Nobukazu Yoshioka
Orcid: 0000-0002-1986-5675
According to our database1,
Nobukazu Yoshioka
authored at least 166 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Integrated multi-view modeling for reliable machine learning-intensive software engineering.
Softw. Qual. J., September, 2024
Automated Labeling of Entities in CVE Vulnerability Descriptions with Natural Language Processing.
IEICE Trans. Inf. Syst., 2024
Enterprise architecture-based metamodel for machine learning projects and its management.
Future Gener. Comput. Syst., 2024
CoRR, 2024
IEEE Access, 2024
Refining GPT-3 Embeddings with a Siamese Structure for Technical Post Duplicate Detection.
Proceedings of the IEEE International Conference on Software Analysis, 2024
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Proceedings of the IEEE/ACM 3rd International Conference on AI Engineering, 2024
Proceedings of the IEEE/ACM 3rd International Conference on AI Engineering, 2024
Proceedings of the IEEE/ACM 3rd International Conference on AI Engineering, 2024
A Domain Specific Language for Specification of Risk-oriented Object Detection Requirements.
Proceedings of the IEEE/ACM 3rd International Conference on AI Engineering, 2024
2023
Proceedings of the Product-Focused Software Process Improvement, 2023
Proceedings of the 11th International Conference on Model-Based Software and Systems Engineering, 2023
Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure.
Proceedings of the 1st IEEE/ACM International Workshop on Software Vulnerability, 2023
Proceedings of the 4th IEEE/ACM International Workshop on Quantum Software Engineering, 2023
Enterprise Architecture-based Metamodel for a Holistic Business - IT Alignment View on Machine Learning Projects.
Proceedings of the IEEE International Conference on e-Business Engineering, 2023
Automatic Detection of Abstract-Concrete Relationships between Attack Patterns of ATT&CK and CAPEC with Fine-tuned BERT.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023
Activity-based modeling strategy for reliable machine learning system analysis targeting GUI-based applications.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023
Assessment of Real-World Incident Detection Through a Component-Based Online Log Anomaly Detection Pipeline Framework.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023
Proceedings of the 2nd IEEE/ACM International Conference on AI Engineering, 2023
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
2022
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems.
IEEE Trans. Software Eng., 2022
Proceedings of the 24th IEEE/ACIS International Conference on Software Engineering, 2022
Modeling tool for managing canvas-based models traceability in ML system development.
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 2022
Safety and Risk Analysis and Evaluation Methods for DNN Systems in Automated Driving.
Proceedings of the Knowledge-Based Software Engineering: 2022, 2022
Proceedings of the 23rd IEEE International Conference on Information Reuse and Integration for Data Science, 2022
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022
Traceable business-to-safety analysis framework for safety-critical machine learning systems.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022
2021
The design of secure IoT applications using patterns: State of the art and directions for research.
Internet Things, 2021
Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques.
Inf., 2021
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development.
Int. J. Syst. Softw. Secur. Prot., 2021
Int. J. Syst. Softw. Secur. Prot., 2021
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT SERP4IoT 2021, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion, 2021
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
Tracing CAPEC Attack Patterns from CVE Vulnerability Information using Natural Language Processing Technique.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Enterprise Architecture based Representation of Architecture and Design Patterns for Machine Learning Systems.
Proceedings of the 25th International Enterprise Distributed Object Computing Workshop, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the 28th Asia-Pacific Software Engineering Conference Workshops, 2021
Goal-Centralized Metamodel Based Requirements Integration for Machine Learning Systems.
Proceedings of the 28th Asia-Pacific Software Engineering Conference Workshops, 2021
Literature Review on Log Anomaly Detection Approaches Utilizing Online Parsing Methodology.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021
2020
IEEE Internet Things J., 2020
STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Proceedings of the Knowledge-Based Software Engineering: 2020, 2020
Proceedings of the Knowledge-Based Software Engineering: 2020, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each Department.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
Preliminary Systematic Literature Review of Machine Learning System Development Process.
CoRR, 2019
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base.
Proceedings of the 27th IEEE International Requirements Engineering Conference Workshops, 2019
Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the 1st International Workshop on Software Engineering Research & Practices for the Internet of Things, 2019
How do engineers perceive difficulties in engineering of machine-learning systems?: questionnaire survey.
Proceedings of the Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice, 2019
Proceedings of the Engineering Adaptive Software Systems, 2019
2018
Int. J. Syst. Softw. Secur. Prot., 2018
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018
Report of iMLSE-18: the 1<sup>st</sup> International Workshop on Machine Learning Systems Engineering.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018
Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Int. J. Secur. Softw. Eng., 2017
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Proceedings of the Requirements Engineering for Internet of Things, 2017
2016
Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2016
Proceedings of the IEEE World Congress on Services, 2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Assessing Business Processes by Checking Transaction Documents for Inconsistency Risks and a Tool for Risk Assessment.
Proceedings of the Business Modeling and Software Design - 6th International Symposium, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
J. Softw., 2015
Method Using Command Abstraction Library for Iterative Testing Security of Web Applications.
Int. J. Secur. Softw. Eng., 2015
Proceedings of the 2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering, 2015
A Case-based Management System for Secure Software Development Using Software Security Knowledge.
Proceedings of the 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2015
Proceedings of the 8th IEEE International Conference on Software Testing, 2015
Keys and Roles of Formal Methods Education for Industry: 10 Year Experience with Top SE Program.
Proceedings of the First Workshop on Formal Methods in Software Engineering Education and Training, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2014
J. Inf. Process., 2014
Int. J. Secur. Softw. Eng., 2014
Network traffic optimization architecture for scalability in academic inter-cloud computing environments.
Proceedings of the 2nd International Workshop on Hot Topics in Cloud service Scalability, 2014
Abstract security patterns for requirements specification and analysis of secure systems.
Proceedings of the Anais do WER14, 2014
Proceedings of the Product-Focused Software Process Improvement, 2014
Evaluation of Flexibility to Changes Focusing on the Variable Structures in Legacy Software.
Proceedings of the Knowledge-Based Software Engineering, 2014
Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014
Proceedings of the Cloud Computing and Services Sciences, 2014
On-demand Cloud Architecture for Academic Community Cloud - Another Approach to Inter-cloud Collaboration.
Proceedings of the CLOSER 2014, 2014
Abstract security patterns for requirements and analysis of secure systems.
Proceedings of the XVII Iberoamerican Conference on Software Engineering, 2014
Proceedings of the Advanced Information Systems Engineering Workshops, 2014
Proceedings of the Advanced Information Systems Engineering Workshops, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013
Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns.
Int. J. Secur. Softw. Eng., 2012
Proceedings of the 2012 SC Companion: High Performance Computing, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Multilevel Modeling of Physiological Systems and Simulation Platform: PhysioDesigner, Flint and Flint K3 Service.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the Second IEEE International Workshop on Requirements Engineering for Systems, 2012
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012
Proceedings of the First International Workshop on Software Engineering Education Based on Real-World Experiences, 2012
Proceedings of the 4th International ICSE Workshop on Principles of Engineering Service-Oriented Systems, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012
2011
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Misuse Patterns for Cloud Computing.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Two patterns for distributed systems: enterprise service bus (ESB) and distributed publish/subscribe.
Proceedings of the 18th Conference on Pattern Languages of Programs, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
A Framework for Validating Task Assignment in Multiagent Systems Using Requirements Importance.
Proceedings of the Principles and Practice of Multi-Agent Systems, 2010
Proceedings of the 17th Conference on Pattern Languages of Programs, 2010
Proceedings of the ARES 2010, 2010
Proceedings of the ARES 2010, 2010
2009
ACM SIGCSE Bull., 2009
What Top-Level Software Engineers Tackle after Learning Formal Methods: Experiences from the Top SE Project.
Proceedings of the Teaching Formal Methods, Second International Conference, 2009
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09).
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009
Proceedings of the Database and Expert Systems Applications, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the ACP4IS@AOSD 2009: Proceedings of the 8th workshop on Aspects, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008
Proceedings of the Progress in WWW Research and Development, 2008
2007
Syst. Comput. Jpn., 2007
Agreements and Policies in Cooperative Mobile Agents: Formalization and Implementation.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
Top SE: Educating Superarchitects Who Can Apply Software Engineering Tools to Practical Development in Japan.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
2006
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006
2005
Syst. Comput. Jpn., 2005
Int. J. Pervasive Comput. Commun., 2005
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the Intelligence in Communication Systems, 2005
Framework for Hierarchical Mobile Agents: Toward Service-Oriented Agent Compound.
Proceedings of the ICEIS 2005, 2005
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005
2004
Proceedings of the Programming Multi-Agent Systems, 2004
Proceedings of the Mobility Aware Technologies and Applications, 2004
Proceedings of the Mobility Aware Technologies and Applications, 2004
Ubiquitous Application Development using a Mobile Agent-based System.
Proceedings of the Ubiquitous Computing, 2004
Mobile Agent System for Web Services Integration in Pervasive Networks.
Proceedings of the Ubiquitous Computing, 2004
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems.
Proceedings of the 8th International Enterprise Distributed Object Computing Conference (EDOC 2004), 2004
Proceedings of the Agent-Oriented Information Systems II, 2004
2003
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003
Proceedings of the Mobile Agents for Telecommunication Applications, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
2000
Proceedings of the Agent-Oriented Software Engineering, First International Workshop, 2000
1998
Proceedings of the 9th International Workshop on Software Specification and Design, 1998