Rchr
J-GLOBAL ID:201101011820025090   Update date: Apr. 17, 2024

Kaiya Haruhiko

カイヤ ハルヒコ | Kaiya Haruhiko
Affiliation and department:
Job title: Professor
Homepage URL  (2): http://www.sci.kanagawa-u.ac.jp/info/kaiya/http://www.sci.kanagawa-u.ac.jp/info/kaiya/index.html.en
Research field  (4): Software ,  Software ,  Software ,  Software
Research keywords  (4): specification description ,  Requirements analysis ,  specification description ,  Requirements analysis
Research theme for competitive and other funds  (24):
  • 2021 - 2024 DevOpsにおいて効率的にセキュリティ品質確保を行う技術の研究
  • 2021 - 2024 実行ログ解析による連携可能な情報システム群の発見法と支援ツール開発
  • 2018 - 2023 複数活動間の相乗効果を促進するためのシステム要求変更手法とツールの開発
  • 2016 - 2021 Trace ANY: tracing any software in any direction to support software system maintenance and evolution
  • 2017 - 2020 A learning environment based on a rationale model associating of artifacts with knowledge on security and privacy
Show all
Papers (130):
  • H. kaiya, H. Takecuhi, H. Nakagawa, S. Ogata, S. Saito. Finding Contributable Activities Using Non-Verb Attributes In Events. Procedia Computer Science. 2023. 225. 507-516
  • Takao Okubo, Haruhiko Kaiya. Efficient secure DevOps using process mining and Attack Defense Trees. Procedia Computer Science. 2022. 207. 446-455
  • A Proposal to Find Mutually Contributable Business or Life Activities Using Conformance Checking. Procedia Computer Science. 2022. 207. 542-551
  • Shinpei Ogata, Hiroyuki Nakagawa, Haruhiko Kaiya, Hironori Takeuchi. A Study on Analyzing Learner Behaviors in State Machine Modeling Using Process Mining and Statistical Test. Learning and Analytics in Intelligent Systems. 2022. 30. 141-153
  • Hironori Takeuchi, Haruhiko Kaiya, Hiroyuki Nakagawa, Shinpei Ogata. Reference Model for Agile Development of Machine Learning-based Service Systems. 2021. 17-20
more...
MISC (99):
Books (2):
  • Designing Secure Software by Testing Application of Security Patterns
    IGI global 2019 ISBN:9781522563136
  • ソフトウェアエンジニアリング最前線 2007-情報処理学会SEシンポジウム (2007)
    近代科学社 2007
Works (58):
  • Security Driven Requirements Refinement and Exploration of Architecture with multiple NFR points of view.
    Takao Okubo, Nobukazu Yoshioka, and Haruhiko Kaiya 2014 -
  • 国際会議論文 IR based Traceability Link Recovery Method Mining. In The Eightth International Conference on Software Engineering Advances (ICSEA13)
    Takeyuki Ueda, Shinpei Ogata, Haruhiko Kaiya, and Kenji Kaijiri. 2013 -
  • 国際会議論文 Validating Security Design Pattern Applications Using Model Testing, In Proceedings of International Conference on Availability, Reliability and Security (ARES 2013), IEEE CPS, 2-6 Sep., Regensburg, Germany.
    Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki and Yoshiaki Fukazawa. 2013 -
  • Goal-oriented security requirements analysis for a system used in several different activities
    H. Kaiya, T. Okubo, N. Kanaya, Y. Suzuki, S. Ogata, K. Kaijiri, N. Yoshioka 2013 -
  • Goal-oriented security requirements analysis for a system used in several different activities
    H. Kaiya, T. Okubo, N. Kanaya, Y. Suzuki, S. Ogata, K. Kaijiri, and N. Yoshioka. 2013 -
more...
※ Researcher’s information displayed in J-GLOBAL is based on the information registered in researchmap. For details, see here.

Return to Previous Page