Zobrazeno 1 - 10
of 72
pro vyhledávání: '"Shinpei Ogata"'
Autor:
Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka
Publikováno v:
Applied Sciences, Vol 12, Iss 7, p 3400 (2022)
Vulnerability and attack information must be collected to assess the severity of vulnerabilities and prioritize countermeasures against cyberattacks quickly and accurately. Common Vulnerabilities and Exposures is a dictionary that lists vulnerabiliti
Externí odkaz:
https://doaj.org/article/abd3a442060f474996bc547964d28fba
Autor:
Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka
Publikováno v:
Information, Vol 12, Iss 8, p 298 (2021)
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information. The Common Vulnerabilities and Exposures (CVE) provides known vulner
Externí odkaz:
https://doaj.org/article/0c5346af1e724bf48a9d297eaa834c32
Autor:
Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G. Priyalakshmi
Publikováno v:
Information, Vol 12, Iss 1, p 36 (2021)
Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 security patterns have been proposed. Although the technical components ar
Externí odkaz:
https://doaj.org/article/f704620971c84213bcc3f343c9ffa927
Autor:
Haruhiko Kaiya, Tomoya Misawa, Shinpei Ogata, Shinobu Saito, Hiroyuki Nakagawa, Hironori Takeuchi
Publikováno v:
Procedia Computer Science. 207:542-551
Autor:
Kozo Okano, Maiko Onishi, Jo Otsuka, Shinpei Ogata, Toshifusa Sekizawa, Keishi Okamoto, Daisuke Bekki
Publikováno v:
Procedia Computer Science. 207:532-541
Publikováno v:
IEICE Communications Society Magazine. 15:333-338
Publikováno v:
Learning and Analytics in Intelligent Systems ISBN: 9783031175824
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ef1229c624ad2fc7df28140d830c4e78
https://doi.org/10.1007/978-3-031-17583-1_11
https://doi.org/10.1007/978-3-031-17583-1_11
Publikováno v:
Learning and Analytics in Intelligent Systems ISBN: 9783031175824
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5a4e51b97b6eb5e4f905fef12e184864
https://doi.org/10.1007/978-3-031-17583-1_14
https://doi.org/10.1007/978-3-031-17583-1_14
Publikováno v:
2022 29th Asia-Pacific Software Engineering Conference (APSEC).
Autor:
Takao Okubo, Takehisa Kato, Yoshiaki Fukazawa, Tian Xia, Shinpei Ogata, Hideyuki Kanuka, Eduardo B. Fernandez, Atsuo Hazeyama, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka
Publikováno v:
International Journal of Systems and Software Security and Protection. 12:68-85
Security and privacy in cloud systems are critical. To address security and privacy concerns, many security patterns, privacy patterns, and non-pattern-based knowledge have been reported. However, knowing which pattern or combination of patterns to u