• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Yoshioka Nobukazu  吉岡 信和

ORCIDConnect your ORCID iD *help
… Alternative Names

YOSHIOKA Nobukazu  吉岡 信和

Less
Researcher Number 20390601
Other IDs
External Links
Affiliation (Current) 2025: 早稲田大学, 理工学術院総合研究所(理工学研究所), 客員上級研究員(研究院客員教授)
Affiliation (based on the past Project Information) *help 2023 – 2024: 早稲田大学, 理工学術院総合研究所(理工学研究所), 上級研究員
2012 – 2022: 国立情報学研究所, アーキテクチャ科学研究系, 准教授
2021: 早稲田大学, 理工学術院, 上級研究員(研究院教授)
2016 – 2017: 国立情報学研究所, 大学共同利用機関等の部局等, 准教授
2013: 国立情報学研究所, 准教授 … More
2013: 国立情報学研究所, アーキテクチャ研究系, 准教授
2011 – 2013: 国立情報学研究所, 大学共同利用機関等の部局等, 准教授
2008 – 2010: 国立情報学研究所, 特任准教授
2007 – 2010: National Institute of Informatics, アーキテクチャ科学研究系, 准教授
2007 – 2008: 国立情報学研究所, アーキテクチャ科学研究系, 特任准教授
2006: 国立情報学研究所, アーキテクチャ科学研究系, 特任助教授
2005: 国立情報学研究所, 特任助教授 Less
Review Section/Research Field
Principal Investigator
Software / Software / Computer system/Network
Except Principal Investigator
Software / Software / Medium-sized Section 60:Information science, computer engineering, and related fields / Basic Section 90020:Library and information science, humanistic and social informatics-related / Basic Section 62020:Web informatics and service informatics-related / Learning support system / Social systems engineering/Safety system / Intelligent informatics
Keywords
Principal Investigator
セキュリティ要求 / ソフトウェア学 / セキュリティ / セキュア・ネットワーク / ソフトウエア学 / ソフトウエア開発効率化・安定化 / プライバシー要求 / ソフトウェア開発効率化・安定化 / パターン / 分散システム … More / ソフトウェアプライバシー / ソフトウェアセキュリティ / トランスペアレンシー要求 / インパクト分析 / 脆弱性分析 / 関心毎の分離 / 設計手法 / エージェント / ミドルウェア / 要求分析 … More
Except Principal Investigator
ミドルウェア / IoT / ソフトウェア保守 / ソフトウェア工学 / システム設計 / ソフトウェア設計 / ソフトウェアアーキテクチャ / 機械学習工学 / デザインパターン / プログラム品質評価改善 / 機械学習応用 / ソフトウェアパターン / ソフトウェア再利用 / LOD / オープンデータ / 推薦システム / ソーシャルデータ / マイニング基盤 / 自己適応ソフトウェア / 協調プランニング / 環境モデル学習 / 離散制御器合成 / Graceful Degradation / 実行時モデル / 自己適応システム / モデリングツール / 設計根拠モデル / セキュリティとプライバシーを統合化した知識ベース / ツール開発 / プライバシー / プライバシーを考慮したソフトウェア開発支援 / セキュアなソフトウェア開発支援 / 設計根拠 / 知識ベース / プライバシーバイデザイン / ソフトウェアセキュリティ / ソフトウェア進化 / ソフトウェア開発環境 / ソフトウェアモジュール / ソフトウエア開発効率化・ 安定化 / ソフトウエア開発環境 / ソフトウエアモジュール / ソフトウエア学 / ソフトウエア開発効率化・安定化 / クラウドコンピューティング / 行動推薦 / ミニブログ / クラウドコンピューティン グ / 国際情報交流 / 夜間監視 / 移動物体検出 / 自動監視 / 固有空間法 / パーティクルフィルタ / サーマルカメラ / 密漁 / 安心・安全 / 湾岸監視 / ポリシー / オントロジー / コンテンツ流通 / 知識獲得 / エージェント / テキストマイニング / コンテンツ / データマイニング / アスペクトエージェント / 関係エージェント / 構造エージェント / ユビキタス・アプリケーション / ユビキタス・ネットワーク / オープン性 / ネットワーク / センサー / 無線センサーネットワーク Less
  • Research Projects

    (16 results)
  • Research Products

    (213 results)
  • Co-Researchers

    (30 People)
  •  SNS・IoT・オープンデータ融合マイニングによる施策に対する人々の行動変化予測

    • Principal Investigator
      大須賀 昭彦
    • Project Period (FY)
      2023 – 2026
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 90020:Library and information science, humanistic and social informatics-related
    • Research Institution
      The University of Electro-Communications
  •  Foundation for detecting and applying machine learning design patterns through machine learning

    • Principal Investigator
      鷲崎 弘宜
    • Project Period (FY)
      2023 – 2025
    • Research Category
      Grant-in-Aid for Challenging Research (Exploratory)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Waseda University
  •  Social and physical sensor fusion mining infrastructure to understand behavioral intentions

    • Principal Investigator
      Ohsuga Akihiko
    • Project Period (FY)
      2018 – 2021
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 62020:Web informatics and service informatics-related
    • Research Institution
      The University of Electro-Communications
  •  A learning environment based on a rationale model associating of artifacts with knowledge on security and privacy

    • Principal Investigator
      HAZEYAMA Atsuo
    • Project Period (FY)
      2017 – 2019
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Learning support system
    • Research Institution
      Tokyo Gakugei University
  •  Multi-view Models@run.time Framework

    • Principal Investigator
      Honiden Shinichi
    • Project Period (FY)
      2017 – 2021
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Research Field
      Software
    • Research Institution
      Waseda University
  •  Integrated Framework of Security and Privacy Requirements Engineering(Fostering Joint International Research)Principal Investigator

    • Principal Investigator
      YOSHIOKA NOBUKAZU
    • Project Period (FY)
      2016 – 2018
    • Research Category
      Fund for the Promotion of Joint International Research (Fostering Joint International Research)
    • Research Field
      Software
    • Research Institution
      National Institute of Informatics
  •  Trace ANY: tracing any software in any direction to support software system maintenance and evolution

    • Principal Investigator
      Washizaki Hironori
    • Project Period (FY)
      2016 – 2020
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Software
    • Research Institution
      Waseda University
  •  Integrated Framework of Security and Privacy Requirements EngineeringPrincipal Investigator

    • Principal Investigator
      YOSHIOKA NOBUKAZU
    • Project Period (FY)
      2015 – 2018
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Software
    • Research Institution
      National Institute of Informatics
  •  Research on cloud middleware for systems recommending evacuation activities from disasters using miniblogs

    • Principal Investigator
      Ohsuga Akihiko
    • Project Period (FY)
      2012 – 2015
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Software
    • Research Institution
      The University of Electro-Communications
  •  A Pattern Oriented Software Development Method for Agile Adaptation to Security ChangesPrincipal Investigator

    • Principal Investigator
      YOSHIOKA Nobukazu
    • Project Period (FY)
      2012 – 2014
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Software
    • Research Institution
      National Institute of Informatics
  •  Automatic Coastal Surveillance System Using Thermal Camera And Image Processing

    • Principal Investigator
      OKAMURA Kenshiro
    • Project Period (FY)
      2011 – 2013
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Social systems engineering/Safety system
    • Research Institution
      Oshima National College of Maritime Technology
  •  Research on Multi-Agent Middleware Supporting Ubiquitous Application Development

    • Principal Investigator
      OHSUGA Akihiko
    • Project Period (FY)
      2008 – 2010
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Software
    • Research Institution
      The University of Electro-Communications
  •  Studies on Distributing Educational Contents using Mobile Agents

    • Principal Investigator
      MATSUMOTO Kazunori
    • Project Period (FY)
      2008 – 2010
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Intelligent informatics
    • Research Institution
      Kanagawa Institute of Technology
  •  Secure System Design based on Multi-viewPrincipal Investigator

    • Principal Investigator
      YOSHIOKA Nobukazu
    • Project Period (FY)
      2008 – 2010
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Software
    • Research Institution
      National Institute of Informatics
  •  A middleware for open wireless sensor networks

    • Principal Investigator
      HONIDEN Shinichi
    • Project Period (FY)
      2007 – 2009
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Research Field
      Software
    • Research Institution
      National Institute of Informatics
  •  パターンに基づくセキュアな分散システム構築方法論Principal Investigator

    • Principal Investigator
      吉岡 信和
    • Project Period (FY)
      2005 – 2007
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Computer system/Network
    • Research Institution
      National Institute of Informatics

All 2024 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 Other

All Journal Article Presentation Book

  • [Book] Three Misuse Patterns for Cloud Computing, In a book of "Security Engineering for Cloud Computing : Approaches and Tools"2012

    • Author(s)
      Keiko Hashizume, Nobukazu Yoshioka, Eduardo B. Fernandez
    • Total Pages
      18
    • Publisher
      IGI Global
    • Data Source
      KAKENHI-PROJECT-24300011
  • [Book] Three Misuse Patterns for Cloud Computing, Security Engineering for Cloud Computing : Approaches and Tools2012

    • Author(s)
      Keiko Hashizume, Nobukazu Yoshioka and Eduardo B. Fernandez
    • Total Pages
      17
    • Publisher
      IGI GIobal
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Book] "Three Misuse Patterns for Cloud Computing", In a book of "Security Engineering for Cloud Computing: Approaches and Tools"2012

    • Author(s)
      Keiko Hashizume, Nobukazu Yoshioka and Eduardo B. Fernandez
    • Total Pages
      17
    • Publisher
      IGI Global
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Book] Designing Solutions-Based Ubiquitous and Pervasive Computing: New Issues and Trends(XAC Project: Towards a Middleware for Open Wireless Sensor Networks, chapter in book)2010

    • Author(s)
      Kenji Tei, Shunichiro Suenaga, Yoshiyuki Nakamura, Yuichi Sei, Hikotoshi Nakazato, Yoichi Kaneki, Nobukazu Yoshioka, Yoshiaki Fukazawa, Shinichi Honiden
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Journal Article] Comparative Evaluation of NLP-Based Approaches for Linking CAPEC Attack Patterns from CVE Vulnerability Information2022

    • Author(s)
      Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka
    • Journal Title

      Applied Sciences

      Volume: 12(7) Issue: 7 Pages: 1-15

    • DOI

      10.3390/app12073400

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-16H02804, KAKENHI-PROJECT-21KK0179
  • [Journal Article] Abstract security patterns and the design of secure systems2022

    • Author(s)
      Eduardo Buglioni Fernandez, Nobukazu Yoshioka, Hironori Washizaki, Joseph William Yoder
    • Journal Title

      Cybersecurity

      Volume: 5(7) Issue: 1 Pages: 1-17

    • DOI

      10.1186/s42400-022-00109-w

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804, KAKENHI-PROJECT-21KK0179
  • [Journal Article] 組込みシステム向け障害解析環境の効率改善2022

    • Author(s)
      長野岳彦, 小口琢夫,吉岡信和,田原康之,大須賀昭彦
    • Journal Title

      情報処理学会論文誌:コンシューマ・デバイス&システム

      Volume: Vol.12, No.2

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Journal Article] The design of secure IoT applications using patterns: State of the art and directions for research2021

    • Author(s)
      Eduardo B. Fernandez, Hironori Washizaki, Nobukazu Yoshioka, Takao Okubo
    • Journal Title

      Internet of Things

      Volume: 15 Pages: 1-25

    • DOI

      10.1016/j.iot.2021.100408

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804, KAKENHI-PROJECT-18H03340
  • [Journal Article] Systematic Literature Review of Security Pattern Research2021

    • Author(s)
      Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G Priyalakshmi
    • Journal Title

      Information

      Volume: 12(1) Issue: 1 Pages: 1-27

    • DOI

      10.3390/info12010036

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804, KAKENHI-PROJECT-18H03340, KAKENHI-PROJECT-18K11249, KAKENHI-PROJECT-21K11837
  • [Journal Article] Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques2021

    • Author(s)
      Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka
    • Journal Title

      Information

      Volume: 12(8) Issue: 8 Pages: 1-15

    • DOI

      10.3390/info12080298

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-16H02804, KAKENHI-PROJECT-18H03340
  • [Journal Article] CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development2021

    • Author(s)
      Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernandez, Takehisa Kato, Hideyuki Kanuka, Takao Okubo, Nobukazu Yoshioka, and Atsuo Hazeyama
    • Journal Title

      International Journal of Systems and Software Security and Protection

      Volume: Vol.12, No.2 Pages: 1-18

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Journal Article] CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development2021

    • Author(s)
      Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernandez, Takehisa Kato, Hideyuki Kanuka, Takao Okubo, Nobukazu Yoshioka and Atsuo Hazeyama
    • Journal Title

      International Journal of Systems and Software Security and Protection

      Volume: 12(2) Issue: 2 Pages: 1-18

    • DOI

      10.4018/ijsssp.20210101.oa1

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Journal Article] 機械学習を用いたCVEからCAPECへの関連付け手法の提案2020

    • Author(s)
      鹿子木健太, 野寄祐樹, 鷲崎弘宜, 深澤良彰, 小形真平, 大久保隆夫, 加藤岳久, 鹿糠秀行, 櫨山淳雄, 吉岡信和
    • Journal Title

      情報処理学会研究報告コンピュータセキュリティ

      Volume: - Pages: 1-7

    • Data Source
      KAKENHI-PROJECT-17K00475
  • [Journal Article] Incidents Are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems2020

    • Author(s)
      Faeq Rimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, Bashar Nuseibeh
    • Journal Title

      IEEE Transactions on Software Engineering

      Volume: - Issue: 1 Pages: 120-134

    • DOI

      10.1109/tse.2020.2981310

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Journal Article] Landscape of Architecture and Design Patterns for IoT Systems2020

    • Author(s)
      Washizaki Hironori、Ogata Shinpei、Hazeyama Atsuo、Okubo Takao、Fernandez Eduardo B.、Yoshioka Nobukazu
    • Journal Title

      IEEE Internet of Things Journal

      Volume: 7 Issue: 10 Pages: 10091-10101

    • DOI

      10.1109/jiot.2020.3003528

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H03074, KAKENHI-PROJECT-16H02804, KAKENHI-PROJECT-18H03340
  • [Journal Article] A Method for Improving Inconsistency Risks of Transaction Documents in Business Processes2020

    • Author(s)
      河本高文, 二木厚吉, 吉岡信和
    • Journal Title

      情報処理学会論文誌

      Volume: 61 Issue: 9 Pages: 1486-1494

    • DOI

      10.20729/00206798

    • NAID

      170000183377

    • Year and Date
      2020-09-15
    • Language
      Japanese
    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Journal Article] ソフトウェアセキュリティ知識ベースを用いた要求分析及び設計における知識提示手法の開発とケーススタディによる評価2019

    • Author(s)
      山田侑樹, 櫨山淳雄, 吉岡信和
    • Journal Title

      電子情報通信学会技術研究報告知能ソフトウェア工学

      Volume: 118 Pages: 51-56

    • Data Source
      KAKENHI-PROJECT-17K00475
  • [Journal Article] Assessing Security and Privacy Behavioural Risks for Self-Protection Systems2019

    • Author(s)
      Yijun Yu, Nobukazu Yoshioka, Tetsuo Tamai
    • Journal Title

      Engineering Adaptive Software Systems 2019

      Volume: 1 Pages: 135-147

    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15KK0018
  • [Journal Article] 業務プロセスの伝票不整合リスクの改善手法2019

    • Author(s)
      河本高文, 二木厚吉, 吉岡 信和
    • Journal Title

      情報処理学会論文誌

      Volume: 60 (9) Pages: 1500-1508

    • NAID

      170000180443

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17H00732
  • [Journal Article] Using Security Patterns to Develop Secure Systems - Ten years later2019

    • Author(s)
      Eduardo B. Fernandez, Hironori Washizaki and Nobukazu Yoshioka
    • Journal Title

      International Journal of Systems and Software Security and Protection

      Volume: Vol. 9, No. 4 Pages: 46-56

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Journal Article] Assessing Security and Privacy Behavioural Risks for Self-Protection Systems2019

    • Author(s)
      Yijun Yu, Nobukazu Yoshioka, Tetsuo Tamai
    • Journal Title

      Engineering Adaptive Software Systems 2019

      Volume: 1 Pages: 135-147

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] A System for Seamless Support from Security Requirements Analysis to Security Design using a Software Security Knowledge Base2019

    • Author(s)
      Atsuo Hazeyama, Hikaru Miyahara, Takafumi Tanaka, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo and Nobukazu Yoshioka
    • Journal Title

      International Requirements Engineering Conference Workshops

      Volume: 27 Pages: 134-140

    • DOI

      10.1109/rew.2019.00029

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11249, KAKENHI-PROJECT-17K00475
  • [Journal Article] 業務プロセスの伝票不整合リスクの改善手法2019

    • Author(s)
      河本 高文,二木 厚吉,吉岡 信和
    • Journal Title

      情報処理学会論文誌

      Volume: 60 Pages: 1500-1508

    • NAID

      170000180443

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Journal Article] Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques2019

    • Author(s)
      Haruhiko Kaiya, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki
    • Journal Title

      Procedia Computer Science

      Volume: 159 Pages: 1075-1084

    • DOI

      10.1016/j.procs.2019.09.276

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11249, KAKENHI-PROJECT-18H03340
  • [Journal Article] Using Security Patterns to Develop Secure Systems2018

    • Author(s)
      Eduardo B. Fernandez, Hironori Washizaki, Nobukazu Yoshioka
    • Journal Title

      International Journal of Systems and Software Security and Protection (IJSSSP)

      Volume: 9 Pages: 16-31

    • DOI

      10.4018/978-1-61520-837-1.ch002

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Journal Article] ソフトウェアセキュリティ知識ベースを活用したセキュリティ要求分析からセキュリティ設計を支援するシステムの開発2018

    • Author(s)
      宮原 光, 櫨山 淳雄, 田中 昂文, 鷲崎 弘宜, 海谷 治彦, 大久保 隆夫, 吉岡 信和
    • Journal Title

      電子情報通信学会技術研究報告知能ソフトウェア工学

      Volume: 117 Pages: 67-72

    • Data Source
      KAKENHI-PROJECT-17K00475
  • [Journal Article] 部門ごとの伝票突合せを反映した業務プロセスの信頼性のアセスメント手法2018

    • Author(s)
      河本 高文, 二木 厚吉, 吉岡 信和
    • Journal Title

      情報処理学会論文誌

      Volume: 59 Pages: 1699-1708

    • NAID

      170000149754

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Journal Article] 部門ごとの伝票突合せを反映した業務プロセスの信頼性のアセスメント手法2018

    • Author(s)
      河本 高文, 二木 厚吉, 吉岡 信和
    • Journal Title

      情報処理学会論文誌

      Volume: 59 Pages: 1699-1708

    • NAID

      170000149754

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17H00732
  • [Journal Article] Security Requirement Modeling Support System Using Software Security Knowledge Base2018

    • Author(s)
      Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, and Nobukazu Yoshioka
    • Journal Title

      Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)

      Volume: 2 Pages: 234-239

    • DOI

      10.1109/compsac.2018.10235

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K00475, KAKENHI-PROJECT-18K11249, KAKENHI-PROJECT-15H02686
  • [Journal Article] Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes2018

    • Author(s)
      Hua Cai, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
    • Journal Title

      The International Workshop on Evidence-based Security and Privacy in the Wild 2018 (WESPr-18)

      Volume: 1 Pages: 1-8

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] 部門ごとの伝票突合せを反映した業務プロセスの信頼性のアセスメント手法2018

    • Author(s)
      河本 高文 , 二木 厚吉 , 吉岡 信和
    • Journal Title

      情報処理学会論文誌

      Volume: 59(9) Pages: 1699-1708

    • NAID

      170000149754

    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] Taxonomy and Literature Survey of Security Pattern Research2018

    • Author(s)
      Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Dan Yamaoto, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Takehisa Kato, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G Priyalakshmi
    • Journal Title

      IEEE Conference on Applications, Information and Network Security (AINS)

      Volume: 1 Pages: 87-92

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services2018

    • Author(s)
      Xia Tian、Washizaki Hironori、Kato Takehisa、Kaiya Haruhiko、Ogata Shinpei、Fernandez Eduardo B.、Kanuka Hideyuki、Yoshino Masayuki、Yamamoto Dan、Okubo Takao、Yoshioka Nobukazu、Hazeyama Atsuo
    • Journal Title

      6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018)

      Volume: 1 Pages: 379-386

    • DOI

      10.5220/0006600403790386

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] Evaluating the degree of security of a system built using security patterns2018

    • Author(s)
      Fernandez Eduardo B.、Yoshioka Nobukazu、Washizaki Hironori
    • Journal Title

      Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018)

      Volume: 1 Pages: 1-8

    • DOI

      10.1145/3230833.3232821

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] 機械学習システムがセキュリティに出会うとき2018

    • Author(s)
      吉岡信和
    • Journal Title

      第1回機械学習工学ワークショップ

      Volume: 1 Pages: 49-53

    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] Using Security Patterns to Develop Secure Systems?Ten Years Later2018

    • Author(s)
      Eduardo B. Fernandez, Hironori Washizaki, Nobukazu Yoshioka
    • Journal Title

      International Journal of Systems and Software Security and Protection

      Volume: 9 Issue: 4 Pages: 46-57

    • DOI

      10.4018/ijsssp.2018100103

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17H00732
  • [Journal Article] Assessing Business Processes by Checking Transaction Documents for Inconsistency Risks and a Tool for Risk Assessment2017

    • Author(s)
      Komoto Takafumi、Futatsugi Kokichi、Yoshioka Nobukazu
    • Journal Title

      Lecture Notes in Business Information (LNBIP)

      Volume: 275 Pages: 70-82

    • DOI

      10.1007/978-3-319-57222-2_4

    • ISBN
      9783319572215, 9783319572222
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15KK0018
  • [Journal Article] Preliminary Systematic Literature Review of Software and Systems Traceability2017

    • Author(s)
      Kaiya Haruhiko、Sato Ryohei、Hazeyama Atsuo、Ogata Shinpei、Okubo Takao、Tanaka Takafumi、Yoshioka Nobukazu、Washizaki Hironori
    • Journal Title

      Procedia Computer Science

      Volume: 112 Pages: 1141-1150

    • DOI

      10.1016/j.procs.2017.08.152

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] Goal Modelling for Security Problem Matching and Pattern Enforcement2017

    • Author(s)
      Yu Yijun、Kaiya Haruhiko、Yoshioka Nobukazu、Hu Zhenjiang、Washizaki Hironori、Xiong Yingfei、Hosseinian-Far Amin
    • Journal Title

      International Journal of Secure Software Engineering

      Volume: 8 Issue: 3 Pages: 42-57

    • DOI

      10.4018/ijsse.2017070103

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686, KAKENHI-PROJECT-15K00109, KAKENHI-PROJECT-17H00732
  • [Journal Article] Eliciting Requirements for Improving Users’ Behavior Using Transparency2017

    • Author(s)
      Haruhiko Kaiya, Nobukazu Yoshioka, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata, Takafumi Tanaka
    • Journal Title

      Requirements Engineering for Internet of Things

      Volume: CCIS 809 Pages: 41-56

    • DOI

      10.1007/978-981-10-7796-8_4

    • ISBN
      9789811077951, 9789811077968
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K00475, KAKENHI-PROJECT-15H02686
  • [Journal Article] 組込み向け進化型ソフトウェアの効率的な拡張性強化手法2016

    • Author(s)
      佐々木隆益,吉岡信和,田原康之,大須賀昭彦
    • Journal Title

      情報処理学会論文誌

      Volume: Vol.57,No.2 Pages: 730-744

    • NAID

      120006623726

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] A Metamodel for Security and Privacy Knowledge in Cloud Services2016

    • Author(s)
      Hironori Washizaki, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Shinpei Ogata, Eduardo B. Fernandez, Nobukazu Yoshioka, Takehisa Kato, Haruhiko Kaiya, Hideyuki Kanuka, Yuki Kondo, Takao Okubo, Atsuo Hazeyama
    • Journal Title

      Proceedings of 12th IEEE World Congress on Services

      Volume: IEEE SERVICES 2016 Pages: 142-143

    • DOI

      10.1109/services.2016.30

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] Security in Cloud Computing and Big Data2016

    • Author(s)
      Eduardo Fernandez, Nobukazu Yoshioka, Hironori Washizaki, Madiha Syed
    • Journal Title

      Journal of Future Internet

      Volume: Vol.8, Issue 2 Issue: 2 Pages: 1-13

    • DOI

      10.3390/fi8020013

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] Pattern varieties and their uses in building systems2016

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka and Hironori Washizaki
    • Journal Title

      The Third International Workshop on Patterns Promotion and Anti-patterns Prevention (PPAP

      Volume: 2016

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Literature Survey on Technologies for Developing Privacy-Aware Software2016

    • Author(s)
      Atsuo Hazeyama, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Haruhiko Kaiya
    • Journal Title

      Proceedings of The 3rd International Workshop on The Evolving Security and Privacy Requirements Engineering

      Volume: ESPRE 2016 Pages: 86-91

    • DOI

      10.1109/rew.2016.029

    • NAID

      130008080131

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] Support Implementation of Security Design Patterns Using Test Templates2016

    • Author(s)
      Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
    • Journal Title

      Information

      Volume: Vol.7, Number.2 Issue: 2 Pages: 1-19

    • DOI

      10.3390/info7020034

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-15H02686, KAKENHI-PROJECT-16H02804, KAKENHI-PROJECT-25280026
  • [Journal Article] Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models2016

    • Author(s)
      Haruhiko Kaiya, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Atsuo Hazeyama
    • Journal Title

      Proceedings of New Trends in Software Methodologies, Tools and Techniques (SoMeT16)

      Volume: Volume 286 Pages: 155-166

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] Performance Exploring Using Model Checking A Case Study of Hard Disk Drive Cache Function2015

    • Author(s)
      Takehiko Nagano, Kazuyoshi Serizawa, Nobukazu Yoshioka, Yasuyuki Tahara, Akihiko Ohsuga
    • Journal Title

      The Tenth International Conference on Software Engineering Advances (ICSEA)

      Volume: 2015 Pages: 31-39

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Method Using Command Abstraction Library for Iterative Testing Security of Web Application2015

    • Author(s)
      Seiji Muneto, Noukazu Yoshioka
    • Journal Title

      International Journal of Secure Software Engineering

      Volume: Vol.6, No.3 Issue: 3 Pages: 26-49

    • DOI

      10.4018/ijsse.2015070102

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Journal Article] TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing2015

    • Author(s)
      Takanori Kobashi, Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Nobukazu Yoshioka, Haruhiko Kaiya, Takano Okubo
    • Journal Title

      Proceedings of the 8th IEEE International Conference on Software Testing, Verification, and Validation

      Volume: ICST 2015 Pages: 1-8

    • DOI

      10.1109/icst.2015.7102633

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02686, KAKENHI-PROJECT-24300005
  • [Journal Article] A Case-based Management System for Secure Software Development Using Software Security Knowledge,2015

    • Author(s)
      Masahito Saito, Atsuo Hazeyama, Nobukazu Yoshioka, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, and Takao Okubo
    • Journal Title

      Procedia Computer Science: Proceedings of the 19th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES2015)

      Volume: 60 Pages: 1092-1100

    • DOI

      10.1016/j.procs.2015.08.155

    • NAID

      110010021521

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-26330394, KAKENHI-PROJECT-15H02686, KAKENHI-PROJECT-24300005
  • [Journal Article] Case Base for Secure Software Development Using Software Security Knowledge Base2015

    • Author(s)
      Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, and Takao Okubo
    • Journal Title

      Proceedings of the 39th Annual International Computers, Software & Applications Conference (COMPSAC2015)

      Volume: 3 Pages: 97-103

    • DOI

      10.1109/compsac.2015.86

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-26330394, KAKENHI-PROJECT-15H02686, KAKENHI-PROJECT-24300005
  • [Journal Article] Method Using Command Abstraction Library for Iterative Testing Security of Web Application2015

    • Author(s)
      Seiji Muneto, Noukazu Yoshioka
    • Journal Title

      International Journal of Secure Software Engineering (IJSSE)

      Volume: 6(3) Issue: 3 Pages: 26-49

    • DOI

      10.1007/s10270-004-0077-7

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Patterns for security and privacy in cloud ecosystems2015

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka and Hironori Washizaki
    • Journal Title

      The 2nd International Workshop on The Evolving Security and Privacy Requirements Engineering

      Volume: ESPRE 2015 Pages: 13-18

    • DOI

      10.1109/espre.2015.7330162

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686, KAKENHI-PROJECT-24300005
  • [Journal Article] Finding Potential Threats in Several Security Targets for Eliciting Security Requirements2015

    • Author(s)
      Haruhiko Kaiya, Shinpei Ogata, Shinpei Hayashi, Motoshi Saeki, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, Atsuo Hazeyama
    • Journal Title

      10th International Multi-Conference on Computing in the Global Information Technology (ICCGI 2015)

      Volume: 2015 Pages: 83-92

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Systematic Mapping of Security Patterns Research2015

    • Author(s)
      Yurina Ito, Hironori Washizaki, Masatoshi Yoshizawa, Yoshiaki Fukazawa,Takao Okubo, Haruhiko Kaiya, Atsuo Hazeyama, Nobukazu Yoshioka, Eduardo B. Fernandez
    • Journal Title

      Proceedings of the 22nd Conference on Pattern Languages of Programs Conference 2015 (PLoP 2015)

      Volume: 2015

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] A Method for Efficient Extensibility Improvements in Embedded Software Evolution2015

    • Author(s)
      Takanori Sasaki, Nobukazu Yoshioka, Yasuyuki Tahara and Akihiko Ohsuga
    • Journal Title

      7th International Conference on Software Technology and Engineering (ICSTE)

      Volume: 2015 Issue: 12 Pages: 1375-1388

    • DOI

      10.17706/jsw.10.12.1375-1388

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-26330081, KAKENHI-PROJECT-24300005
  • [Journal Article] Security Requirements Analysis using Knowledge in CAPEC2014

    • Author(s)
      Haruhiko Kaiya, Sho Kouno, Shinpei Ogata, Takuo Okubo, Nobukazu Yoshioka, Hironori Washizaki and Kenji Kaijiri
    • Journal Title

      Proc. of The Fourth International Workshop on Information Systems Security Engineering - WISSE'14, LNBIP 178

      Volume: - Pages: 343-348

    • DOI

      10.1007/978-3-319-07869-4_32

    • ISBN
      9783319078687, 9783319078694
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005, KAKENHI-PROJECT-24300011
  • [Journal Article] Network traffic optimization architecture for scalability in academic inter-cloud computing environments2014

    • Author(s)
      Shigetoshi Yokoyama, Atsushi Matsumoto, Nobukazu Yoshioka
    • Journal Title

      Proc. of International Workshop on Hot Topics in Cloud service Scalability (HotTopiCS-2014)

      Volume: 2014

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Design Verification by Model Checking2014

    • Author(s)
      吉岡信和,田辺良則,田原康之,長谷川哲夫,磯部祥尚
    • Journal Title

      Computer Software

      Volume: 31 Issue: 4 Pages: 4_40-4_65

    • DOI

      10.11309/jssst.31.4_40

    • NAID

      130004892301

    • ISSN
      0289-6540
    • Language
      Japanese
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23240003, KAKENHI-PROJECT-24300005, KAKENHI-PROJECT-26330081
  • [Journal Article] On-demand cloud architecture for academic community cloud2014

    • Author(s)
      Shigetoshi Yokoyama, Nobukazu Yoshioka
    • Journal Title

      Proc. of 4th International Conference on cloud computing and service science

      Volume: - Pages: 661-670

    • DOI

      10.5220/0004969606610670

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Security and Privacy Behavior Definition for Behavior Driven Development2014

    • Author(s)
      Takao Okubo, Yoshio Kakizaki, Yoshinori Kobashi, Hironori Washizaki, Shinpei Ogata, Haruhiko Kaiya and Nobukazu Yoshioka
    • Journal Title

      Proceedings of The 15th International Conference of Product Focused Software Development and Process Improvement (PROFES 2014)

      Volume: - Pages: 306-309

    • DOI

      10.1007/978-3-319-13835-0_28

    • ISBN
      9783319138343, 9783319138350
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005, KAKENHI-PROJECT-24300011
  • [Journal Article] 業務プロセスの品質の判定法2014

    • Author(s)
      河本高文, 二木厚吉, 吉岡信和
    • Journal Title

      コンピュータセキュリティシンポジウム2014論文集

      Volume: - Pages: 260-267

    • NAID

      170000130718

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals2014

    • Author(s)
      Okubo Takao, Kenji Taguchi, Kaiya Haruhiko, Yoshioka Nobukazu
    • Journal Title

      Journal of Information Processing

      Volume: 22 Issue: 3 Pages: 536-546

    • DOI

      10.2197/ipsjjip.22.536

    • NAID

      130004726192

    • ISSN
      1882-6652
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-24300005, KAKENHI-PROJECT-24300011
  • [Journal Article] Validating Security Design Pattern Applications by Testing Design Models2014

    • Author(s)
      Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki,Yoshiaki Fukazawa
    • Journal Title

      International Journal of Secure Software Engineering (IJSSE)

      Volume: 5.4 Pages: 1-30

    • DOI

      10.1109/ares.2013.13

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005, KAKENHI-PROJECT-25280026
  • [Journal Article] Verifying Implementation of Security Design Patterns Using a Test Template2014

    • Author(s)
      Masatoshi Yoshizawa, Takanori Kobashi, Hiroyoshi Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya and Nobukazu Yoshioka
    • Journal Title

      Proceedings of 9th International Conference on Availability, Reliability and Security (ARES2014)

      Volume: - Pages: 178-183

    • DOI

      10.1109/ares.2014.31

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005, KAKENHI-PROJECT-24300011
  • [Journal Article] Evaluation of Flexibility to Changes Focusing on the Variable Structures in Legacy Software2014

    • Author(s)
      Takanori Sasaki, Nobukazu Yoshioka, Yasuyuki Tahara, Akihiko Ohsuga
    • Journal Title

      Proc. of 11th Joint conference on Knowledge-Based Software Engineering 2014

      Volume: - Pages: 252-269

    • DOI

      10.1007/978-3-319-11854-3_22

    • ISBN
      9783319118536, 9783319118543
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005, KAKENHI-PROJECT-26330081
  • [Journal Article] Abstract security patterns for requirements and analysis of secure systems2014

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki and Joseph Yoder
    • Journal Title

      Proc. of 17th Workshop on Requirements Engineering (WER 2014)

      Volume: -

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Requirements Refinement and Exploration of Architecture for Security and Other NFRs2014

    • Author(s)
      Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya
    • Journal Title

      The Fourth International Workshop on Information Systems Security Engineering - WISSE'14

      Volume: LNBIP 178 Pages: 286-298

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300011
  • [Journal Article] Requirements Refinement and Exploration of Architecture for Security and Other NFRs2014

    • Author(s)
      Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya
    • Journal Title

      Proc. of The Fourth International Workshop on Information Systems Security Engineering - WISSE'14, LNBIP 178

      Volume: - Pages: 286-298

    • DOI

      10.1007/978-3-319-07869-4_27

    • ISBN
      9783319078687, 9783319078694
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Validating Security Design Pattern Applications by Testing Design Models2014

    • Author(s)
      Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki,Yoshiaki Fukazawa
    • Journal Title

      International Journal of Secure Software Engineering (IJSSE)

      Volume: Vol.5, No.4 Issue: 4 Pages: 1-30

    • DOI

      10.4018/ijsse.2014100101

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300011, KAKENHI-PROJECT-25330091
  • [Journal Article] アカデミッククラウドアーキテクチャの提案と評価2013

    • Author(s)
      横山重俊, 桑田喜隆, 吉岡信和
    • Journal Title

      情報処理学会論文誌

      Volume: 54 (2) Pages: 688-698

    • NAID

      110009537067

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model.2012

    • Author(s)
      Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
    • Journal Title

      COMPSAC Workshops 2012

      Volume: 2012 Pages: 367-372

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns2012

    • Author(s)
      Takao Okubo, Haruhiko Kaiya, and Nobukazu Yoshioka
    • Journal Title

      International Journal of Secure Software Engineering (IJSSE), IGI Global

      Volume: Vol.3, No.1 Issue: 1 Pages: 37-61

    • DOI

      10.4018/jsse.2012010103

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500042, KAKENHI-PROJECT-23510210, KAKENHI-PROJECT-24300011
  • [Journal Article] Cluster as a Service for Self-Deployable Cloud Applications2012

    • Author(s)
      Shigetoshi Yokoyama,Nobukazu Yoshioka
    • Journal Title

      International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012

      Volume: - Pages: 703-704

    • DOI

      10.1109/ccgrid.2012.64

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23240003, KAKENHI-PROJECT-24300005
  • [Journal Article] Multilevel Modeling of Physiological Systems and Simulation Platform : PhysioDesigner, Flint and Flint K3 Service.2012

    • Author(s)
      Yoshiyuki Asai, Takeshi Abe, Masao Okita, Tomohiro Okuyama, Nobukazu Yoshioka, Shigetoshi Yokoyama, Masaru Nagaku, Kerrichi Hagihara, Hiroaki Kitano
    • Journal Title

      SAINT 2012

      Volume: 2012 Pages: 215-219

    • DOI

      10.1109/saint.2012.40

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] System security requirements analysis with answer set programming2012

    • Author(s)
      Gideon D. Bibu, Nobukazu Yoshioka, Julian Padget
    • Journal Title

      RESS 2012

      Volume: 2012 Pages: 10-13

    • DOI

      10.1109/res4.2012.6347689

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] An Academic Community Cloud Architecture for Science Applications2012

    • Author(s)
      Shigetoshi Yokoyama, Nobukazu Yoshioka
    • Journal Title

      SAINT 2012

      Volume: 2012 Pages: 108-112

    • DOI

      10.1109/saint.2012.23

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Journal Article] Dodai-Deploy: Fast Cluster Deployment Tool2012

    • Author(s)
      Shigetoshi Yokoyama,Nobukazu Yoshioka
    • Journal Title

      19th International Conference on Web Services (ICWS)

      Volume: - Pages: 681-682

    • DOI

      10.1109/icws.2012.71

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23240003, KAKENHI-PROJECT-24300005
  • [Journal Article] セキュリティの知識を共有するセキュリティパターン2011

    • Author(s)
      吉岡信和
    • Journal Title

      情報処理学会, 情報処理

      Volume: Vol.52,No.9,

    • Data Source
      KAKENHI-PROJECT-23510210
  • [Journal Article] セキュリティの知識を共有するセキュリティパターン2011

    • Author(s)
      吉岡信和
    • Journal Title

      情報処理学会、情報処理

      Volume: Vol. 52, No. 9 Pages: 1134-1139

    • URL

      https://ipsj.ixsq.nii.ac.jp/ej/?action=pages_view_main&active_action=repository_view_main_item_detail&item_id=75807&item_no=1&page_id=13&block_id=8

    • Data Source
      KAKENHI-PROJECT-23510210
  • [Journal Article] Effective Security Impact Analysis with Patterns for Software Enhancement2011

    • Author(s)
      Takao Okubo, Haruhiko Kaiya and Nobukazu Yoshioka
    • Journal Title

      2011 International Conference on Availability, Reliability and Security (ARES 2011), IEEE

      Volume: ARES2011 Pages: 527-534

    • DOI

      10.1109/ares.2011.79

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Journal Article] セキュリティソフトウェア工学の研究動向2011

    • Author(s)
      吉岡信和,大久保隆夫,宗藤 誠治
    • Journal Title

      日本ソフトウェア科学会, コンピュータソフトウェア

      Volume: Vol.28, No.3 Pages: 43-60

    • NAID

      10029651011

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Journal Article] An approach to model-based development of secure and reliable systems2011

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, Michael VanHilst
    • Journal Title

      011 International Conference on Availability, Reliability and Security (ARES 2011), IEEE

      Volume: ARES2011 Pages: 260-265

    • DOI

      10.1109/ares.2011.45

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Journal Article] 無線センサネットワークにおける複数プログラムの動的配備2009

    • Author(s)
      末永俊一郎, 吉岡信和, 本位田真一
    • Journal Title

      情報処理学会論文誌 Vol.50,No.1

      Pages: 14-30

    • NAID

      110007970301

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Journal Article] Group Migration by Mobile Agents in Wireless Sensor Networks2009

    • Author(s)
      Suenaga, S., Yoshioka, N., Honiden S.
    • Journal Title

      The Computer Journal, Oxford University Press Vol.2009(オンライン)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300008
  • [Journal Article] パターン間の関係を考慮したセキュリティパターン適用支援2009

    • Author(s)
      城間祐輝, 久保淳人, 吉岡信和, 鷲崎弘宜, 深澤良彰
    • Journal Title

      ソフトウェアエンジニアリング最前線2009

      Pages: 75-82

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Journal Article] Misuse cases +Assets + Security Goals2009

    • Author(s)
      Takao Okubo, Kenji Taguchi, Nobukazu Yoshioka
    • Journal Title

      Proc.of Workshop on Software Security Process (SSP09), IEEE

      Pages: 424-429

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Journal Article] セキュリティ要求工学の概要と展望2009

    • Author(s)
      吉岡信和、Bashar Nuseibeh
    • Journal Title

      情報処理 Vol.50, No.3

      Pages: 187-192

    • Data Source
      KAKENHI-PROJECT-20700036
  • [Journal Article] SQUAREではじめるセキュリティ要求工学2009

    • Author(s)
      Nancy R.Mead, 吉岡信和
    • Journal Title

      情報処理 Vbl.50, No.3

      Pages: 193-197

    • Data Source
      KAKENHI-PROJECT-20700036
  • [Journal Article] Group Migration by Mobile Agents in Wireless Sensor Networks2009

    • Author(s)
      Suenaga, S., Yoshioka, N., Honiden, S.
    • Journal Title

      The Computer Journal, Oxford University Press 2009(オンライン)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300008
  • [Journal Article] SQUAREではじめるセキュリティ要求工学2009

    • Author(s)
      Nancy R. Mead, 吉岡信和
    • Journal Title

      情報処理 Vol.50, No.3

      Pages: 193-197

    • Data Source
      KAKENHI-PROJECT-20700036
  • [Journal Article] セキュリティ要求工学の概要と展望2009

    • Author(s)
      吉岡信和, Bashar Nuseibeh
    • Journal Title

      情報処理 Vol.50, No.3

      Pages: 187-192

    • Data Source
      KAKENHI-PROJECT-20700036
  • [Journal Article] パターン間の関係を考慮したセキュリティパターン適用支援2009

    • Author(s)
      城間祐輝, 久保淳人, 吉岡信和, 鷲崎弘宜, 深澤良彰
    • Journal Title

      ソフトウェアエンジニアリング最前線 2009

      Pages: 75-82

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Journal Article] Misuse cases+Assets+Security Goals2009

    • Author(s)
      Takao Okubo, Kenji Taguchi, Nobukazu Yoshioka
    • Journal Title

      Proc.of Workshop on Software Security Process(SSP09), IEEE

      Pages: 424-429

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Journal Article] A Survey on Security Patterns2008

    • Author(s)
      吉岡信和、鷲崎弘宜、丸山勝久
    • Journal Title

      Progress in Informatics 5

      Pages: 35-47

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17700084
  • [Journal Article] ユビキタスコンピューティングにおけるアプリケーション開発手法に関する研究動向2008

    • Author(s)
      鄭顕志, 中川博之, 川俣洋次郎, 吉岡信和, 深澤良彰, 本位田真一
    • Journal Title

      日本ソフトウェア科学会 Vol. 25, No. 4

      Pages: 121-132

    • NAID

      130004892114

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Journal Article] ユビキタスコンピューティングにおけるアプリケーション開発手法に関する研究動向2008

    • Author(s)
      鄭顕志, 中川博之, 川俣洋次郎, 吉岡信和, 深澤良彰, 本位田真一
    • Journal Title

      コンピュータソフトウェア Vol.25, No.4

      Pages: 121-132

    • NAID

      130004892114

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300008
  • [Journal Article] 無線センサネットワークにおける複数プログラムの動的配備2008

    • Author(s)
      末永俊一郎, 吉岡信和, 本位田真一
    • Journal Title

      情報処理学会論文誌 Vol. 50, No. 1

      Pages: 14-30

    • NAID

      110007970301

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Journal Article] ユビキタスコンピューティングにおける分散協調・連携技術の研究動向2008

    • Author(s)
      石川冬樹, 阿部玲, 高橋竜一, 吉岡信和, 深澤良彰, 本位田真一
    • Journal Title

      日本ソフトウェア科学会 Vol. 25, No. 4

      Pages: 133-144

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Journal Article] ユビキタスコンピューティングにおける分散協調・連携技術の研究動向2008

    • Author(s)
      石川冬樹, 阿部玲, 高橋竜一, 吉岡信和, 深澤良彰, 本位田真一
    • Journal Title

      コンピュータソフトウェア Vol.25, No.4

      Pages: 133-144

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300008
  • [Journal Article] A Survey on Security Patterns2008

    • Author(s)
      Nobukazu Yoshioka, Hironori Washizaki, Katsuhisa Maruyama
    • Journal Title

      Progress in Informatics, National Institute of Informatics

      Pages: 35-47

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Journal Article] 適応エージェントのためのユビキタスコンピューティングミドルウェア2008

    • Author(s)
      鄭顕志, 石川冬樹, 吉岡信和, 深澤良彰, 本位田真一
    • Journal Title

      コンピュータソフトウェア Vol.25, No.4

      Pages: 11-19

    • NAID

      110006990882

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300008
  • [Journal Article] A Survey on Security Patterns2008

    • Author(s)
      Nobukazu Yoshioka, Hironori Washizaki, and Katsuhisa Maruyama,
    • Journal Title

      Progress in Informatics, National Institute of Informatics 5

      Pages: 35-47

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Journal Article] 適応エージェントのためのユビキタスコンピューティングミドルウェア2008

    • Author(s)
      鄭顕志, 石川冬樹, 吉岡信和, 深澤良彰, 本位田真一
    • Journal Title

      日本ソフトウェア科学会 Vol. 25, No. 4

      Pages: 11-19

    • NAID

      110006990882

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Journal Article] ゴール指向要求工学の体系化のための共通用語2006

    • Author(s)
      田原 康之, 長野 伸一, 吉岡 信和, 本位田 真一
    • Journal Title

      情報処理学会論文誌 47・2

      Pages: 596-608

    • NAID

      110004081268

    • Data Source
      KAKENHI-PROJECT-17700084
  • [Presentation] Robustness-based Security Case Verification for Deep Neural Networks2024

    • Author(s)
      Martin Gutsche, Takumi Ayukawa, Jati H. Husen, Jomphon Runpakprakun, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa
    • Organizer
      10th Asian Conference on Pattern Languages of Programs, People, and Practices (AsianPLoP 2024)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K18470
  • [Presentation] Automatic Detection of Abstract-Concrete Relationships between Attack Patterns of ATT&CK and CAPEC with Fine-tuned BERT2023

    • Author(s)
      Takuma Tsuchida, Rikuho Miyata, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa
    • Organizer
      10th International Conference on Dependable Systems and Their Applications (DSA 2023)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K18470
  • [Presentation] Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure2023

    • Author(s)
      Rikuho Miyata, Hironori Washizaki, Kensuke Sumoto, Nobukazu Yoshioka, Yoshiaki Fukazawa, Takao Okubo
    • Organizer
      First International Workshop on Software Vulnerability Management (SVM 2023)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K18470
  • [Presentation] Classification of effects of human-human and human-AI pair programming and patterns on use2023

    • Author(s)
      Yuma Takai, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa
    • Organizer
      30th Conference on Pattern Languages of Programs (PLoP’23)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K18470
  • [Presentation] Log Drift Impact on Online Anomaly Detection Workflows2023

    • Author(s)
      Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka and Yoshiaki Fukazawa
    • Organizer
      24th International Conference on on Product-Focused Software Process Improvement (PROFES 2023)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K18470
  • [Presentation] 開発エンジニア向け機械学習セキュリティ脅威分析技術2022

    • Author(s)
      矢嶋純, 及川孝徳, 森川郁也, 笠原史禎, 乾真季, 吉岡信和
    • Organizer
      2022年 暗号と情報セキュリティシンポジウム(SCIS2022)
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Traceable Business-to-Safety Analysis Framework for Safety-critical Machine Learning Systems2022

    • Author(s)
      Jati H. Husen, Hironori Washizaki, Hnin Thandar Tun, Nobukazu Yoshioka, Hironori Takeuchi and Yoshiaki Fukazawa
    • Organizer
      1st Conference on AI Engineering and Software Engineering for AI (CAIN 2022)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] Analysis of IoT Pattern Descriptions2021

    • Author(s)
      Hironori Washizaki, Atsuo Hazeyama, Takao Okubo, Hideyuki Kanuka, Shinpei Ogata, Nobukazu Yoshioka
    • Organizer
      2021 IEEE/ACM 3rd International Workshop on Software Engineering Research and Practices for the IoT (SERP4IoT 2021)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] Goal-Oriented Machine Learning-Based Component Development Process(poster)2021

    • Author(s)
      Jati H. Husen, Hnin Thandar Tun, Nobukazu Yoshioka, Hironori Washizaki and Yoshiaki Fukazawa
    • Organizer
      24th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Software Engineering Patterns for Machine Learning Applications (SEP4MLA) - Part 3 - Data Processing Architectures2021

    • Author(s)
      Jomphon Runpakprakun, Sien Reeve Ordonez Peralta, Hironori Washizaki, Foutse Khomh, Yann-Gael Gueheneuc, Nobukazu Yoshioka, Yoshiaki Fukazawa
    • Organizer
      28th Conference on Pattern Languages of Programs (PLoP 2021)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] Analysis of IoT Pattern Descriptions2021

    • Author(s)
      Hironori Washizaki, Atsuo Hazeyama, Takao Okubo, Hideyuki, Kanuka, Shinpei Ogata and Nobukazu Yoshioka
    • Organizer
      3rd International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2021), ICSE workshop
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Incidents Are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems (Journal First)2021

    • Author(s)
      Faeq Rimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, and Bashar Nuseibeh
    • Organizer
      ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) 2021
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] KPIツリーを用いた機械学習プロジェクト管理フレームワーク2021

    • Author(s)
      浜田 伸一郎, 吉岡 信和, 内平 直志
    • Organizer
      日本ソフトウェア科学会第 38 回大会 (2021年度)
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Software Engineering Patterns for Machine Learning Applications (SEP4MLA) - Part 3 - Data Processing Architectures2021

    • Author(s)
      Jomphon Runpakprakun, Sien Reeve Ordonez Peralta, Hironori Washizaki, Foutse Khomh, Yann-Gael Gueheneuc, Nobukazu Yoshioka, and Yoshiaki Fukazawa
    • Organizer
      28th Conference on Pattern Languages of Programs (PLoP 2021)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Enterprise Architecture based Representation of Architecture and Design Patterns for Machine Learning Systems2021

    • Author(s)
      Hironori Takeuchi, Takuo Doi, Hironori Washizaki, Satoshi Okuda, and Nobukazu Yoshioka
    • Organizer
      13th Workshop on Service oriented Enterprise Architecture for Enterprise Engineering (SOEA4EE), EDOC Workshop
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Tracing CAPEC Attack Patterns from CVE Vulnerability Information using Natural Language Processing Technique2021

    • Author(s)
      Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka
    • Organizer
      54th Hawaii International Conference on System Sciences (HICSS)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] A Development Method for Safety Node-RED Systems using Discrete Controller Synthesis2021

    • Author(s)
      Takuto Yamauchi, Takanori Hirano, Jialong Li, Takafumi Kawasaki, Yin Chen, Akira Tsuge, Tadashi Okoshi, Jin Nakazawa, Nobukazu Yoshioka, Georgios Palaiokrassas, Antonios Litke, and Kenji Tei
    • Organizer
      14th IEEE International Conference on Internet of Things (IEEE iThings-2021)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST)2021

    • Author(s)
      Tomoko Kaneko, Nobukazu Yoshioka and Ryoichi Sasaki
    • Organizer
      21st IEEE International Conference on Software Quality, Reliability, and Security (QRS 2021)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] 要求獲得上の課題特定のセンスメイキング論的アプローチ2021

    • Author(s)
      中木裕章, 岸本眞一郎, 吉岡信和, 内平直志:機械学習応用システムの要求工学に関する一考察
    • Organizer
      日本ソフトウェア科学会第 38 回大会 (2021年度)
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] DeepPatch: Interactive repair of object detection2020

    • Author(s)
      Junji Hashimoto and Nobukazu Yoshioka
    • Organizer
      2nd International Workshop on Machine Learning Systems Engineering (iMLSE 2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT2020

    • Author(s)
      Tomoko Kaneko, Nobukazu Yoshioka, and Ryoichi Sasaki
    • Organizer
      2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] 機械学習を用いたCVEからCAPECへの関連付け手法の提案2020

    • Author(s)
      鹿子木健太, 野寄祐樹, 鷲崎弘宜, 深澤良彰, 小形真平, 大久保隆夫, 加藤岳久, 鹿糠秀行, 櫨山淳雄, 吉岡信和
    • Organizer
      情報処理学会 第182回DPS・第88回CSEC合同研究発表会
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] Smart SE: Smart Systems and Services Innovative Professional Education Program2020

    • Author(s)
      Hironori Washizaki, Kenji Tei, Kazunori Ueda, Hayato Yamana, Yoshiaki Fukazawa, Shinichi Honiden, Shoichi Okazaki, Nobukazu Yoshioka, Naoshi Uchihira
    • Organizer
      44th IEEE Annual Computers, Software, and Applications Conference (COMPSAC)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] 伝票突合せアセスメント手法の業務プロセスへの適用事例研究2020

    • Author(s)
      河本高文, 二木厚吉, 吉岡信和
    • Organizer
      コンピュータセキュリティシンポジウム 2020
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] A Study on Classification and Integration of Research on both AI and Security in the IoT Era2020

    • Author(s)
      Ryoichi Sasaki, Tomoko Kaneko, and Nobukazu Yoshioka
    • Organizer
      11th International Conference on Information Science and Applications (ICISA2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] STAMP S&S: Layered Modeling for the Complexed System in the Society of AI/IoT2020

    • Author(s)
      Tomoko Kaneko, Nobukazu Yoshioka
    • Organizer
      13th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE 2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling2020

    • Author(s)
      Haruhiko Kaiya, Wataru Fujita, Ryotaro Yamada, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, and Hironori Washizaki
    • Organizer
      13th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE 2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling2020

    • Author(s)
      Haruhiko Kaiya, Wataru Fujita, Ryotaro Yamada, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, and Hironori Washizaki
    • Organizer
      13th International Joint Conference on Knowledge-based Software Engineering (JCKBSE2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] Secure Distributed Publish/Subscribe (P/S) pattern for IoT2020

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki
    • Organizer
      9th Asian Conference on Pattern Languages of Programs (AsianPLoP 2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] 機械学習システム全体としての安全性確保の提案2020

    • Author(s)
      金子朋子, 高橋雄志, 吉岡信和
    • Organizer
      電子情報通信学会 知能ソフトウェア工学研究会
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] A five-layer model for analyses of complex socio-technical systems2020

    • Author(s)
      Tomoko Kaneko, and Nobukazu Yoshioka
    • Organizer
      27nd Conference on Pattern Languages of Programs Conference 2020 (PLoP 2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] A Tool to Manage Traceability on Several Models and Its Use Case2020

    • Author(s)
      Haruhiko Kaiya, Shogo Tatsui, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, and Hironori Washizaki
    • Organizer
      24th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES2020)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] システム理論に基づく事故分析手法CASTによる情報セキュリティ・インシデント分析2020

    • Author(s)
      金子朋子, 高橋雄志, 吉岡信和, 佐々木良一
    • Organizer
      コンピュータセキュリティシンポジウム 2020
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] イベント割込みによる業務プロセスの伝票不整合リスク改善手法2019

    • Author(s)
      河本 高文,二木 厚吉,吉岡 信和
    • Organizer
      コンピュータセキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] A System for Seamlessly Supporting from Security Requirements Analysis to Security Design using a Software Security Knowledge Base2019

    • Author(s)
      Atsuo Hazeyama, Hikaru Miyahara, Takafumi Tanaka, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo and Nobukazu Yoshioka
    • Organizer
      6th International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] How do Engineers Perceive Difficulties in Engineering of Machine-Learning Systems? - Questionnaire Survey2019

    • Author(s)
      Fuyuki Ishikawa, Nobukazu Yoshioka
    • Organizer
      Joint International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice (CESSER-IP 2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17H00732
  • [Presentation] Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques2019

    • Author(s)
      Haruhiko Kaiya, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki
    • Organizer
      23rd International Conference on Knowledge Based and Intelligent Information and Engineering Systems (KES 2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] Designing Secure Software by Testing Application of Security Patterns2019

    • Author(s)
      Takanori Kobashi, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo, Yoshiaki Fukazawa
    • Organizer
      Exploring Security in Software Architecture and Design
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Landscape of IoT Patterns2019

    • Author(s)
      Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo and Eduardo B. Fernandez
    • Organizer
      2019 IEEE/ACM 1st International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] ソフトウェアセキュリティ知識ベースを用いた要求分析及び設計における知識提示手法の提案2019

    • Author(s)
      山田 侑樹, 櫨山 淳雄, 吉岡 信和
    • Organizer
      情報処理学会第81回全国大会
    • Data Source
      KAKENHI-PROJECT-17K00475
  • [Presentation] A System for Seamlessly Supporting from Security Requirements Analysis to Security Design using a Software Security Knowledge Base2019

    • Author(s)
      Atsuo Hazeyama, Hikaru Miyahara, Takafumi Tanaka, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo, Nobukazu Yoshioka
    • Organizer
      The 6th International Workshop on The Evolving Security and Privacy Requirements Engineering (ESPRE 2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] STAMP S&S~システム理論によるセーフティ・セキュリティ統合リスク分析2019

    • Author(s)
      金子 朋子,高橋 雄志,林 浩史,吉岡 信和,大久保 隆夫,佐々木 良一
    • Organizer
      コンピュータセキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] 知識ベースを用いたプライバシーを考慮したソフトウェア開発支援に向けて2019

    • Author(s)
      櫨山淳雄, 鷲崎弘宜, 吉岡信和
    • Organizer
      2019年電子情報通信学会総合大会
    • Data Source
      KAKENHI-PROJECT-17K00475
  • [Presentation] How do Engineers Perceive Difficulties in Engineering of Machine-Learning Systems? - Questionnaire Survey2019

    • Author(s)
      Fuyuki Ishikawa, Nobukazu Yoshioka
    • Organizer
      Joint International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice (CESSER-IP 2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Landscape of IoT patterns2019

    • Author(s)
      Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernandez
    • Organizer
      International Workshop on Software Engineering Research & Practices for the Internet of Things
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Taxonomy and Literature Survey of Security Pattern Research2018

    • Author(s)
      Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Dan Yamamoto, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Takehisa Kato, Takafumi Tanaka, Atsuo Hazeyama, Nobukazu Yoshioka, G Priyalakshmi
    • Organizer
      IEEE Conference on Application, Information and Network Security (AINS)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Taxonomy and Literature Survey of Security Pattern Research2018

    • Author(s)
      Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Dan Yamaoto, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Takehisa Kato, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G Priyalakshmi
    • Organizer
      IEEE Conference on Applications, Information and Network Security (AINS)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17H00732
  • [Presentation] Security Requirement Modeling Support System Using Software Security Knowledge Base2018

    • Author(s)
      Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka
    • Organizer
      IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC2018)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17H00732
  • [Presentation] Evaluating the degree of security of a system built using security patterns2018

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki
    • Organizer
      the 13th International Conference on Availability, Reliability and Security (ARES 2018)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17H00732
  • [Presentation] Evaluating the degree of security of a system built using security patterns2018

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki
    • Organizer
      13th International Conference on Availability, Reliability and Security (ARES)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] 機械学習システムの現状と課題そしてこれからのことを話そう2018

    • Author(s)
      吉岡信和, 石川冬樹
    • Organizer
      第1回機械学習工学ワークショップ(MLSE2018)
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] 機械学習システムがセキュリティに出会うとき2018

    • Author(s)
      吉岡信和
    • Organizer
      第1回機械学習工学ワークショップ(MLSE2018)
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Security Requirement Modeling Support System Using Software Security Knowledge Base2018

    • Author(s)
      Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka
    • Organizer
      IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Taxonomy and Literature Survey of Security Pattern Research2018

    • Author(s)
      Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Dan Yamaoto, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Takehisa Kato, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G Priyalakshmi
    • Organizer
      IEEE Conference on Applications, Information and Network Security (AINS)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes2018

    • Author(s)
      Hua Cai, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
    • Organizer
      The International Workshop on Evidence-based Security and Privacy in the Wild (WESPr)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03340
  • [Presentation] Eliciting Requirements for Improving Users' Behavior Using Transparency2017

    • Author(s)
      aruhiko Kaiya, Nobukazu Yoshioka, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata, Takafumi Tanaka
    • Organizer
      4th Asia-Pacific Symposium on Requirements Engineering for Internet of Things
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17H00732
  • [Presentation] Cloud Security and Privacy Metamodel: Metamodel for Security and Privacy Knowledge in Cloud Services2017

    • Author(s)
      Tian Xia, Hironori Washizaki, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernandez, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto, Takao Okubo, Nobukazu Yoshioka and Atsuo Hazeyama
    • Organizer
      6th International Conference on Model-Driven Engineering and Software Development
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] 業務プロセスの信頼性のアセスメントツール2017

    • Author(s)
      河本 高文,二木 厚吉,吉岡 信和
    • Organizer
      コンピュータセキュリティシンポジウム 2017
    • Data Source
      KAKENHI-PROJECT-15KK0018
  • [Presentation] Preliminary Systematic Literature Review of Software and Systems Traceability2017

    • Author(s)
      Haruhiko Kaiya, Ryohei Sato, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Takafumi Tanaka, Nobukazu Yoshioka, Hironori Washizaki
    • Organizer
      the 21st International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES2017)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17H00732
  • [Presentation] Preliminary Systematic Literature Review of Software and Systems Traceability2017

    • Author(s)
      Haruhiko Kaiya, Ryohei Sato, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Takafumi Tanaka, Nobukazu Yoshioka and Hironori Washizaki
    • Organizer
      21st International Conference on Knowledge-Based and Intelligent Information & Engineering Systems
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02804
  • [Presentation] Current and Future challenge of Model and Modeling on Security and Privacy2016

    • Author(s)
      Nobukazu Yoshioka
    • Organizer
      The 1st International Workshop for Models and Modelling on Security and Privacy
    • Place of Presentation
      Gifu, Japan
    • Year and Date
      2016-11-14
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Presentation] Pattern varieties and their uses in building systems2016

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka and Hironori Washizaki
    • Organizer
      The Third International Workshop on Patterns Promotion and Anti-patterns Prevention
    • Place of Presentation
      大阪大学、大阪府吹田市
    • Year and Date
      2016-03-15
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Presentation] ミニブログを利用した避難行動推薦 (2)―自己適応システム技術の適用―2015

    • Author(s)
      田原康之, 大須賀昭彦, 川村隆浩, 清雄一, 中川博之, 吉岡信和, 松本一教, 一色正男
    • Organizer
      電子情報通信学会総合大会
    • Place of Presentation
      滋賀県草津市
    • Year and Date
      2015-03-13
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Presentation] ミニブログを利用した避難行動推薦 (1)―システム概要―2015

    • Author(s)
      大須賀昭彦, 田原康之, 川村隆浩, 清雄一, 中川博之, 吉岡信和, 松本一教, 一色正男
    • Organizer
      電子情報通信学会総合大会
    • Place of Presentation
      滋賀県草津市
    • Year and Date
      2015-03-13
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Presentation] ミニブログを利用した避難行動推薦 (3)―プライバシ保護データマイニングの適用―2015

    • Author(s)
      清雄一, 大須賀昭彦, 田原康之, 川村隆浩, 中川博之, 吉岡信和, 松本一教, 一色正男
    • Organizer
      電子情報通信学会総合大会
    • Place of Presentation
      滋賀県草津市
    • Year and Date
      2015-03-13
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Presentation] Systematic Mapping of Security Patterns Research2015

    • Author(s)
      Yurina Ito, Hironori Washizaki, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Atsuo Hazeyama, Nobukazu Yoshioka, Eduardo B. Fernandez
    • Organizer
      the 22nd Conference on Pattern Languages of Programs Conference 2015
    • Place of Presentation
      Pennsylvania, USA
    • Year and Date
      2015-10-24
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Presentation] Finding Potential Threats in Several Security Targets for Eliciting Security Requirements2015

    • Author(s)
      Haruhiko Kaiya, Shinpei Ogata, Shinpei Hayashi, Motoshi Saeki, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, Atsuo Hazeyama
    • Organizer
      10th International Multi-Conference on Computing in the Global Information Technology (ICCGI 2015)
    • Place of Presentation
      Malta
    • Year and Date
      2015-10-14
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02686
  • [Presentation] シーケンス図を用いたモデル検査支援ツール2014

    • Author(s)
      後藤隼弐, 吉岡信和
    • Organizer
      日本ソフトウェア科学会第31回大会
    • Place of Presentation
      愛知県名古屋市
    • Year and Date
      2014-09-09
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Presentation] CPU使用率とメモリ帯域使用率を考慮した性能予測手法2014

    • Author(s)
      若林昇, 吉岡信和
    • Organizer
      第72回MBL・第11回CDS合同研究発表会
    • Place of Presentation
      神奈川県横浜市
    • Year and Date
      2014-08-29
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Presentation] 広大な「マップ」を活用したクラウド監視システムの実運用への適用2014

    • Author(s)
      谷沢智史,中川晋吾,金指文明,西村一彦,長久勝,横山重俊,吉岡信和
    • Organizer
      情報通信マネジメント研究会(ICM)
    • Place of Presentation
      沖縄県久米島町
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Presentation] リスク分析手法とモデル検査を組合せた高信頼設計プロセスの提案2013

    • Author(s)
      若林昇, 吉岡信和
    • Organizer
      情報処理学会ソフトウェア工学研究会
    • Place of Presentation
      化学会館(東京都)
    • Year and Date
      2013-03-12
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Presentation] プライベートプラウド監視ツールの開発に向けた一考察2013

    • Author(s)
      谷沢智史,西村一彦,長久勝,横山重俊,吉岡信和
    • Organizer
      サービスコンピューティング研究専門委員会 第5回研究会
    • Place of Presentation
      東京都千代田区
    • Data Source
      KAKENHI-PROJECT-24300005
  • [Presentation] モデルテストによるセキュリティ分析・設計パターンの適用支援2012

    • Author(s)
      小橋孝紀, 大久保隆夫, 海谷治彦, 吉岡信和, 伊永祥太, 鷲崎弘宜, 深潭良彰
    • Organizer
      コンピュータセキュリティシンポジウム2012
    • Place of Presentation
      松江市くにびきメッセ
    • Year and Date
      2012-10-30
    • Data Source
      KAKENHI-PROJECT-24300011
  • [Presentation] Mutual Refinement of Security Requirements and Architecture using Tw in Peaks Model2012

    • Author(s)
      Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
    • Organizer
      The 6th IEEE International Workshop on Require ments Engineering for Services
    • Place of Presentation
      Izmir, Turkey
    • Year and Date
      2012-07-16
    • Data Source
      KAKENHI-PROJECT-24300011
  • [Presentation] System security requirements analysis with answer set programming2012

    • Author(s)
      Gideon D. Bibu, Nobukazu Yoshioka, Julian Padget
    • Organizer
      Second IEEE International Workshop Oil Requirements Engineering for Systems, Services, and Systems-of-Systems (RESS 2012)
    • Place of Presentation
      Chicago, IL, USA
    • Year and Date
      2012-09-25
    • Data Source
      KAKENHI-PROJECT-24300011
  • [Presentation]2012

    • Author(s)
      Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
    • Organizer
      The 6th IEEE International Workshop on Requirements Engineering for Services
    • Year and Date
      2012-07-16
    • Invited
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Presentation] Misuse Patterns for Cloud Computing2011

    • Author(s)
      Keiko Hashizume, Eduardo B. Fernandez, Nobukazu Yoshioka
    • Organizer
      The 23rd International Conference on Software
    • Place of Presentation
      Miami Beach, USA
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Presentation] Aligning Security Requirements and Security Assurance Using the Common Criteria2010

    • Author(s)
      Kenji Taguchi, Nobukazu Yoshioka, Takayuki Tobita, Hiroyuki Kaneko
    • Organizer
      2010 Fourth International Conference on Secure Software Integration and Reliability Improvement (SSIRI 2010)
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Presentation] Model-Driven Security Patterns Application and Validation2010

    • Author(s)
      Yuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka, Eduardo B.Fernandez
    • Organizer
      17th Conference on Pattern Languages of Programs (PLoP 2010)
    • Place of Presentation
      Reno/Tahoe Nevada, USA
    • Year and Date
      2010-10-16
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Presentation] Model-Driven Security Patterns Application and Validation2010

    • Author(s)
      Yuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka, Eduardo B.Fernandez
    • Organizer
      17th Conference on Pattern Languages of Programs(PLoP2010)
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Presentation] モデル検査ツールを使った設計モデルの検証2009

    • Author(s)
      吉岡信和
    • Organizer
      Modeling Forum 2009
    • Place of Presentation
      東京ミッドタウンホール(東京都港区)
    • Year and Date
      2009-09-18
    • Data Source
      KAKENHI-PROJECT-20500144
  • [Presentation] Generative Dynamic Deployment of Multiple Components in wireless Sensor Networks2009

    • Author(s)
      Shunichiro Suenaga, Nobukazu Yoshioka, Shinichi Honiden
    • Organizer
      Poster at the The Sixth International Conference on Wireless On-demand Network Systems and Services (WONS 2009)
    • Place of Presentation
      Snowbird, Utah, USA
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Presentation] コモンクライテリアのためのモデリング手法の提案2009

    • Author(s)
      吉岡信和, 田口研治, 飛田孝幸, 金子浩之
    • Organizer
      情報処理学会 168回ソフトウェア工学研究会
    • Place of Presentation
      (株)インターネットイニシアティブ 東京本社
    • Year and Date
      2009-05-28
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Presentation] モデル検査ツールを使った設計モデルの検証2009

    • Author(s)
      吉岡信和
    • Organizer
      Modeling Forum
    • Place of Presentation
      東京ミッドタウンホール
    • Year and Date
      2009-09-18
    • Data Source
      KAKENHI-PROJECT-20500144
  • [Presentation] Misuse vases+Assets+Security Goals2009

    • Author(s)
      Nobukazu Yoshioka
    • Organizer
      Workshop on Software Security Process(SSP'09)
    • Place of Presentation
      Vancouver, Canada
    • Year and Date
      2009-08-29
    • Data Source
      KAKENHI-PROJECT-20500144
  • [Presentation] コモンクライテリアのためのモデリング手法の提案2009

    • Author(s)
      吉岡信和, 田口研治, 飛田孝幸, 金子浩之
    • Organizer
      情報処理学会168回ソフトウェア工学研究会
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Presentation] 第15回プログラムのパターンランゲージ会議(PLoP2008)2009

    • Author(s)
      久保淳人, 鷲崎弘宜, 井庭崇, 吉岡信和, 大久保隆夫
    • Organizer
      情報処理学会第163回ソフトウェア工学研究会
    • Place of Presentation
      千代田区神田(東京都)
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Presentation] Transparent Application Lifetime Management in Wireless Sensor Networks2008

    • Author(s)
      Eric Platon, Shunichiro Suenaga, Nobukazu Yoshioka, Shinichi Honiden
    • Organizer
      Demo Track of the 10th International Conference on Ubiquitous Computing (Ubi Comp 2008)
    • Place of Presentation
      Seoul, South Korea
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Presentation] Classifying security patterns2008

    • Author(s)
      Eduardo Fernandez, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo. Yoshiaki Fukuzawa
    • Organizer
      the 10th Asia Pacific Web Conference
    • Place of Presentation
      中国Shenyang(瀋陽)Inter Continental Shenyang Hotel
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Presentation] Education Course of Practical Model Checking2008

    • Author(s)
      Yasuyuki Tahara, Nobukazu Yoshioka, Kenji Taguchi, Toshiaki Aoki, Shinichi Honiden
    • Organizer
      First International Workshop on Formal Methods Education and Training (FMET) 2008
    • Place of Presentation
      Kitakyushu-City, Japan, (福岡)
    • Year and Date
      2008-10-28
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Presentation] Classifying security patterns2008

    • Author(s)
      Eduardo Fernandez, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo, Yoshiaki Fukuzawa
    • Organizer
      The 10th Asia Pacific Web Conference (APWeb2008)
    • Place of Presentation
      Shenyang, China
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Presentation] Classifying security patterns2008

    • Author(s)
      Eduardo Fernandez, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo, Yoshiaki Fukuzawa
    • Organizer
      the 10th Asia Pacific Web Conference
    • Data Source
      KAKENHI-PROJECT-20700036
  • [Presentation] ユビキタスコンピューティングにおけるイベントに基づいたアクセス制御2008

    • Author(s)
      石川冬樹, 清雄一, 吉岡信和, 本位田真一
    • Organizer
      マルチメディア, 分散, 協調とモバイルシンポジウム(DICOMO2008)
    • Place of Presentation
      北海道札幌市
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Presentation] Transparent Application Lifetime Management in Wireless Sensor Networks2008

    • Author(s)
      Eric Platon Shunichiro Suenaga, Nobukazu Yoshioka, Shinichi Honiden
    • Organizer
      Demo Track of the 10th International Conference on Ubiquitous Computing (UbiComp 2008)
    • Place of Presentation
      Seoul, South Korea
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Presentation] アタックパターンの設計とそれに基づく分散システムの脆弱性の分析2007

    • Author(s)
      吉岡信和、本位田真一
    • Organizer
      日本ソフトウェア科学会
    • Place of Presentation
      山口県(日本)
    • Year and Date
      2007-11-08
    • Data Source
      KAKENHI-PROJECT-17700084
  • [Presentation] アタックパターンの設計とそれに基づく分散システムの脆弱性の分析2007

    • Author(s)
      吉岡信和
    • Organizer
      ソフトウェア工学の基礎ワークショップ(FOSE2007)
    • Place of Presentation
      山口県下関
    • Data Source
      KAKENHI-PROJECT-19200003
  • [Presentation] Security Driven Requirements Refinement and Exploration of Architecture with multiple NFR points of view

    • Author(s)
      Takao Okubo, Nobukazu Yoshioka and Haruhiko Kaiya
    • Organizer
      15th IEEE International Symposium on High Assurance Systems Engineering (HASE 2014)
    • Place of Presentation
      Miami, Florida, USA
    • Data Source
      KAKENHI-PROJECT-24300011
  • [Presentation] Goal-Oriented Security Requirements Analysis for a System used in Several Different Activities

    • Author(s)
      Haruhiko Kaiya, Takao Okubo, Nobuyuki Kanaya, Yuji Suzuki, Shinpei Ogata, Kenji Kaijiri and Nobukazu Yoshioka
    • Organizer
      The Third International Workshop on Information Systems Security Engineering
    • Place of Presentation
      Spain
    • Data Source
      KAKENHI-PROJECT-24300011
  • [Presentation] Goal-Oriented Security Requirements Analysis for a System used in Several Different Activities

    • Author(s)
      Haruhiko Kaiya, Takao Okubo, Nobuyuki Kanaya, Yuji Suzuki, Shinpei Ogata, Kenji Kaijiri and Nobukazu Yoshioka
    • Organizer
      The Third International Workshop on Information Systems Security Engineering
    • Place of Presentation
      Spain
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Presentation] Validating Security Design Pattern Applications Using Model Testing

    • Author(s)
      Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki,Yoshiaki Fukazawa
    • Organizer
      2013 International Conference on Availability, Reliability and Security (ARES 2013),
    • Place of Presentation
      University of Regensburg, Germany
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Presentation] Security Driven Requirements Refinement and Exploration of Architecture with multiple NFR points of view

    • Author(s)
      Takao Okubo, Nobukazu Yoshioka and Haruhiko Kaiya
    • Organizer
      15th IEEE International Symposium on High Assurance Systems Engineering (HASE 2014)
    • Place of Presentation
      Miami, Florida, USA
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Presentation] Model-Assisted Access Control Implementation for Code-centric Ruby on Rails Web Application Development

    • Author(s)
      Seiji Munetoh and Nobukazu Yoshioka
    • Organizer
      The Eight International Workshop on Frontiers in Availability, Reliability and Security (FARES 2013 )
    • Place of Presentation
      University of Regensburg, Germany
    • Data Source
      KAKENHI-PROJECT-24300011
  • [Presentation] Model-Assisted Access Control Implementation for Code-centric Ruby on Rails Web Application Development

    • Author(s)
      Seiji Munetoh and Nobukazu Yoshioka
    • Organizer
      The Eight International Workshop on Frontiers in Availability, Reliability and Security (FARES 2013 )
    • Place of Presentation
      University of Regensburg, Germany
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Presentation] Validating Security Design Pattern Applications Using Model Testing

    • Author(s)
      Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki,Yoshiaki Fukazawa
    • Organizer
      2013 International Conference on Availability, Reliability and Security (ARES 2013)
    • Place of Presentation
      University of Regensburg, Germany
    • Data Source
      KAKENHI-PROJECT-24300011
  • [Presentation] System security requirements analysis with answer set programming

    • Author(s)
      Kaiya, Nobukazu Yoshioka
    • Organizer
      Second IEEE International Workshop on Requirements Engineering for Systems, Services, and Systems-of-Systems (RESS 2012)
    • Place of Presentation
      Chicago, IL, USA
    • Data Source
      KAKENHI-PROJECT-23510210
  • [Presentation] Abstract security patterns for requirements and analysis of secure systems

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki and Joseph Yoder
    • Organizer
      17th Workshop on Requirements Engineering(WER 2014)
    • Place of Presentation
      Pucon, Chili
    • Year and Date
      2014-04-23 – 2014-04-25
    • Data Source
      KAKENHI-PROJECT-24300011
  • [Presentation] Patterns for cloud firewalls

    • Author(s)
      Eduardo B. Fernandez, Nobukazu Yoshioka and Hironori Washizaki
    • Organizer
      3rd Asian Conference on Pattern Languages of Programs (AsianPLoP 2014)
    • Place of Presentation
      国立情報学研究所(学術総合センター), 東京
    • Data Source
      KAKENHI-PROJECT-24300011
  • 1.  WASHIZAKI Hironori (70350494)
    # of Collaborated Projects: 6 results
    # of Collaborated Products: 61 results
  • 2.  OHSUGA Akihiko (90393842)
    # of Collaborated Projects: 5 results
    # of Collaborated Products: 8 results
  • 3.  KAIYA Haruhiko (30262596)
    # of Collaborated Projects: 5 results
    # of Collaborated Products: 36 results
  • 4.  TEI Kenji (40434295)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 5 results
  • 5.  HONIDEN Shinichi (70332153)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 16 results
  • 6.  MATSUMOTO Kazunori (40350673)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 4 results
  • 7.  HAZEYAMA Atsuo (70313278)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 31 results
  • 8.  大久保 隆夫 (80417518)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 32 results
  • 9.  ISHIKAWA Fuyuki (50455193)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 4 results
  • 10.  KAWAMURA Takahiro (10426653)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 3 results
  • 11.  Tahara Yasuyuki (30390602)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 7 results
  • 12.  清 雄一 (20700157)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 3 results
  • 13.  Yu Yijun
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 7 results
  • 14.  Nuseibeh Bashar
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 15.  FUKAZAWA Yoshiaki (20165252)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 16.  MIYAHARA Tetsuhiro (90209932)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 17.  OKAMURA Kenshiro (60194388)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 18.  OKATAKU Yasukuni (70413838)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 19.  Nakagawa Hiroyuki (40508834)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 4 results
  • 20.  Isshiki Masao (90567364)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 3 results
  • 21.  小形 真平 (10589279)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 14 results
  • 22.  本田 澄 (40732938)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 23.  坂本 一憲 (60609139)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 24.  橋浦 弘明 (20597083)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 25.  胡 振江 (50292769)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 26.  江上 周作 (20846000)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 27.  Fernandez Eduardo
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 7 results
  • 28.  SAITO Masahito
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 2 results
  • 29.  深沢 良彰
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 5 results
  • 30.  横山 重俊
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 2 results

URL: 

Are you sure that you want to link your ORCID iD to your KAKEN Researcher profile?
* This action can be performed only by the researcher himself/herself who is listed on the KAKEN Researcher’s page. Are you sure that this KAKEN Researcher’s page is your page?

この研究者とORCID iDの連携を行いますか?
※ この処理は、研究者本人だけが実行できます。

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi