Soka University

Researchers Information System

Japanese English

TOP
Search by Faculty
or Department
Search by Keyword
Search by Research
Field
Detailed Search

Soka University top

KANEKO Tomoko

Profile Research field Education Activities Research achievement On-Campus Activities Off-Campus Activities

 

Books etc
No.Title URL, Autour Type, Publisher, Publication date, Range, ISBN 
1
Methods for Ensuring the Overall Safety of Machine Learning Systems , Joint Work, Springer, LEARNING AND ANALYTICS IN INTELLIGENT SYSTEMS (LAIS) book series, Sep. 2022, Handbook on Artificial Intelligence-empowered Applied Software Engineering: VOL.1: Novel Methodologies to Engineering Smart Software Systems P225-250,  
2
CAST HANDBOOK , Editor Translation, , Feb. 2021, ,  
3
A Closer Look at Safety and Security , Joint Work, Nova Science Publishers, Inc, Jul. 2020, CC-Case: Safety & Security Engineering Methodology for AI/IoT(1st chapter),  

 

Published Papers
No.Title URL, Journal, Vol( Number), From Page- To Page, Publication date, DOI 
1
New trends in safety analysis and accident analysis method STAMP/CAST , , 40( (3)), 73- 87, Aug. 2023,  
2
Proposal of Naturally Decision Intelligence as a Promoter of Safety Activities in Japan , 12th International Association for Advanced Space Safety(IAASS) Conference, ,   , May. 2023,  
3
Safety and Security Techniques and Integrated Approaches in Computer Systems , , 45( 2), 68- 75, Apr. 2023,  
4
Decision Intelligence into Synchronization , 2023 15th International Conference on Computer and Automation Engineering, ICCAE 2023, ,  326- 332, Apr. 2023, https://doi.org/10.1109/ICCAE56788.2023.10111454 
5
Naturally Decision Intelligence - Perfect Algorithm generated by hypothetical and synchronizing model for life system , Intelligent Decision Technologies – An International,Publication of special issue, OUTSTANDING WOMEN CONTRIBUTIONS IN THEORY AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE., vol. 17( no. 1), 195- 210, Apr. 2023, https://doi.org/10.3233/IDT-220231 
6
Safety and Risk Analysis and Evaluation Methods for DNN Systems in Automated Driving , Learning and Analytics in Intelligent Systems, 30,  83- 96, Feb. 2023, https://doi.org/10.1007/978-3-031-17583-1_7 
7
Security Resilience-Considerations from the Application of the Functional Resonance Method (FRAM) to Information Security Incidents , Proceedings - 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security Companion, QRS-C 2022, ,  16- 23, Dec. 2022, https://doi.org/10.1109/QRS-C57518.2022.00013 
8
Thinking from Incidents - Security Resilience , , ,   , Nov. 2022,  
9
Decision Intelligence The future of decision-making through effective data utilization , NTTDATA Website, ,   , Oct. 2022,  
10
Methods for Ensuring the Overall Safety of Machine Learning Systems , Handbook on Artificial Intelligence-Empowered Applied Software Engineering, ,  225- 250, Sep. 4, 2022, https://doi.org/10.1007/978-3-031-08202-3_10 
11
Safety risk analysis and evaluation method for DNN system in autonomous driving , THE INSTITUTE OF ELECTRONICS, IEICE Technical Report INFORMATION AND COMMUNICATION ENGINEERS, vol. 121( 424), 60- 65, Mar. 2022,  
12
Risk Assessment Method for IoT System with Remote Maintenance and Feedback , , 35( 3), 3- 17, Jan. 2022,  
13
Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST) , 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C), ,   , Dec. 2021,  
14
Cybersecurity Incident Analysis by CAST , MIT 2021 STAMP Workshop, ,   , Jun. 2021,  
15
Accident analysis method based on systems thinking Application of CAST to IT failures , The 18th Dependent System Workshop of the Japan Society for Software Science and Technology (DSW 2020), ,   , Mar. 2021,  
16
Summary of WESPr-18: The international workshop on evidence-based security and privacy in the wild , CEUR Workshop Proceedings, 2809,  1- 2, 2021,  
17
STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT , 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C) 168 - 175, ,   , Dec. 2020,  
18
CC-Case: Safety & Security Engineering Methodology , the International Journal of Systems and Software Security and Protection (IJSSSP), 12( 1),  , Nov. 2020,  
19
Cyber Security Incident Analysis by CAST , 1st Asian STAMP Workshop, ,   , Nov. 2020,  
20
Information security incident analysis by accident analysis method CAST based on system theory , IPSJ SIG Technical Report, ,   , Oct. 2020,  
21
Consideration on an Integrated Research for AI and Security in the IoT Era - Aiming “Beyond the Attackers”- , IPSJ SIG Technical Report, ,   , Oct. 2020,  
22
ENSURING THE SAFETY OF THE ENTIRE MACHINE LEARNING SYSTEM , THE INSTITUTE OF ELECTRONICS, IEICE Technical Report INFORMATION AND COMMUNICATION ENGINEERS, ,   , Sep. 2020,  
23
A five-layer model for analyses of complex socio-technical systems , The 27TH CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS(PLoP2020), ,   , Sep. 2020,  
24
A Study on Classification and Integration of Research on both AI and Security in the IoT Era , 11th International Conference on Information Science and Applications 2020(ICISA2020), ,   , Sep. 2020,  
25
STAMP S&S: Layered Modeling for the complexed system in the society of AI/IoT , 13th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE2020), ,  122- 131, May. 2020, https://doi.org/10.1007/978-3-030-53949-8_11 
26
Risk Assessment Method for Medical IoT System with Remote Maintenance and Feedback , , ,   , May. 2020,  
27
Security Accident Analysis by CAST and FRAM-System Thinking and Resilience- , Union of Japanese Scientists and Engineers Software Quality Control Study Group, ,   , Feb. 2020,  
28
CC-CASE: SAFETY& SECURITY ENGINEERING METHODOLOGY FOR AI/IOT , Tomoko KANEKO; Nobukazu YOSHIOKA, ,   , Jan. 2020,  
29
STAMP S&S~Safety and Security Integrated Risk Analysis based on the System Theory , IPSJ SIG Technical Report, ,   , Oct. 2019,  
30
The modeling pattern of human and society for AI business , AsianPLoP 2019, ,   , Mar. 2019,  
31
Verification of the effectiveness of STAMP / STPA in safety & security development , Union of Japanese Scientists and Engineers Software Quality Control Study Group, ,   , Feb. 2019,  
32
Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT , ICNCC 2018, 157( 164),  , Dec. 2018,  
33
Threat analysis using STRIDE with STAMP/STPA , The International Workshop on Evidence-based Security and Privacy in the Wild(APSEC2018), ,   , Dec. 2018,  
34
Proposal and application of security / safety evaluation methods for medical device systems including IoT , DICOMO2018, ,   , Jul. 2018,  
35
Proposing enhancement of a threat analysis from the security perspective for STAMP/STPA as a safety analysis , IPSJ SIG Technical Report(Web), 2018( CSEC-80), Vol.2018‐CSEC‐80,No.6,1‐8 (WEB ONLY)- , Feb. 26, 2018,  
36
A Proposal of a Technology Integration and Case Study for Development of Safety and Security , , ,   , Feb. 2018,  
37
Evaluation Practice for the Effectiveness of CC-Case as an Integrated Method of Security Requirement Analysis and Assurance , , 8( 1), 11- 26, Jan. 30, 2018,  
38
Proposal of;an;IoT Risk Assessment Framework;its assistant tool SS-Rat , , ,   , Jan. 2018,  
39
Proposal of an IoT Security Certification Method Using CC-Case , , 2016( 2), 120- 127, Oct. 4, 2016,  
40
Visualization of security requirements by CC-Case_i for more secure system construction , , 30( 5月号), 11- 22, May. 2016,  
41
PS-Case –A Problem Solving Method Based on a set of Evidence , ProMAC2015, ,   , Oct. 2015,  
42
CC-Case as an Efficient Method of Assurance Case for the Security Risk Management , ProMAC2014, ,   , Dec. 2014,  
43
The Concept of Life-Cycle Support of CC-Case and Its Capability with the Trend of CC , コンピュータセキュリティシンポジウム2014論文集, 2014( 2), 252- 259, Oct. 15, 2014,  
44
CC-Case As an Integrated Method of Security Analysis and Assurance Using Common Criteria-based Assurance Case , , 55( 9), 2134- 2148, Sep. 15, 2014,  
45
CC-Case as an Integrated Method of Security Analysis and Assurance , ICCC2014, ,   , Sep. 2014,  
46
CC-Case as an Integrated Method of Security Analysis and Assurance over Life-cycle Process , ComSec2014 p29-35, ,   , May. 2014,  
47
CC-Case as an Integrated Method of Security Analysis and Assurance over Life-cycle Process , International Journal of Cyber-Security and Digital Forensics, 3( 1), 49- 62, 2014, https://doi.org/10.17781/p001274 
48
Efficient Use of Assurance Case for the Risk Management within System Development Projects(<Special Issue>Risk of Project and Organization & Mechanism and Organization Activity for Succeeding Project) , Journal of the Society of Project Management, 16( 4), 14- 19, 2014, https://doi.org/10.14914/spmj.16.4_14 
49
CC-Case for the System Development over Life-cycle Process , ComSec2014, ,   , 2014,  
50
Proposal on Assurance Case against Risk , Proceedings (National Conferences of The Society of Project Management), 2013( 0), 230- 235, 2013, https://doi.org/10.14914/spm.2013.Spring.0_230 
51
Efficient Use of Assurance Case against System Risk in the Project Management , ProMAC2013, ,   , 2013,  
52
A proposal on security case based on common criteria , AsiaARES2013, 7804,  331- 336, 2013, https://doi.org/10.1007/978-3-642-36818-9_36 
53
Proposal on Countermeasure Decision Method Using Assurance Case And Common Criteria , ProMAC2012, ,   , Nov. 2012,  
54
The Application Method of The Security Requirements Analysis Method (SARM) , Proceedings (National Conferences of The Society of Project Management), 2012( 0), 275- 280, 2012, https://doi.org/10.14914/spm.2012.Spring.0_275 
55
Specification of Whole Steps for the Security Requirements Analysis Method (SARM) - From Requirement Analysis to Countermeasure Decision – , ProMAC2011, ,   , Nov. 2011,  
56
Proposal of a Security Requirements Analysis Method based on "Actor RelationshipMatrix" , コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集, 2009( 2009), 1- 6, Oct. 12, 2011,  
57
A Spiral Review Method for Security Requirements Based on "Actor Relationship Matrix" , , 52( 9), 2775- 2787, Sep. 15, 2011,  
58
A practical use of Security Requirements based on 'Actor Relationship Matrix' , Proceedings (National Conferences of The Society of Project Management), 2011( 0), 243- 248, 2011, https://doi.org/10.14914/spm.2011.Spring.0_243 
59
A Spiral Review Method for Security Requirements , ProMAC2010, ,   , Nov. 2010,  
60
Improvement Proposal of a Security Requirements Analysis Method based on "Actor Relationship Matrix" , 全国大会講演論文集, 72( 0), 639- 640, Mar. 8, 2010,  

 

Conference Activities & Talks
No.Title, Conference, Publication date, Promoter, Venue 
1
Lecture and Panel Discussion by the 20th Information Security Culture Award Winners, Security Show, Mar. 15, 2024, ,  
2
Ensuring Safety and Reliability of Complex Systems through Safety Engineering with System Thinking (STAMP)Ensuring Safety and reliability of Complex Systems through Safety Engineering with System Thinking (STAMP), Future Trustworthy Engineering Technology Workshop, Sep. 4, 2023, ,  
3
"Introduction to Safety and Security" - Security-by-Design from the Two Major Safety Theories, , Jan. 29, 2022, ,  
4
Safety & Security in the "IoT Era", , Jan. 22, 2021, ,  
5
CC-Case: Safety & Security Assurance of Complexed System for AI/IoT, , Mar. 11, 2020, ,  

 

Awards Honors
No.Publication date, Association, Prize, Subtitle 
1
Mar. 2021, The 18th Dependent System Workshop of the Japan Society for Software Science and Technology (DSW 2020), Best Paper Presentation Award, Accident analysis method based on systems thinking Application of CAST to IT failures 

 

Research Grants & Projects
No.Offer organization, System name, Title, Fund classification, Date 
1
Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Research Activity Start-up, Establishment of Accident Analysis Method for Sociotechnical System by System Theory, ,  Aug. 2021 - Mar. 2023 

 

Industrial Property Rights
No.Type, Title, ApplicationId, ApplicationDate, PatentId, Registration date, PatentDate 
1
patent_right, Principle of Undefeated Algorithm on 19X19 Go board, 特願2023-13763, Jan. 31, 2024, ,  ,   
2
patent_right, METHOD FOR ENABLING VERIFICATION OF LEGITIMACY OF AN ASYNCHRONOUS ALGORITHM GENERATED WHEN A LOGICALLY CONNECTED PROGRAM IS EXECUTED, 特願US16955320, Dec. 16, 2019, 特許US11768756, Jan. 8, 2024, Jan. 9, 2024 
3
patent_right, Methods and programs for decontaminating the memory area of a program in an executable state when it has been contaminated by information contrary to the program's original intent., 特願2019-192265, Oct. 21, 2019, 特許6917072, Jul. 21, 2021, Aug. 24, 2023 

 

Participation in Research Projects
No.Name of Project, Date of Participating 
1
,  Apr. 2020 - Mar. 2024