Search

Your search keyword '"Takao OKUBO"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Takao OKUBO" Remove constraint Author: "Takao OKUBO" Topic computer science Remove constraint Topic: computer science
47 results on '"Takao OKUBO"'

Search Results

1. CSPM

2. Landscape of Architecture and Design Patterns for IoT Systems

4. A Tool to Manage Traceability on Several Models and Its Use Case

5. Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques

6. Analysis of IoT Pattern Descriptions

7. Systematic Literature Review of Security Pattern Research

9. Systematic Literature Review of Security Pattern Research

10. Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques

11. Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache

12. The design of secure IoT applications using patterns: State of the art and directions for research

13. Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling

14. A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base

15. Data Relation Analysis Focusing on Plural Data Transition for Detecting Attacks on Vehicular Network

16. Power of Communication Behind Extreme Cybersecurity Incidents

17. Metamodel for Security and Privacy Knowledge in Cloud Service Development

18. Landscape of IoT Patterns

19. Designing Secure Software by Testing Application of Security Patterns

20. Security Requirement Modeling Support System Using Software Security Knowledge Base

21. Eliciting Requirements for Improving Users’ Behavior Using Transparency

23. Literature Survey on Technologies for Developing Privacy-Aware Software

24. Implementation Support of Security Design Patterns Using Test Templates

25. A Metamodel for Security and Privacy Knowledge in Cloud Services

26. Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns

27. Case Base for Secure Software Development Using Software Security Knowledge Base

28. Verifying Implementation of Security Design Patterns Using a Test Template

29. Security and Privacy Behavior Definition for Behavior Driven Development

30. Security Requirements Analysis Using Knowledge in CAPEC

31. Validating Security Design Patterns Application Using Model Testing

32. Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities

33. Cooperative Secure Integration Process for Secure System Development

34. Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model

35. Effective Security Impact Analysis with Patterns for Software Enhancement

36. Misuse Cases + Assets + Security Goals

37. Web security patterns for analysis and design

38. Identifying Security Aspects in Early Development Stages

39. Secure Software Development through Coding Conventions and Frameworks

40. An optimistic method for updating information in distributed collaborative work

41. Practical experiences of designing a distributed collaborative system

45. [Untitled]

46. [Comparative study of cefuzonam (CZON) with cefmenoxime in chronic respiratory tract infections by the double-blind method]

47. Cloud security and privacy metamodel metamodel for security and privacy knowledge in cloud services

Catalog

Books, media, physical & digital resources