default search action
Takao Okubo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Shuhei Ippa, Takao Okubo, Masaki Hashimoto:
An Analysis of Social Bot Activity on X in Modern Japan. IEEE Access 12: 125800-125808 (2024) - [c42]Shuhei Ippa, Takao Okubo, Masaki Hashimoto:
The Reality and Feature Analysis of Information Diffusion in Japanese Disinformation Examples. AsiaJCIS 2024: 137-142 - [c41]Sho Isogai, Shinpei Ogata, Yutaro Kashiwa, Satoshi Yazawa, Kozo Okano, Takao Okubo, Hironori Washizaki:
Comparison of Methods for Automatically Predicting CVSS Base Vector. COMPSAC 2024: 1029-1034 - 2023
- [j13]Michio Kunimoto, Takao Okubo:
Analysis and Consideration of Detection Methods to Prevent Fraudulent Access by Utilizing Attribute Information and the Access Log History. J. Inf. Process. 31: 602-608 (2023) - [c40]Rikuho Miyata, Hironori Washizaki, Kensuke Sumoto, Nobukazu Yoshioka, Yoshiaki Fukazawa, Takao Okubo:
Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure. SVM 2023: 14-17 - 2022
- [c39]Takao Okubo, Haruhiko Kaiya:
Efficient secure DevOps using process mining and Attack Defense Trees. KES 2022: 446-455 - 2021
- [j12]Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández, Takehisa Kato, Hideyuki Kanuka, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development. Int. J. Syst. Softw. Secur. Prot. 12(2): 68-85 (2021) - [j11]Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G. Priyalakshmi:
Systematic Literature Review of Security Pattern Research. Inf. 12(1): 36 (2021) - [j10]Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka:
Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques. Inf. 12(8): 298 (2021) - [j9]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Takao Okubo:
The design of secure IoT applications using patterns: State of the art and directions for research. Internet Things 15: 100408 (2021) - [c38]Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka:
Tracing CAPEC Attack Patterns from CVE Vulnerability Information using Natural Language Processing Technique. HICSS 2021: 1-9 - [c37]Hironori Washizaki, Atsuo Hazeyama, Takao Okubo, Hideyuki Kanuka, Shinpei Ogata, Nobukazu Yoshioka:
Analysis of IoT Pattern Descriptions. SERP4IoT 2021: 21-26 - 2020
- [j8]Hironori Washizaki, Shinpei Ogata, Atsuo Hazeyama, Takao Okubo, Eduardo B. Fernández, Nobukazu Yoshioka:
Landscape of Architecture and Design Patterns for IoT Systems. IEEE Internet Things J. 7(10): 10091-10101 (2020) - [j7]Masato Kikuchi, Takao Okubo:
Building Cyber Resilience through Polycentric Governance. J. Commun. 15(5): 390-397 (2020) - [j6]Jun Yajima, Yasuhiko Abe, Takayuki Hasebe, Takao Okubo:
Anomaly Detection Method "Cumulative Sum Detection" for In-Vehicle Networks. J. Inf. Process. 28: 65-74 (2020) - [c36]Haruhiko Kaiya, Wataru Fujita, Ryotaro Yamada, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling. JCKBSE 2020: 70-83 - [c35]Haruhiko Kaiya, Shogo Tatsui, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
A Tool to Manage Traceability on Several Models and Its Use Case. KES 2020: 1449-1458
2010 – 2019
- 2019
- [j5]Hayato Shimamoto, Naoto Yanai, Shingo Okamura, Jason Paul Cruz, Shouei Ou, Takao Okubo:
Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache. IEEE Access 7: 74941-74960 (2019) - [c34]Masato Kikuchi, Takao Okubo:
Power of Communication Behind Extreme Cybersecurity Incidents. DASC/PiCom/DataCom/CyberSciTech 2019: 315-319 - [c33]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT patterns. SERP4IoT@ICSE 2019: 57-60 - [c32]Haruhiko Kaiya, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques. KES 2019: 1075-1084 - [c31]Jun Yajima, Takayuki Hasebe, Takao Okubo:
Data Relation Analysis Focusing on Plural Data Transition for Detecting Attacks on Vehicular Network. NBiS 2019: 270-280 - [c30]Atsuo Hazeyama, Hikaru Miyahara, Takafumi Tanaka, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo, Nobukazu Yoshioka:
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base. RE Workshops 2019: 134-140 - [i1]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT Patterns. CoRR abs/1902.09718 (2019) - 2018
- [c29]Tomoko Kaneko, Yuji Takahashi, Takao Okubo, Ryôichi Sasaki:
An Assurance Case Approach for Software Code Security. WESPr-iMLSE@APSEC 2018: 10-17 - [c28]Hua Cai, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes. WESPr-iMLSE@APSEC 2018: 18-25 - [c27]Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka:
Security Requirement Modeling Support System Using Software Security Knowledge Base. COMPSAC (2) 2018: 234-239 - [c26]Takuo Hayakawa, Ryôichi Sasaki, Hiroshi Hayashi, Yuji Takahashi, Tomoko Kaneko, Takao Okubo:
Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT. ICNCC 2018: 157-164 - [c25]Tian Xia, Hironori Washizaki, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services. MODELSWARD 2018: 379-386 - 2017
- [c24]Haruhiko Kaiya, Nobukazu Yoshioka, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata, Takafumi Tanaka:
Eliciting Requirements for Improving Users' Behavior Using Transparency. APRES 2017: 41-56 - [c23]Haruhiko Kaiya, Ryohei Sato, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Takafumi Tanaka, Nobukazu Yoshioka, Hironori Washizaki:
Preliminary Systematic Literature Review of Software and Systems Traceability. KES 2017: 1141-1150 - 2016
- [j4]Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Implementation Support of Security Design Patterns Using Test Templates . Inf. 7(2): 34 (2016) - [c22]Atsuo Hazeyama, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo:
Literature Survey on Technologies for Developing Privacy-Aware Software. RE Workshops 2016: 86-91 - [c21]Hironori Washizaki, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takehisa Kato, Shinpei Ogata, Haruhiko Kaiya, Eduardo B. Fernández, Hideyuki Kanuka, Yuki Kondo, Nobukazu Yoshioka, Takao Okubo, Atsuo Hazeyama:
A Metamodel for Security and Privacy Knowledge in Cloud Services. SERVICES 2016: 142-143 - [c20]Haruhiko Kaiya, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Atsuo Hazeyama:
Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models. SoMeT 2016: 155-166 - 2015
- [c19]Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo:
Case Base for Secure Software Development Using Software Security Knowledge Base. COMPSAC Workshops 2015: 97-103 - [c18]Takanori Kobashi, Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya:
TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing. ICST 2015: 1-8 - [c17]Masahito Saito, Atsuo Hazeyama, Nobukazu Yoshioka, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo:
A Case-based Management System for Secure Software Development Using Software Security Knowledge. KES 2015: 1092-1100 - 2014
- [j3]Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takao Okubo, Yoshiaki Fukazawa:
Validating Security Design Pattern Applications by Testing Design Models. Int. J. Secur. Softw. Eng. 5(4): 1-30 (2014) - [j2]Takao Okubo, Kenji Taguchi, Haruhiko Kaiya, Nobukazu Yoshioka:
MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals. J. Inf. Process. 22(3): 536-546 (2014) - [c16]Masatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Verifying Implementation of Security Design Patterns Using a Test Template. ARES 2014: 178-183 - [c15]Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya:
Requirements Refinement and Exploration of Architecture for Security and Other NFRs. CAiSE Workshops 2014: 286-298 - [c14]Haruhiko Kaiya, Sho Kono, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, Kenji Kaijiri:
Security Requirements Analysis Using Knowledge in CAPEC. CAiSE Workshops 2014: 343-348 - [c13]Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya:
Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View. HASE 2014: 201-205 - [c12]Takao Okubo, Yoshio Kakizaki, Takanori Kobashi, Hironori Washizaki, Shinpei Ogata, Haruhiko Kaiya, Nobukazu Yoshioka:
Security and Privacy Behavior Definition for Behavior Driven Development. PROFES 2014: 306-309 - [c11]Takao Okubo, Yoshiro Wataguchi, Nobuyuki Kanaya:
Threat and countermeasure patterns for cloud computing. RePa 2014: 43-46 - 2013
- [c10]Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Yoshiaki Fukazawa:
Validating Security Design Patterns Application Using Model Testing. ARES 2013: 62-71 - [c9]Haruhiko Kaiya, Takao Okubo, Nobuyuki Kanaya, Yuji Suzuki, Shinpei Ogata, Kenji Kaijiri, Nobukazu Yoshioka:
Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities. CAiSE Workshops 2013: 478-489 - 2012
- [j1]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns. Int. J. Secur. Softw. Eng. 3(1): 37-61 (2012) - [c8]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model. COMPSAC Workshops 2012: 367-372 - [c7]Yoshiro Wataguchi, Takao Okubo, Yukie Unno, Nobuyuki Kanaya:
Cooperative Secure Integration Process for Secure System Development. NBiS 2012: 782-786 - 2011
- [c6]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Effective Security Impact Analysis with Patterns for Software Enhancement. ARES 2011: 527-534
2000 – 2009
- 2009
- [c5]Takao Okubo, Kenji Taguchi, Nobukazu Yoshioka:
Misuse Cases + Assets + Security Goals. CSE (3) 2009: 424-429 - 2008
- [c4]Takao Okubo, Hidehiko Tanaka:
Identifying Security Aspects in Early Development Stages. ARES 2008: 1148-1155 - 2007
- [c3]Takao Okubo, Hidehiko Tanaka:
Secure Software Development through Coding Conventions and Frameworks. ARES 2007: 1042-1051
1990 – 1999
- 1998
- [c2]Takao Okubo, Takahide Matsutsuka, Yuka Tanaka, Hirotaka Hara, Sanya Uehara:
An Optimistic Method for Updating Information in Distributed Collaborative Work. COMPSAC 1998: 400-405 - 1995
- [c1]T. Yoshino, Sanya Uehara, Takao Okubo, S. Suguta, Y. Hotta, M. Sonobe:
Reverse Engineering from COBOL to Narrative Specification. COMPSAC 1995: 284-289
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint