Nobukazu Yoshioka

Orcid: 0000-0002-1986-5675

According to our database1, Nobukazu Yoshioka authored at least 155 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ASRA-Q: AI Security Risk Assessment by Selective Questions.
J. Inf. Process., 2023

Refining GPT-3 Embeddings with a Siamese Structure for Technical Post Duplicate Detection.
CoRR, 2023

Log Drift Impact on Online Anomaly Detection Workflows.
Proceedings of the Product-Focused Software Process Improvement, 2023

Metamodel-Based Multi-View Modeling Framework for Machine Learning Systems.
Proceedings of the 11th International Conference on Model-Based Software and Systems Engineering, 2023

Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure.
Proceedings of the 1st IEEE/ACM International Workshop on Software Vulnerability, 2023

Design by Contract Framework for Quantum Software.
Proceedings of the 4th IEEE/ACM International Workshop on Quantum Software Engineering, 2023

Enterprise Architecture-based Metamodel for a Holistic Business - IT Alignment View on Machine Learning Projects.
Proceedings of the IEEE International Conference on e-Business Engineering, 2023

Automatic Detection of Abstract-Concrete Relationships between Attack Patterns of ATT&CK and CAPEC with Fine-tuned BERT.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

Activity-based modeling strategy for reliable machine learning system analysis targeting GUI-based applications.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

Towards Integrated Model-Based Machine Learning Experimentation Framework.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

Assessment of Real-World Incident Detection Through a Component-Based Online Log Anomaly Detection Pipeline Framework.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

Extensible Modeling Framework for Reliable Machine Learning System Analysis.
Proceedings of the 2nd IEEE/ACM International Conference on AI Engineering, 2023

A Machine Learning Based Approach to Detect Machine Learning Design Patterns.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems.
IEEE Trans. Software Eng., 2022

Abstract security patterns and the design of secure systems.
Cybersecur., 2022

Detecting Design Patterns in UML Class Diagram Images using Deep Learning.
Proceedings of the 24th IEEE/ACIS International Conference on Software Engineering, 2022

Modeling tool for managing canvas-based models traceability in ML system development.
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 2022

Safety and Risk Analysis and Evaluation Methods for DNN Systems in Automated Driving.
Proceedings of the Knowledge-Based Software Engineering: 2022, 2022

Automatic labeling of the elements of a vulnerability report CVE with NLP.
Proceedings of the 23rd IEEE International Conference on Information Reuse and Integration for Data Science, 2022

A new approach for machine learning security risk assessment: work in progress.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022

Traceable business-to-safety analysis framework for safety-critical machine learning systems.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022

2021
The design of secure IoT applications using patterns: State of the art and directions for research.
Internet Things, 2021

Systematic Literature Review of Security Pattern Research.
Inf., 2021

Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques.
Inf., 2021

CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development.
Int. J. Syst. Softw. Secur. Prot., 2021

CC-Case-Safety and Security Engineering Methodology.
Int. J. Syst. Softw. Secur. Prot., 2021

Analysis of IoT Pattern Descriptions.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT SERP4IoT 2021, 2021

Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST).
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Goal-Oriented Machine Learning-Based Component Development Process.
Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion, 2021

A Development Method for Safe Node-RED Systems using Discrete Controller Synthesis.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

Online Log Parsing: Preliminary Literature Review.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Tracing CAPEC Attack Patterns from CVE Vulnerability Information using Natural Language Processing Technique.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Enterprise Architecture based Representation of Architecture and Design Patterns for Machine Learning Systems.
Proceedings of the 25th International Enterprise Distributed Object Computing Workshop, 2021

Preliminary Literature Review of Machine Learning System Development Practices.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Landscape of Requirements Engineering for Machine Learning-based AI Systems.
Proceedings of the 28th Asia-Pacific Software Engineering Conference Workshops, 2021

Goal-Centralized Metamodel Based Requirements Integration for Machine Learning Systems.
Proceedings of the 28th Asia-Pacific Software Engineering Conference Workshops, 2021

Literature Review on Log Anomaly Detection Approaches Utilizing Online Parsing Methodology.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
Landscape of Architecture and Design Patterns for IoT Systems.
IEEE Internet Things J., 2020

STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

A Tool to Manage Traceability on Several Models and Its Use Case.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

STAMP S&S: Layered Modeling for the Complexed System in the Society of AI/IoT.
Proceedings of the Knowledge-Based Software Engineering: 2020, 2020

Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling.
Proceedings of the Knowledge-Based Software Engineering: 2020, 2020

Smart SE: Smart Systems and Services Innovative Professional Education Program.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each Department.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Preliminary Systematic Literature Review of Machine Learning System Development Process.
CoRR, 2019

A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base.
Proceedings of the 27th IEEE International Requirements Engineering Conference Workshops, 2019

Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Landscape of IoT patterns.
Proceedings of the 1st International Workshop on Software Engineering Research & Practices for the Internet of Things, 2019

How do engineers perceive difficulties in engineering of machine-learning systems?: questionnaire survey.
Proceedings of the Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice, 2019

Assessing Security and Privacy Behavioural Risks for Self-Protection Systems.
Proceedings of the Engineering Adaptive Software Systems, 2019

2018
Using Security Patterns to Develop Secure Systems - Ten Years Later.
Int. J. Syst. Softw. Secur. Prot., 2018

Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development, 2018

Security Requirement Modeling Support System Using Software Security Knowledge Base.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

Report of iMLSE-18: the 1<sup>st</sup> International Workshop on Machine Learning Systems Engineering.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

Using a variety of patterns in a secure software development methodology.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

Evaluating the degree of security of a system built using security patterns.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Goal Modelling for Security Problem Matching and Pattern Enforcement.
Int. J. Secur. Softw. Eng., 2017

Preliminary Systematic Literature Review of Software and Systems Traceability.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Eliciting Requirements for Improving Users' Behavior Using Transparency.
Proceedings of the Requirements Engineering for Internet of Things, 2017

2016
Implementation Support of Security Design Patterns Using Test Templates .
Inf., 2016

Modeling and Security in Cloud Ecosystems.
Future Internet, 2016

Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2016

A Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the IEEE World Congress on Services, 2016

Literature Survey on Technologies for Developing Privacy-Aware Software.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Assessing Business Processes by Checking Transaction Documents for Inconsistency Risks and a Tool for Risk Assessment.
Proceedings of the Business Modeling and Software Design - 6th International Symposium, 2016

Reproducible Scientific Computing Environment with Overlay Cloud Architecture.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A Method for Efficient Extensibility Improvements in Embedded Software Evolution.
J. Softw., 2015

Method Using Command Abstraction Library for Iterative Testing Security of Web Applications.
Int. J. Secur. Softw. Eng., 2015

Patterns for security and privacy in cloud ecosystems.
Proceedings of the 2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering, 2015

A Case-based Management System for Secure Software Development Using Software Security Knowledge.
Proceedings of the 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2015

TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

Keys and Roles of Formal Methods Education for Industry: 10 Year Experience with Top SE Program.
Proceedings of the First Workshop on Formal Methods in Software Engineering Education and Training, 2015

Case Base for Secure Software Development Using Software Security Knowledge Base.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals.
J. Inf. Process., 2014

Validating Security Design Pattern Applications by Testing Design Models.
Int. J. Secur. Softw. Eng., 2014

Network traffic optimization architecture for scalability in academic inter-cloud computing environments.
Proceedings of the 2nd International Workshop on Hot Topics in Cloud service Scalability, 2014

Abstract security patterns for requirements specification and analysis of secure systems.
Proceedings of the Anais do WER14, 2014

Security and Privacy Behavior Definition for Behavior Driven Development.
Proceedings of the Product-Focused Software Process Improvement, 2014

Evaluation of Flexibility to Changes Focusing on the Variable Structures in Legacy Software.
Proceedings of the Knowledge-Based Software Engineering, 2014

Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

A Distributed Cloud Architecture for Academic Community Cloud.
Proceedings of the Cloud Computing and Services Sciences, 2014

On-demand Cloud Architecture for Academic Community Cloud - Another Approach to Inter-cloud Collaboration.
Proceedings of the CLOSER 2014, 2014

Abstract security patterns for requirements and analysis of secure systems.
Proceedings of the XVII Iberoamerican Conference on Software Engineering, 2014

Requirements Refinement and Exploration of Architecture for Security and Other NFRs.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Security Requirements Analysis Using Knowledge in CAPEC.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Verifying Implementation of Security Design Patterns Using a Test Template.
Proceedings of the Ninth International Conference on Availability, 2014

2013
RAILROADMAP: An Agile Security Testing Framework for Web-application Development.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Validating Security Design Patterns Application Using Model Testing.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns.
Int. J. Secur. Softw. Eng., 2012

A Network-Aware Object Storage Service.
Proceedings of the 2012 SC Companion: High Performance Computing, 2012

An Academic Community Cloud Architecture for Science Applications.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Multilevel Modeling of Physiological Systems and Simulation Platform: PhysioDesigner, Flint and Flint K3 Service.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

System security requirements analysis with answer set programming.
Proceedings of the Second IEEE International Workshop on Requirements Engineering for Systems, 2012

Dodai-Deploy: Fast Cluster Deployment Tool.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

edubase cloud: cloud platform for cloud education.
Proceedings of the First International Workshop on Software Engineering Education Based on Real-World Experiences, 2012

Cloud in a cloud for cloud education.
Proceedings of the 4th International ICSE Workshop on Principles of Engineering Service-Oriented Systems, 2012

Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Cluster as a Service for Self-Deployable Cloud Applications.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
Group Migration by Mobile Agents in Wireless Sensor Networks.
Comput. J., 2011

A Modelling Framework to Support Internal Control.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Misuse Patterns for Cloud Computing.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

IMPULSE: a design framework for multi-agent systems based on model transformation.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Two patterns for distributed systems: enterprise service bus (ESB) and distributed publish/subscribe.
Proceedings of the 18th Conference on Pattern Languages of Programs, 2011

Effective Security Impact Analysis with Patterns for Software Enhancement.
Proceedings of the Sixth International Conference on Availability, 2011

An Approach to Model-based Development of Secure and Reliable Systems.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Aligning Security Requirements and Security Assurance Using the Common Criteria.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

A Framework for Validating Task Assignment in Multiagent Systems Using Requirements Importance.
Proceedings of the Principles and Practice of Multi-Agent Systems, 2010

A security pattern for data integrity in P2P systems.
Proceedings of the 17th Conference on Pattern Languages of Programs, 2010

Model-Driven Security Patterns Application Based on Dependences among Patterns.
Proceedings of the ARES 2010, 2010

Measuring the Level of Security Introduced by Security Patterns.
Proceedings of the ARES 2010, 2010

2009
Evolution of a course on model checking for practical applications.
ACM SIGCSE Bull., 2009

What Top-Level Software Engineers Tackle after Learning Formal Methods: Experiences from the Top SE Project.
Proceedings of the Teaching Formal Methods, Second International Conference, 2009

Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09).
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009

Improving the Classification of Security Patterns.
Proceedings of the Database and Expert Systems Applications, 2009

Misuse Cases + Assets + Security Goals.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

AOJS: aspect-oriented javascript programming framework for web development.
Proceedings of the ACP4IS@AOSD 2009: Proceedings of the 8th workshop on Aspects, 2009

Modeling Misuse Patterns.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Incorporating Database Systems into a Secure Software Development Methodology.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

Enforcing a security pattern in stakeholder goal models.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

Classifying Security Patterns.
Proceedings of the Progress in WWW Research and Development, 2008

2007
A hierarchical mobile agent framework and its application to multimedia contents.
Syst. Comput. Jpn., 2007

Agreements and Policies in Cooperative Mobile Agents: Formalization and Implementation.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Policy-based Runtime Partner Management in ProcessBased Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Top SE: Educating Superarchitects Who Can Apply Software Engineering Tools to Practical Development in Japan.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

1st International Workshop on Software Patterns and Quality (SPAQu'07).
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

Developing Consistent Contractual Policies in Service Composition.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

2006
Formal model of mobile BPEL4WS process.
Int. J. Bus. Process. Integr. Manag., 2006

Smartive: Agreement-based Mobile Composite Agents for Multimedia Services.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

Service-oriented and autonomous distribution and provision of multimedia contents.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

2005
Mobile agent system for Web service integration in pervasive network.
Syst. Comput. Jpn., 2005

A framework for synthesis of web services and mobile agents.
Int. J. Pervasive Comput. Commun., 2005

Flexible and Maintainable Contents Activities in Ubiquitous Environment.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

Geographically Bound Mobile Agent in MANET.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Using Mobile Agent for Location-Specific Data Retrieval in Manet.
Proceedings of the Intelligence in Communication Systems, 2005

Framework for Hierarchical Mobile Agents: Toward Service-Oriented Agent Compound.
Proceedings of the ICEIS 2005, 2005

Incorporating Agreements on Service Options into BPEL-based Services.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

Agent synthesis: partnership and agreement in cooperative mobile agents.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Mobile and Cooperative Compounds of Multimedia Services.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
Bridging the Gap Between AUML and Implementation Using IOM/T.
Proceedings of the Programming Multi-Agent Systems, 2004

A Pattern Oriented Mobile Agent Framework for Mobile Computing.
Proceedings of the Mobility Aware Technologies and Applications, 2004

Development Methodology for Location-Aware Mobile Agent.
Proceedings of the Mobility Aware Technologies and Applications, 2004

Ubiquitous Application Development using a Mobile Agent-based System.
Proceedings of the Ubiquitous Computing, 2004

Mobile Agent System for Web Services Integration in Pervasive Networks.
Proceedings of the Ubiquitous Computing, 2004

Behavior Descriptions of Mobile Agents for Web Services Integration.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems.
Proceedings of the 8th International Enterprise Distributed Object Computing Conference (EDOC 2004), 2004

Mobeet: A Multi-agent Framework for Ubiquitous Information Systems.
Proceedings of the Agent-Oriented Information Systems II, 2004

2003
Mobile Agent Based Evacuation System When The Battery Runs Out: EASTER.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

A Formal Model of Active Contents Based on the Ambient Calculus.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

2002
Evaluation of a Multi Agent Framework for Open Distributed Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

2000
Security for Mobile Agents.
Proceedings of the Agent-Oriented Software Engineering, First International Workshop, 2000

1998
Incremental Software Development Method Based on Abstract Interpretation.
Proceedings of the 9th International Workshop on Software Specification and Design, 1998


  Loading...