default search action
Hideaki Nishihara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Yasuyuki Kawanishi, Hideaki Nishihara, Hirotaka Yoshida, Hideki Yamamoto, Hiroyuki Inoue:
A Study on Threat Analysis and Risk Assessment Based on the "Asset Container" Method and CWSS. IEEE Access 11: 18148-18156 (2023) - [j4]Yasuyuki Kawanishi, Hideaki Nishihara, Hideki Yamamoto, Hirotaka Yoshida, Hiroyuki Inoue:
A Study of The Risk Quantification Method of Cyber-Physical Systems focusing on Direct-Access Attacks to In-Vehicle Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 341-349 (2023) - 2022
- [c11]Jun Inoue, Hideaki Nishihara, Akira Mori:
Quantitative Analysis of Sparsely Synchronized Fail-Safe Processors. QRS 2022: 1057-1068 - [i1]Hideaki Nishihara, Yasuyuki Kawanishi, Daisuke Souma, Hirotaka Yoshida:
On Validating Attack Trees with Attack Effects: An Approach from Barwise-Seligman's Channel Theory. CoRR abs/2204.06223 (2022) - 2021
- [c10]Yasuyuki Kawanishi, Hideaki Nishihara, Hirotaka Yoshida, Yoichi Hata:
A Study of The Risk Quantification Method focusing on Direct-Access Attacks in Cyber-Physical Systems. DASC/PiCom/CBDCom/CyberSciTech 2021: 298-305 - [c9]Yutaka Matsuno, Yoriyuki Yamagata, Hideaki Nishihara, Yuichiro Hosokawa:
Assurance Carrying Code for Software Supply Chain. ISSRE Workshops 2021: 276-277 - 2020
- [c8]Hideaki Nishihara, Yasuyuki Kawanishi, Daisuke Souma, Hirotaka Yoshida:
On Validating Attack Trees with Attack Effects. SAFECOMP 2020: 309-324
2010 – 2019
- 2019
- [j3]Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida, Yoichi Hata:
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design. Secur. Commun. Networks 2019: 4614721:1-4614721:35 (2019) - 2018
- [c7]Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida, Yoichi Hata:
A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems. DASC/PiCom/DataCom/CyberSciTech 2018: 62-69 - [c6]Hideaki Nishihara, Kenji Taguchi:
Comparing Risk Identification in Hazard Analysis and Threat Analysis. SAFECOMP Workshops 2018: 265-277 - 2017
- [c5]Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida:
Detailed Analysis of Security Evaluation of Automotive Systems Based on JASO TP15002. SAFECOMP Workshops 2017: 211-224 - 2015
- [c4]Kenji Taguchi, Daisuke Souma, Hideaki Nishihara:
Safe & Sec Case Patterns. SAFECOMP Workshops 2015: 27-37 - 2014
- [j2]Eun-Hye Choi, Hideaki Nishihara, Takahiro Ando, Nguyen Van Tang, Masahiro Aoki, Keiichi Yoshisaka, Osamu Mizuno, Hitoshi Ohsaki:
Formal Specification Based Automatic Test Generation for Embedded Network Systems. J. Appl. Math. 2014: 909762:1-909762:21 (2014) - [c3]Kenji Taguchi, Daisuke Souma, Hideaki Nishihara, Toshinori Takai:
Linking Traceability with GSN. ISSRE Workshops 2014: 192-197 - 2013
- [c2]Kenji Taguchi, Hideaki Nishihara, Toshiaki Aoki, Fumihiro Kumeno, Koji Hayamizu, Koichi Shinozaki:
Building a Body of Knowledge on Model Checking for Software Development. COMPSAC 2013: 784-789
2000 – 2009
- 2009
- [j1]Hideaki Nishihara, Koichi Shinozaki, Koji Hayamizu, Toshiaki Aoki, Kenji Taguchi, Fumihiro Kumeno:
Model checking education for software engineers in Japan. ACM SIGCSE Bull. 41(2): 45-50 (2009) - 2008
- [c1]Saeko Tanigawa, Hideaki Nishihara, Shigeo Kaneda, Hirohide Haga:
Detecting mastication by using microwave Doppler sensor. PETRA 2008: 88
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint