Nobukazu Yoshioka
Nobukazu Yoshioka
QAML inc
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
A survey on security patterns
N Yoshioka, H Washizaki, K Maruyama
Progress in informatics 5 (5), 35-47, 2008
How do engineers perceive difficulties in engineering of machine-learning systems?-questionnaire survey
F Ishikawa, N Yoshioka
2019 IEEE/ACM Joint 7th International Workshop on Conducting Empirical …, 2019
Landscape of architecture and design patterns for iot systems
H Washizaki, S Ogata, A Hazeyama, T Okubo, EB Fernandez, N Yoshioka
IEEE Internet of Things Journal 7 (10), 10091-10101, 2020
Modeling misuse patterns
EB Fernandez, N Yoshioka, H Washizaki
2009 International Conference on Availability, Reliability and Security, 566-571, 2009
Classifying security patterns
EB Fernandez, H Washizaki, N Yoshioka, A Kubo, Y Fukazawa
Progress in WWW Research and Development: 10th Asia-Pacific Web Conference …, 2008
Three misuse patterns for cloud computing
K Hashizume, N Yoshioka, EB Fernandez
Security engineering for Cloud Computing: approaches and Tools, 36-53, 2013
Using security patterns to develop secure systems
EB Fernandez, N Yoshioka, H Washizaki, J Jurjens, M VanHilst, G Pernu
Software Engineering for Secure Systems: Industrial and Research …, 2011
Improving the classification of security patterns
H Washizaki, EB Fernandez, K Maruyama, A Kubo, N Yoshioka
2009 20th International Workshop on Database and Expert Systems Application …, 2009
Patterns for security and privacy in cloud ecosystems
EB Fernandez, N Yoshioka, H Washizaki
2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements …, 2015
AOJS: Aspect-oriented JavaScript programming framework for Web development
H Washizaki, A Kubo, T Mizumachi, K Eguchi, Y Fukazawa, N Yoshioka, ...
Proceedings of the 8th workshop on Aspects, components, and patterns for …, 2009
Toward synthesis of web services and mobile agents
F Ishikawa, N Yoshioka, Y Tahara, S Honiden
2nd International Workshop on Web Services and Agent Based Engineering …, 2004
Mobile agent system for Web service integration in pervasive network
F Ishikawa, N Yoshioka, S Honiden
Systems and Computers in Japan 36 (11), 34-48, 2005
International journal of advanced research in computer science and software engineering
S Roy, S Nag, IK Maitra, SK Bandyopadhyay
International Journal 3 (6), 2013
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
Modeling and security in cloud ecosystems
EB Fernandez, N Yoshioka, H Washizaki, MH Syed
Future Internet 8 (2), 13, 2016
Misuse patterns for cloud computing
K Hashizume, N Yoshioka, EB Fernandez
Proceedings of the 2Nd Asian Conference on Pattern Languages of Programs, 1-6, 2011
Tracing cve vulnerability information to capec attack patterns using natural language processing techniques
K Kanakogi, H Washizaki, Y Fukazawa, S Ogata, T Okubo, T Kato, ...
Information 12 (8), 298, 2021
Abstract security patterns
EB Fernandez, H Washizaki, N Yoshioka
Proceedings of the 15th Conference on Pattern Languages of Programs, 1-2, 2008
Top se: Educating superarchitects who can apply software engineering tools to practical development in japan
S Honiden, Y Tahara, N Yoshioka, K Taguchi, H Washizaki
29th International Conference on Software Engineering (ICSE'07), 708-718, 2007
Enforcing a security pattern in stakeholder goal models
Y Yu, H Kaiya, H Washizaki, Y Xiong, Z Hu, N Yoshioka
Proceedings of the 4th ACM Workshop on Quality of Protection, 9-14, 2008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20