Takao Okubo

Orcid: 0000-0002-4490-1420

According to our database1, Takao Okubo authored at least 56 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Analysis of Social Bot Activity on X in Modern Japan.
IEEE Access, 2024

Comparison of Methods for Automatically Predicting CVSS Base Vector.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

The Reality and Feature Analysis of Information Diffusion in Japanese Disinformation Examples.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024

2023
Analysis and Consideration of Detection Methods to Prevent Fraudulent Access by Utilizing Attribute Information and the Access Log History.
J. Inf. Process., 2023

Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure.
Proceedings of the 1st IEEE/ACM International Workshop on Software Vulnerability, 2023

2022
Efficient secure DevOps using process mining and Attack Defense Trees.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

2021
The design of secure IoT applications using patterns: State of the art and directions for research.
Internet Things, 2021

Systematic Literature Review of Security Pattern Research.
Inf., 2021

Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques.
Inf., 2021

CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development.
Int. J. Syst. Softw. Secur. Prot., 2021

Analysis of IoT Pattern Descriptions.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT SERP4IoT 2021, 2021

Tracing CAPEC Attack Patterns from CVE Vulnerability Information using Natural Language Processing Technique.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Anomaly Detection Method "Cumulative Sum Detection" for In-Vehicle Networks.
J. Inf. Process., 2020

Building Cyber Resilience through Polycentric Governance.
J. Commun., 2020

Landscape of Architecture and Design Patterns for IoT Systems.
IEEE Internet Things J., 2020

A Tool to Manage Traceability on Several Models and Its Use Case.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling.
Proceedings of the Knowledge-Based Software Engineering: 2020, 2020

2019
Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache.
IEEE Access, 2019

A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base.
Proceedings of the 27th IEEE International Requirements Engineering Conference Workshops, 2019

Data Relation Analysis Focusing on Plural Data Transition for Detecting Attacks on Vehicular Network.
Proceedings of the Advances in Networked-based Information Systems, 2019

Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Landscape of IoT patterns.
Proceedings of the 1st International Workshop on Software Engineering Research & Practices for the Internet of Things, 2019

Power of Communication Behind Extreme Cybersecurity Incidents.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development, 2018

Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

Security Requirement Modeling Support System Using Software Security Knowledge Base.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

An Assurance Case Approach for Software Code Security.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

2017
Preliminary Systematic Literature Review of Software and Systems Traceability.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Eliciting Requirements for Improving Users' Behavior Using Transparency.
Proceedings of the Requirements Engineering for Internet of Things, 2017

2016
Implementation Support of Security Design Patterns Using Test Templates .
Inf., 2016

Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2016

A Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the IEEE World Congress on Services, 2016

Literature Survey on Technologies for Developing Privacy-Aware Software.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

2015
A Case-based Management System for Secure Software Development Using Software Security Knowledge.
Proceedings of the 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2015

TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

Case Base for Secure Software Development Using Software Security Knowledge Base.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals.
J. Inf. Process., 2014

Validating Security Design Pattern Applications by Testing Design Models.
Int. J. Secur. Softw. Eng., 2014

Threat and countermeasure patterns for cloud computing.
Proceedings of the 4th IEEE International Workshop on Requirements Patterns, 2014

Security and Privacy Behavior Definition for Behavior Driven Development.
Proceedings of the Product-Focused Software Process Improvement, 2014

Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Requirements Refinement and Exploration of Architecture for Security and Other NFRs.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Security Requirements Analysis Using Knowledge in CAPEC.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Verifying Implementation of Security Design Patterns Using a Test Template.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

Validating Security Design Patterns Application Using Model Testing.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns.
Int. J. Secur. Softw. Eng., 2012

Cooperative Secure Integration Process for Secure System Development.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Effective Security Impact Analysis with Patterns for Software Enhancement.
Proceedings of the Sixth International Conference on Availability, 2011

2009
Misuse Cases + Assets + Security Goals.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Identifying Security Aspects in Early Development Stages.
Proceedings of the The Third International Conference on Availability, 2008

2007
Secure Software Development through Coding Conventions and Frameworks.
Proceedings of the The Second International Conference on Availability, 2007

1998
An Optimistic Method for Updating Information in Distributed Collaborative Work.
Proceedings of the COMPSAC '98, 1998

1995
Reverse Engineering from COBOL to Narrative Specification.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995


  Loading...