinori Tanabe:
Keys and Roles of Formal Methods Education for Industry: 10 Year Experience with Top SE Program. FMSEE&T@FM 2015: 35-42 - [c73]Takanori Kobashi, Masatoshi Yoshizawa, Hironori Washizaki
, Yoshiaki Fukazawa, Nobukazu Yoshioka
, Takao Okubo, Haruhiko Kaiya:
TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing. ICST 2015: 1-8 - [c72]Masahito Saito, Atsuo Hazeyama, Nobukazu Yoshioka
, Takanori Kobashi, Hironori Washizaki
, Haruhiko Kaiya, Takao Okubo:
A Case-based Management System for Secure Software Development Using Software Security Knowledge. KES 2015: 1092-1100 - [c71]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
:
Patterns for security and privacy in cloud ecosystems. ESPRE 2015: 13-18 - 2014
- [j10]Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takao Okubo, Yoshiaki Fukazawa:
Validating Security Design Pattern Applications by Testing Design Models. Int. J. Secur. Softw. Eng. 5(4): 1-30 (2014) - [j9]Takao Okubo, Kenji Taguchi, Haruhiko Kaiya, Nobukazu Yoshioka
:
MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals. J. Inf. Process. 22(3): 536-546 (2014) - [c70]Masatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki
, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
:
Verifying Implementation of Security Design Patterns Using a Test Template. ARES 2014: 178-183 - [c69]Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya:
Requirements Refinement and Exploration of Architecture for Security and Other NFRs. CAiSE Workshops 2014: 286-298 - [c68]Haruhiko Kaiya, Sho Kono, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, Kenji Kaijiri:
Security Requirements Analysis Using Knowledge in CAPEC. CAiSE Workshops 2014: 343-348 - [c67]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements and analysis of secure systems. CIbSE 2014: 437-450 - [c66]Shigetoshi Yokoyama, Nobukazu Yoshioka
:
A Distributed Cloud Architecture for Academic Community Cloud. CLOSER (Selected Papers) 2014: 169-186 - [c65]Shigetoshi Yokoyama, Nobukazu Yoshioka:
On-demand Cloud Architecture for Academic Community Cloud - Another Approach to Inter-cloud Collaboration. CLOSER 2014: 661-670 - [c64]Takao Okubo, Nobukazu Yoshioka
, Haruhiko Kaiya:
Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View. HASE 2014: 201-205 - [c63]Takanori Sasaki, Nobukazu Yoshioka
, Yasuyuki Tahara, Akihiko Ohsuga:
Evaluation of Flexibility to Changes Focusing on the Variable Structures in Legacy Software. JCKBSE 2014: 252-269 - [c62]Takao Okubo, Yoshio Kakizaki
, Takanori Kobashi, Hironori Washizaki, Shinpei Ogata, Haruhiko Kaiya, Nobukazu Yoshioka:
Security and Privacy Behavior Definition for Behavior Driven Development. PROFES 2014: 306-309 - [c61]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements specification and analysis of secure systems. WER 2014 - [c60]Shigetoshi Yokoyama, Atsushi Matsumoto, Nobukazu Yoshioka
:
Network traffic optimization architecture for scalability in academic inter-cloud computing environments. HotTopiCS@ICPE 2014: 1:1-1:6 - 2013
- [c59]Takanori Kobashi, Nobukazu Yoshioka
, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki
, Yoshiaki Fukazawa:
Validating Security Design Patterns Application Using Model Testing. ARES 2013: 62-71 - [c58]Seiji Munetoh
, Nobukazu Yoshioka
:
Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development. ARES 2013: 350-359 - [c57]Haruhiko Kaiya, Takao Okubo, Nobuyuki Kanaya, Yuji Suzuki, Shinpei Ogata
, Kenji Kaijiri, Nobukazu Yoshioka
:
Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities. CAiSE Workshops 2013: 478-489 - [c56]Seiji Munetoh
, Nobukazu Yoshioka
:
RAILROADMAP: An Agile Security Testing Framework for Web-application Development. ICST 2013: 491-492 - 2012
- [j8]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns. Int. J. Secur. Softw. Eng. 3(1): 37-61 (2012) - [c55]Shigetoshi Yokoyama, Nobukazu Yoshioka
:
Cluster as a Service for Self-Deployable Cloud Applications. CCGRID 2012: 703-704 - [c54]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
:
Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model. COMPSAC Workshops 2012: 367-372 - [c53]Shigetoshi Yokoyama, Nobukazu Yoshioka
, Takahiro Shida:
edubase cloud: cloud platform for cloud education. EduRex@ICSE 2012: 17-20 - [c52]Shigetoshi Yokoyama, Nobukazu Yoshioka
, Takahiro Shida:
Cloud in a cloud for cloud education. PESOS@ICSE 2012: 63-64 - [c51]Shigetoshi Yokoyama, Nobukazu Yoshioka
:
Dodai-Deploy: Fast Cluster Deployment Tool. ICWS 2012: 681-682 - [c50]Gideon D. Bibu, Nobukazu Yoshioka
, Julian A. Padget
:
System security requirements analysis with answer set programming. RESS 2012: 10-13 - [c49]Shigetoshi Yokoyama, Nobukazu Yoshioka
:
An Academic Community Cloud Architecture for Science Applications. SAINT 2012: 108-112 - [c48]Yoshiyuki Asai, Takeshi Abe
, Masao Okita, Tomohiro Okuyama, Nobukazu Yoshioka
, Shigetoshi Yokoyama, Masaru Nagaku, Kenichi Hagihara, Hiroaki Kitano:
Multilevel Modeling of Physiological Systems and Simulation Platform: PhysioDesigner, Flint and Flint K3 Service. SAINT 2012: 215-219 - [c47]Shigetoshi Yokoyama, Nobukazu Yoshioka
, Motonobu Ichimura:
A Network-Aware Object Storage Service. SC Companion 2012: 556-561 - 2011
- [j7]Shunichiro Suenaga, Nobukazu Yoshioka
, Shinichi Honiden:
Group Migration by Mobile Agents in Wireless Sensor Networks. Comput. J. 54(3): 345-355 (2011) - [c46]Eduardo B. Fernández
, Hironori Washizaki
, Nobukazu Yoshioka
, Michael VanHilst:
An Approach to Model-based Development of Secure and Reliable Systems. ARES 2011: 260-265 - [c45]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
:
Effective Security Impact Analysis with Patterns for Software Enhancement. ARES 2011: 527-534 - [c44]Eduardo B. Fernández
, Nobukazu Yoshioka
:
Two patterns for distributed systems: enterprise service bus (ESB) and distributed publish/subscribe. PLoP 2011: 8:1-8:10 - [c43]Hiroyuki Nakagawa
, Nobukazu Yoshioka
, Akihiko Ohsuga, Shinichi Honiden:
IMPULSE: a design framework for multi-agent systems based on model transformation. SAC 2011: 1411-1418 - [c42]Keiko Hashizume, Eduardo B. Fernández, Nobukazu Yoshioka:
Misuse Patterns for Cloud Computing. SEKE 2011: 683-686 - [c41]Takafumi Komoto, Kenji Taguchi, Haralambos Mouratidis
, Nobukazu Yoshioka
, Kokichi Futatsugi:
A Modelling Framework to Support Internal Control. SSIRI (Companion) 2011: 187-193 - 2010
- [c40]Yuki Shiroma, Hironori Washizaki
, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka
:
Model-Driven Security Patterns Application Based on Dependences among Patterns. ARES 2010: 555-559 - [c39]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
, Michael VanHilst:
Measuring the Level of Security Introduced by Security Patterns. ARES 2010: 565-568 - [c38]Benjamin Schleinzer, Nobukazu Yoshioka
:
A security pattern for data integrity in P2P systems. PLoP 2010: 17:1-17:5 - [c37]Hiroyuki Nakagawa
, Nobukazu Yoshioka
, Akihiko Ohsuga, Shinichi Honiden:
A Framework for Validating Task Assignment in Multiagent Systems Using Requirements Importance. PRIMA 2010: 443-458 - [c36]Kenji Taguchi, Nobukazu Yoshioka
, Takayuki Tobita, Hiroyuki Kaneko:
Aligning Security Requirements and Security Assurance Using the Common Criteria. SSIRI 2010: 69-77
2000 – 2009
- 2009
- [j6]Yasuyuki Tahara, Nobukazu Yoshioka
, Kenji Taguchi, Toshiaki Aoki
, Shinichi Honiden:
Evolution of a course on model checking for practical applications. ACM SIGCSE Bull. 41(2): 38-44 (2009) - [c35]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
:
Modeling Misuse Patterns. ARES 2009: 566-571 - [c34]Hironori Washizaki
, Atsuto Kubo, Tomohiko Mizumachi, Kazuki Eguchi, Yoshiaki Fukazawa, Nobukazu Yoshioka
, Hideyuki Kanuka
, Toshihiro Kodaka, Nobuhide Sugimoto, Yoichi Nagai, Rieko Yamamoto:
AOJS: aspect-oriented javascript programming framework for web development. ACP4IS@AOSD 2009: 31-36 - [c33]Takao Okubo, Kenji Taguchi, Nobukazu Yoshioka
:
Misuse Cases + Assets + Security Goals. CSE (3) 2009: 424-429 - [c32]Hironori Washizaki
, Eduardo B. Fernández
, Katsuhisa Maruyama, Atsuto Kubo, Nobukazu Yoshioka
:
Improving the Classification of Security Patterns. DEXA Workshops 2009: 165-170 - [c31]Hironori Washizaki
, Nobukazu Yoshioka
, Eduardo B. Fernández, Jan Jürjens:
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). OOPSLA Companion 2009: 713-714 - [c30]Fuyuki Ishikawa, Kenji Taguchi, Nobukazu Yoshioka
, Shinichi Honiden:
What Top-Level Software Engineers Tackle after Learning Formal Methods: Experiences from the Top SE Project. TFM 2009: 57-71 - 2008
- [c29]Eduardo B. Fernández
, Hironori Washizaki
, Nobukazu Yoshioka
, Atsuto Kubo, Yoshiaki Fukazawa:
Classifying Security Patterns. APWeb 2008: 342-347 - [c28]Yijun Yu
, Haruhiko Kaiya, Hironori Washizaki
, Yingfei Xiong
, Zhenjiang Hu, Nobukazu Yoshioka
:
Enforcing a security pattern in stakeholder goal models. QoP 2008: 9-14 - [c27]Eduardo B. Fernández
, Jan Jürjens, Nobukazu Yoshioka
, Hironori Washizaki
:
Incorporating Database Systems into a Secure Software Development Methodology. DEXA Workshops 2008: 310-314 - 2007
- [j5]Fuyuki Ishikawa, Nobukazu Yoshioka
, Yasuyuki Tahara, Shinichi Honiden:
A hierarchical mobile agent framework and its application to multimedia contents. Syst. Comput. Jpn. 38(1): 1-17 (2007) - [c26]Fuyuki Ishikawa, Nobukazu Yoshioka, Shinichi Honiden:
Developing Consistent Contractual Policies in Service Composition. APSCC 2007: 527-534 - [c25]Hironori Washizaki
, Nobukazu Yoshioka
:
1st International Workshop on Software Patterns and Quality (SPAQu'07). APSEC 2007: 557-558 - [c24]Shinichi Honiden, Yasuyuki Tahara, Nobukazu Yoshioka
, Kenji Taguchi, Hironori Washizaki
:
Top SE: Educating Superarchitects Who Can Apply Software Engineering Tools to Practical Development in Japan. ICSE 2007: 708-718 - [c23]Fuyuki Ishikawa, Nobukazu Yoshioka
, Shinichi Honiden:
Policy-based Runtime Partner Management in ProcessBased Services. ICWS 2007: 1191-1194 - [c22]Fuyuki Ishikawa, Nobukazu Yoshioka, Shinichi Honiden:
Agreements and Policies in Cooperative Mobile Agents: Formalization and Implementation. OTM Conferences (1) 2007: 683-700 - 2006
- [j4]Fuyuki Ishikawa, Yasuyuki Tahara, Nobukazu Yoshioka
, Shinichi Honiden:
Formal model of mobile BPEL4WS process. Int. J. Bus. Process. Integr. Manag. 1(3): 192-209 (2006) - [c21]Fuyuki Ishikawa, Nobukazu Yoshioka
, Shinichi Honiden:
Service-oriented and autonomous distribution and provision of multimedia contents. AAMAS 2006: 949-951 - [c20]Fuyuki Ishikawa, Nobukazu Yoshioka
, Shinichi Honiden:
Smartive: Agreement-based Mobile Composite Agents for Multimedia Services. CIMCA/IAWTIC 2006: 19 - 2005
- [j3]Fuyuki Ishikawa, Yasuyuki Tahara, Nobukazu Yoshioka, Shinichi Honiden:
A framework for synthesis of web services and mobile agents. Int. J. Pervasive Comput. Commun. 1(3): 227-245 (2005) - [j2]Fuyuki Ishikawa, Nobukazu Yoshioka
, Shinichi Honiden:
Mobile agent system for Web service integration in pervasive network. Syst. Comput. Jpn. 36(11): 34-48 (2005) - [c19]Fuyuki Ishikawa, Nobukazu Yoshioka
, Yasuyuki Tahara, Shinichi Honiden:
Mobile and Cooperative Compounds of Multimedia Services. IEEE SCC 2005: 129-138 - [c18]Fuyuki Ishikawa, Yasuyuki Tahara, Nobukazu Yoshioka, Shinichi Honiden:
Agent synthesis: partnership and agreement in cooperative mobile agents. AAMAS 2005: 1267-1268 - [c17]Fuyuki Ishikawa, Nobukazu Yoshioka, Shinichi Honiden:
Incorporating Agreements on Service Options into BPEL-based Services. CIMCA/IAWTIC 2005: 796-803 - [c16]Fuyuki Ishikawa, Nobukazu Yoshioka, Yasuyuki Tahara, Shinichi Honiden:
Framework for Hierarchical Mobile Agents: Toward Service-Oriented Agent Compound. ICEIS (4) 2005: 275-282 - [c15]Kenji Tei, Nobukazu Yoshioka, Yoshiaki Fukazawa, Shinichi Honiden:
Using Mobile Agent for Location-Specific Data Retrieval in Manet. INTELLCOMM 2005: 157-168 - [c14]Kenji Tei, Yoshiaki Fukazawa, Shinichi Honiden, Nobukazu Yoshioka
:
Geographically Bound Mobile Agent in MANET. MobiQuitous 2005: 516-518 - [c13]Kazutaka Matsuzaki
, Nobukazu Yoshioka
, Shinichi Honiden:
Flexible and Maintainable Contents Activities in Ubiquitous Environment. OTM Workshops 2005: 14-15 - 2004
- [c12]Nobukazu Yoshioka, Akihiko Ohsuga, Shinichi Honiden:
Mobeet: A Multi-agent Framework for Ubiquitous Information Systems. AOIS 2004: 19-35 - [c11]Nobukazu Yoshioka, Shinichi Honiden, Anthony Finkelstein:
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems. EDOC 2004: 84-97 - [c10]Fuyuki Ishikawa, Nobukazu Yoshioka
, Yasuyuki Tahara, Shinichi Honiden:
Behavior Descriptions of Mobile Agents for Web Services Integration. ICWS 2004: 342-349 - [c9]Fuyuki Ishikawa, Nobukazu Yoshioka, Yasuyuki Tahara, Shinichi Honiden:
Mobile Agent System for Web Services Integration in Pervasive Networks. IWUC 2004: 38-47 - [c8]Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Honiden:
Ubiquitous Application Development using a Mobile Agent-based System. IWUC 2004: 204-212 - [c7]Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Honiden:
Development Methodology for Location-Aware Mobile Agent. MATA 2004: 13-26 - [c6]Nobukazu Yoshioka, Shinichi Honiden:
A Pattern Oriented Mobile Agent Framework for Mobile Computing. MATA 2004: 369-380 - [c5]Takou Doi, Nobukazu Yoshioka, Yasuyuki Tahara, Shinichi Honiden:
Bridging the Gap Between AUML and Implementation Using IOM/T. PROMAS 2004: 147-162 - 2003
- [c4]Yasuyuki Tahara, Nobukazu Yoshioka, Shinichi Honiden:
A Formal Model of Active Contents Based on the Ambient Calculus. MATA 2003: 132-141 - [c3]Heisuke Kaneko, Yoshiaki Fukazawa, Fumihiro Kumeno, Nobukazu Yoshioka, Shinichi Honiden:
Mobile Agent Based Evacuation System When The Battery Runs Out: EASTER. PerCom 2003: 460- - 2002
- [j1]Nobukazu Yoshioka, Takahiro Kawamura, Akihiko Ohsuga, Shinichi Honiden:
Evaluation of a Multi Agent Framework for Open Distributed Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(11): 2396-2406 (2002) - 2000
- [c2]Nobukazu Yoshioka
, Yasuyuki Tahara, Akihiko Ohsuga, Shinichi Honiden:
Security for Mobile Agents. AOSE 2000: 223-234
1990 – 1999
- 1998
- [c1]Nobukazu Yoshioka, Masato Suzuki, Takuya Katayama:
Incremental Software Development Method Based on Abstract Interpretation. IWSSD 1998: 126-134
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint