2016 - 2021 Trace ANY: tracing any software in any direction to support software system maintenance and evolution
2017 - 2020 A learning environment based on a rationale model associating of artifacts with knowledge on security and privacy
2018 - 2020 高信頼な機械学習応用システムによる価値創造
2016 - 2019 プライバシーとセキュリティを統合した要求分析フレームワーク
2015 - 2019 プライバシーとセキュリティを統合した要求分析フレームワーク
2014 - 2017 A Security Modeling Learning Environment Integrating a Modeling Tool with Software Security Knowledge Base
2012 - 2016 Research on cloud middleware for systems recommending evacuation activities from disasters using miniblogs
2012 - 2015 A Pattern Oriented Software Development Method for Agile Adaptation to Security Changes
2011 - 2013 Automatic Coastal Surveillance System Using Thermal Camera And Image Processing
2008 - 2010 Secure System Design based on Multi-view
2008 - 2010 Studies on Distributing Educational Contents using Mobile Agents
2008 - 2010 Research on Multi-Agent Middleware Supporting Ubiquitous Application Development
2007 - 2009 A middleware for open wireless sensor networks
2005 - 2007 パターンに基づくセキュアな分散システム構築方法論
Show all
Papers (340):
Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa. Log Drift Impact on Online Anomaly Detection Workflows. 2024
Jati Husen, Hironori Washizaki, Nobukazu Yoshioka, Hnin Tun, Yoshiaki Fukazawa, Hironori Takeuchi. Metamodel-Based Multi-View Modeling Framework for Machine Learning Systems. Proceedings of the 11th International Conference on Model-Based Software and Systems Engineering. 2023
Tomoko Kaneko, Yuji Takahashi, Shinichi Yamaguchi, Jyunji Hashimoto, Nobukazu Yoshioka. Safety and Risk Analysis and Evaluation Methods for DNN Systems in Automated Driving. Learning and Analytics in Intelligent Systems. 2023. 30. 83-96
Scott Lupton, Lena Yu, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa. Assessment of Real-World Incident Detection Through a Component-Based Online Log Anomaly Detection Pipeline Framework. Proceedings - 2023 10th International Conference on Dependable Systems and Their Applications, DSA 2023. 2023. 477-478
Rikuho Miyata, Hironori Washizaki, Kensuke Sumoto, Nobukazu Yoshioka, Yoshiaki Fukazawa, Takao Okubo. Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure. SVM. 2023. 14-17
Incidents Are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems (Journal First)
(The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) 2021 2021)
2015/11 - The Tenth International Conference on Software Engineering Advances (ICSEA 2015) Best Paper Award Performance Exploring Using Model Checking A Case Study of Hard Disk Drive Cache Function
2015/06 - the First Workshop on Formal Methods in Software Engineering Education and Training (FMSEE&T '15) Best Paper Award Keys and Roles of Formal Methods Education for Industry: 10 Year Experience with Top SE Program
2012/04 - the Ministry of Education,Culture,Sports,Science & Technology in Japan The Commendation for Science and Technology by the Minister of Education, Culture, Sports, Science and Technology, Public Understanding Promotion Category
Association Membership(s) (5):
IEEE Computer Society
, THE JAPANESE SOCIETY FOR ARTIFICIAL INTELLIGENCE
, JAPAN SOCIETY FOR SOFTWARE SCIENCE AND TECHNOLOGY
, 電子情報通信学会
, 情報処理学会