Haruhiko Kaiya

Orcid: 0000-0001-9816-8001

According to our database1, Haruhiko Kaiya authored at least 114 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Practice-based Collection of Bad Smells in Machine Learning Projects.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Finding Contributable Activities Using Non-Verb Attributes In Events.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

2022
Efficient secure DevOps using process mining and Attack Defense Trees.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

A Proposal to Find Mutually Contributable Business or Life Activities Using Conformance Checking.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

A Study on Analyzing Learner Behaviors in State Machine Modeling Using Process Mining and Statistical Test.
Proceedings of the Knowledge-Based Software Engineering: 2022, 2022

2021
Systematic Literature Review of Security Pattern Research.
Inf., 2021

CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development.
Int. J. Syst. Softw. Secur. Prot., 2021

Tools for logging and analyzing goal dependency modeling.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Reference Model for Agile Development of Machine Learning-based Service Systems.
Proceedings of the 28th Asia-Pacific Software Engineering Conference Workshops, 2021

2020
A Tool to Manage Traceability on Several Models and Its Use Case.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Evaluating Mutual Requirements Evolution of Several Information Systems.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling.
Proceedings of the Knowledge-Based Software Engineering: 2020, 2020

Quantitative Analysis of Goal Oriented Requirements Models.
Proceedings of the Knowledge-Based Software Engineering: 2020, 2020

2019
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base.
Proceedings of the 27th IEEE International Requirements Engineering Conference Workshops, 2019

Mutual requirements evolution by combining different information systems.
Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 2019

Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Landscape of IoT patterns.
Proceedings of the 1st International Workshop on Software Engineering Research & Practices for the Internet of Things, 2019

2018
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development, 2018

Meta-Requirements for Information System Requirements: Lesson Learned from Software Ecosystem Researches.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model.
Proceedings of the Knowledge-Based Software Engineering: 2018, 2018

Requirements Exploration by Comparing and Combining Models of Different Information Systems.
Proceedings of the Knowledge-Based Software Engineering: 2018, 2018

Security Requirement Modeling Support System Using Software Security Knowledge Base.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

2017
Goal Modelling for Security Problem Matching and Pattern Enforcement.
Int. J. Secur. Softw. Eng., 2017

Preliminary Systematic Literature Review of Software and Systems Traceability.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

A CASE tool for Goal Dependency Model with Attributes based on An Existing UML Editor.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Generalizing and composing goals and objects in a scenario together for requirements analysis.
Proceedings of the 8th International Conference on Information, 2017

Traceability Link Mining - Focusing on Usability.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Identifying Fundamental Goals from Objects in a Scenario to Facilitate System Introduction.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Eliciting Requirements for Improving Users' Behavior Using Transparency.
Proceedings of the Requirements Engineering for Internet of Things, 2017

2016
Implementation Support of Security Design Patterns Using Test Templates .
Inf., 2016

Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2016

Early Requirements Analysis for a Socio-Technical System Based on Goal Dependencies.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2016

A Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the IEEE World Congress on Services, 2016

Literature Survey on Technologies for Developing Privacy-Aware Software.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Modelling Goal Dependencies and Domain Model Together.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016

2015
A Case-based Management System for Secure Software Development Using Software Security Knowledge.
Proceedings of the 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2015

TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

Multi-dimensional Goal Refinement in Goal-Oriented Requirements Engineering.
Proceedings of the ICSOFT-EA 2015, 2015

Annotating Goals with Concerns in Goal-Oriented Requirements Engineering.
Proceedings of the Software Technologies - 10th International Joint Conference, 2015

Case Base for Secure Software Development Using Software Security Knowledge Base.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals.
J. Inf. Process., 2014

Validating Security Design Pattern Applications by Testing Design Models.
Int. J. Secur. Softw. Eng., 2014

Security and Privacy Behavior Definition for Behavior Driven Development.
Proceedings of the Product-Focused Software Process Improvement, 2014

Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Requirements Refinement and Exploration of Architecture for Security and Other NFRs.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Security Requirements Analysis Using Knowledge in CAPEC.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Verifying Implementation of Security Design Patterns Using a Test Template.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment.
Int. J. Secur. Softw. Eng., 2013

Enhancing Goal-Oriented Security Requirements Analysis using Common Criteria-Based Knowledge.
Int. J. Softw. Eng. Knowl. Eng., 2013

Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

Validating Security Design Patterns Application Using Model Testing.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns.
Int. J. Secur. Softw. Eng., 2012

Toward the Decision Tree for Inferring Requirements Maturation Types.
IEICE Trans. Inf. Syst., 2012

Finding Incorrect and Missing Quality Requirements Definitions Using Requirements Frame.
IEICE Trans. Inf. Syst., 2012

Impact Analysis on an Attributed Goal Graph.
IEICE Trans. Inf. Syst., 2012

Validating Quality Requirements Considerations in a Design Document using Spectrum Analysis.
Proceedings of the Knowledge-Based Software Engineering, 2012

Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Improving Software Quality Requirements Specifications Using Spectrum Analysis.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Facilitating Business Improvement by Information Systems using Model Transformation and Metrics.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

Model Transformation Patterns for Introducing Suitable Information Systems.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2011
Quality Requirements Analysis Using Requirements Frames.
Proceedings of the 11th International Conference on Quality Software, 2011

Spectrum Analysis for Software Quality Requirements Using Analyses Records.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing Techniques.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Effective Security Impact Analysis with Patterns for Software Enhancement.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Improving Reliability of Spectrum Analysis for Software Quality Requirements Using TCM.
IEICE Trans. Inf. Syst., 2010

An Integrated Support for Attributed Goal-Oriented Requirements Analysis Method and its Implementation.
Proceedings of the 10th International Conference on Quality Software, 2010

Towards an Integrated Support for Traceability of Quality Requirements using Software Spectrum Analysis.
Proceedings of the ICSOFT 2010, 2010

Enhancing Domain Knowledge for Requirements Elicitation with Web Mining.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

2009
A systematic method for generating quality requirements spectrum.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A Tool for Attributed Goal-Oriented Requirements Analysis.
Proceedings of the ASE 2009, 2009

Checking Regulatory Compliance of Business Processes and Information Systems.
Proceedings of the Software and Data Technologies - 4th International Conference, 2009

Detecting Regulatory Vulnerability in Functional Requirements Specifications.
Proceedings of the ICSOFT 2009, 2009

Applying a Model Checker to Check Regulatory Compliance of Use Case Models.
Proceedings of the Forum at the CAiSE 2009 Conference, 2009

Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009

Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling.
Proceedings of the Conceptual Modelling 2009, 2009

2008
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems.
IEICE Trans. Inf. Syst., 2008

Proposing metrics of difficulty of domain knowledge using usecase diagrams.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Toward quality requirements analysis based on domain specific quality spectrum.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Supporting Requirements Change Management in Goal Oriented Analysis.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

Adapting a fault prediction model to allow inter languagereuse.
Proceedings of the 4th International Workshop on Predictor Models in Software Engineering, 2008

Using Common Criteria as Reusable Knowledge in Security Requirements Elicitation.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Security Requirements Elicitation Using Method Weaving and Common Criteria.
Proceedings of the Models in Software Engineering, Workshops and Symposia at MODELS 2008, Toulouse, France, September 28, 2008

Measuring Characteristics of Models and Model Transformations Using Ontology and Graph Rewriting Techniques.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2008

Metrics for a Model Driven Development Context.
Proceedings of the ENASE 2008, 2008

So/M: A Requirements Definition Tool Using Characteristics of Existing Similar Systems.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Enforcing a security pattern in stakeholder goal models.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

Supporting the Elicitation of Requirements Compliant with Regulations.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008

2007
Effects of Thesaurus in Requirements Elicitation.
Proceedings of the First International Conference on Research Challenges in Information Science, 2007

A Supporting Tool for Requirements Elicitation Using a Domain Ontology.
Proceedings of the Software and Data Technologies - Second International Conference, 2007

An Integrated Tool for Supporting Ontology Driven Requirements Elicitation.
Proceedings of the ICSOFT 2007, 2007

GOORE : Goal-Oriented and Ontology Driven Requirements Elicitation Method.
Proceedings of the Advances in Conceptual Modeling - Foundations and Applications, 2007

Measuring Model Transformation in Model Driven Development.
Proceedings of the CAiSE'07 Forum, 2007

2006
Goal Oriented Requirements Engineering: Trends and Issues.
IEICE Trans. Inf. Syst., 2006

Using Domain Ontology as Domain Knowledge for Requirements Elicitation.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application.
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006

Japanese Workshop on Requirements Engineering Tools (JWRET).
Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), 2006

A Supporting Tool to Identify both Satisfied Requirements and Tolerant Threats for a Java Mobile Code Application.
Proceedings of the ICEIS 2006, 2006

2005
Improving the detection of requirements discordances among stakeholders.
Requir. Eng., 2005

Practical and Incremental Maintenance of Software Resources in Consumer Electronics Products.
IEICE Trans. Inf. Syst., 2005

Modeling Software Characteristics and Their Correlations in A Specific Domain by Comparing Existing Similar Systems.
Proceedings of the Fifth International Conference on Quality Software (QSIC 2005), 2005

Ontology Based Requirements Analysis: Lightweight Semantic Processing Approach.
Proceedings of the Fifth International Conference on Quality Software (QSIC 2005), 2005

2004
A Method to Develop Feasible Requirements for Java Mobile Code Application.
IEICE Trans. Inf. Syst., 2004

FC Method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Weaving Multiple Viewpoint Specifications in Goal Oriented Requirements Analysis.
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004

2003
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

VDM over PSP: A Pilot Course for VDM Beginners to Confirm its Suitability for Their Development.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

PAORE: Package Oriented Requirements Elicitation.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2002
AGORA: Attributed Goal-Oriented Requirements Analysis Method.
Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 2002

Security Policy Checker and Generator for Java Mobile Codes.
Proceedings of the Engineering Information Systems in the Internet Context, 2002

1999
Conducting Requirements Evolution by Replacing Components in the Current System.
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999

1997
Preliminary experiments of a computer system for face-to-face meetings.
Syst. Comput. Jpn., 1997

1996
Structuring utterance records of requirements elicitation meetings based on speech act theory.
Proceedings of the 2nd International Conference on Requirements Engineering, 1996

1995
Building the Structure of Specification Documents from Utterances of Requirements Elicitation Meetings.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995


  Loading...