Folgen
Nobukazu Yoshioka
Nobukazu Yoshioka
QAML inc
Bestätigte E-Mail-Adresse bei acm.org - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A survey on security patterns
N Yoshioka, H Washizaki, K Maruyama
Progress in informatics 5 (5), 35-47, 2008
2772008
How do engineers perceive difficulties in engineering of machine-learning systems?-questionnaire survey
F Ishikawa, N Yoshioka
2019 IEEE/ACM Joint 7th International Workshop on Conducting Empirical …, 2019
1192019
Landscape of architecture and design patterns for iot systems
H Washizaki, S Ogata, A Hazeyama, T Okubo, EB Fernandez, N Yoshioka
IEEE Internet of Things Journal 7 (10), 10091-10101, 2020
712020
Modeling misuse patterns
EB Fernandez, N Yoshioka, H Washizaki
2009 International Conference on Availability, Reliability and Security, 566-571, 2009
642009
Classifying security patterns
EB Fernandez, H Washizaki, N Yoshioka, A Kubo, Y Fukazawa
Progress in WWW Research and Development: 10th Asia-Pacific Web Conference …, 2008
592008
Three misuse patterns for cloud computing
K Hashizume, N Yoshioka, EB Fernandez
Security engineering for Cloud Computing: approaches and Tools, 36-53, 2013
532013
Using security patterns to develop secure systems
EB Fernandez, N Yoshioka, H Washizaki, J Jurjens, M VanHilst, G Pernu
Software Engineering for Secure Systems: Industrial and Research …, 2011
512011
Improving the classification of security patterns
H Washizaki, EB Fernandez, K Maruyama, A Kubo, N Yoshioka
2009 20th International Workshop on Database and Expert Systems Application …, 2009
452009
Patterns for security and privacy in cloud ecosystems
EB Fernandez, N Yoshioka, H Washizaki
2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements …, 2015
412015
AOJS: Aspect-oriented JavaScript programming framework for Web development
H Washizaki, A Kubo, T Mizumachi, K Eguchi, Y Fukazawa, N Yoshioka, ...
Proceedings of the 8th workshop on Aspects, components, and patterns for …, 2009
412009
Toward synthesis of web services and mobile agents
F Ishikawa, N Yoshioka, Y Tahara, S Honiden
2nd International Workshop on Web Services and Agent Based Engineering …, 2004
412004
Mobile agent system for Web service integration in pervasive network
F Ishikawa, N Yoshioka, S Honiden
Systems and Computers in Japan 36 (11), 34-48, 2005
402005
International journal of advanced research in computer science and software engineering
S Roy, S Nag, IK Maitra, SK Bandyopadhyay
International Journal 3 (6), 2013
392013
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
392011
Modeling and security in cloud ecosystems
EB Fernandez, N Yoshioka, H Washizaki, MH Syed
Future Internet 8 (2), 13, 2016
382016
Misuse patterns for cloud computing
K Hashizume, N Yoshioka, EB Fernandez
Proceedings of the 2Nd Asian Conference on Pattern Languages of Programs, 1-6, 2011
382011
Tracing cve vulnerability information to capec attack patterns using natural language processing techniques
K Kanakogi, H Washizaki, Y Fukazawa, S Ogata, T Okubo, T Kato, ...
Information 12 (8), 298, 2021
362021
Abstract security patterns
EB Fernandez, H Washizaki, N Yoshioka
Proceedings of the 15th Conference on Pattern Languages of Programs, 1-2, 2008
362008
Top se: Educating superarchitects who can apply software engineering tools to practical development in japan
S Honiden, Y Tahara, N Yoshioka, K Taguchi, H Washizaki
29th International Conference on Software Engineering (ICSE'07), 708-718, 2007
332007
Enforcing a security pattern in stakeholder goal models
Y Yu, H Kaiya, H Washizaki, Y Xiong, Z Hu, N Yoshioka
Proceedings of the 4th ACM Workshop on Quality of Protection, 9-14, 2008
322008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20