A survey on security patterns N Yoshioka, H Washizaki, K Maruyama Progress in informatics 5 (5), 35-47, 2008 | 277 | 2008 |
How do engineers perceive difficulties in engineering of machine-learning systems?-questionnaire survey F Ishikawa, N Yoshioka 2019 IEEE/ACM Joint 7th International Workshop on Conducting Empirical …, 2019 | 119 | 2019 |
Landscape of architecture and design patterns for iot systems H Washizaki, S Ogata, A Hazeyama, T Okubo, EB Fernandez, N Yoshioka IEEE Internet of Things Journal 7 (10), 10091-10101, 2020 | 71 | 2020 |
Modeling misuse patterns EB Fernandez, N Yoshioka, H Washizaki 2009 International Conference on Availability, Reliability and Security, 566-571, 2009 | 64 | 2009 |
Classifying security patterns EB Fernandez, H Washizaki, N Yoshioka, A Kubo, Y Fukazawa Progress in WWW Research and Development: 10th Asia-Pacific Web Conference …, 2008 | 59 | 2008 |
Three misuse patterns for cloud computing K Hashizume, N Yoshioka, EB Fernandez Security engineering for Cloud Computing: approaches and Tools, 36-53, 2013 | 53 | 2013 |
Using security patterns to develop secure systems EB Fernandez, N Yoshioka, H Washizaki, J Jurjens, M VanHilst, G Pernu Software Engineering for Secure Systems: Industrial and Research …, 2011 | 51 | 2011 |
Improving the classification of security patterns H Washizaki, EB Fernandez, K Maruyama, A Kubo, N Yoshioka 2009 20th International Workshop on Database and Expert Systems Application …, 2009 | 45 | 2009 |
Patterns for security and privacy in cloud ecosystems EB Fernandez, N Yoshioka, H Washizaki 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements …, 2015 | 41 | 2015 |
AOJS: Aspect-oriented JavaScript programming framework for Web development H Washizaki, A Kubo, T Mizumachi, K Eguchi, Y Fukazawa, N Yoshioka, ... Proceedings of the 8th workshop on Aspects, components, and patterns for …, 2009 | 41 | 2009 |
Toward synthesis of web services and mobile agents F Ishikawa, N Yoshioka, Y Tahara, S Honiden 2nd International Workshop on Web Services and Agent Based Engineering …, 2004 | 41 | 2004 |
Mobile agent system for Web service integration in pervasive network F Ishikawa, N Yoshioka, S Honiden Systems and Computers in Japan 36 (11), 34-48, 2005 | 40 | 2005 |
International journal of advanced research in computer science and software engineering S Roy, S Nag, IK Maitra, SK Bandyopadhyay International Journal 3 (6), 2013 | 39 | 2013 |
Security patterns: Comparing modeling approaches A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ... Software engineering for secure systems: Industrial and research …, 2011 | 39 | 2011 |
Modeling and security in cloud ecosystems EB Fernandez, N Yoshioka, H Washizaki, MH Syed Future Internet 8 (2), 13, 2016 | 38 | 2016 |
Misuse patterns for cloud computing K Hashizume, N Yoshioka, EB Fernandez Proceedings of the 2Nd Asian Conference on Pattern Languages of Programs, 1-6, 2011 | 38 | 2011 |
Tracing cve vulnerability information to capec attack patterns using natural language processing techniques K Kanakogi, H Washizaki, Y Fukazawa, S Ogata, T Okubo, T Kato, ... Information 12 (8), 298, 2021 | 36 | 2021 |
Abstract security patterns EB Fernandez, H Washizaki, N Yoshioka Proceedings of the 15th Conference on Pattern Languages of Programs, 1-2, 2008 | 36 | 2008 |
Top se: Educating superarchitects who can apply software engineering tools to practical development in japan S Honiden, Y Tahara, N Yoshioka, K Taguchi, H Washizaki 29th International Conference on Software Engineering (ICSE'07), 708-718, 2007 | 33 | 2007 |
Enforcing a security pattern in stakeholder goal models Y Yu, H Kaiya, H Washizaki, Y Xiong, Z Hu, N Yoshioka Proceedings of the 4th ACM Workshop on Quality of Protection, 9-14, 2008 | 32 | 2008 |