Published Papers |
No. | Title URL, Journal, Vol( Number), From Page- To Page, Publication date, DOI
|
1 | New trends in safety analysis and accident analysis method STAMP/CAST , , 40( (3)), 73- 87, Aug. 2023,
|
2 | Proposal of Naturally Decision Intelligence as a Promoter of Safety Activities in Japan , 12th International Association for Advanced Space Safety(IAASS) Conference, , , May. 2023,
|
3 | Safety and Security Techniques and Integrated Approaches in Computer Systems , , 45( 2), 68- 75, Apr. 2023,
|
4 |
|
5 | Naturally Decision Intelligence - Perfect Algorithm generated by hypothetical and synchronizing model for life system , Intelligent Decision Technologies – An International,Publication of special issue, OUTSTANDING WOMEN CONTRIBUTIONS IN THEORY AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE., vol. 17( no. 1), 195- 210, Apr. 2023, https://doi.org/10.3233/IDT-220231
|
6 |
|
7 | Security Resilience-Considerations from the Application of the Functional Resonance Method (FRAM) to Information Security Incidents , Proceedings - 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security Companion, QRS-C 2022, , 16- 23, Dec. 2022, https://doi.org/10.1109/QRS-C57518.2022.00013
|
8 | Thinking from Incidents - Security Resilience , , , , Nov. 2022,
|
9 | Decision Intelligence The future of decision-making through effective data utilization , NTTDATA Website, , , Oct. 2022,
|
10 |
|
11 | Safety risk analysis and evaluation method for DNN system in autonomous driving , THE INSTITUTE OF ELECTRONICS, IEICE Technical Report INFORMATION AND COMMUNICATION ENGINEERS, vol. 121( 424), 60- 65, Mar. 2022,
|
12 | Risk Assessment Method for IoT System with Remote Maintenance and Feedback , , 35( 3), 3- 17, Jan. 2022,
|
13 | Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST) , 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C), , , Dec. 2021,
|
14 | Cybersecurity Incident Analysis by CAST , MIT 2021 STAMP Workshop, , , Jun. 2021,
|
15 | Accident analysis method based on systems thinking Application of CAST to IT failures , The 18th Dependent System Workshop of the Japan Society for Software Science and Technology (DSW 2020), , , Mar. 2021,
|
16 | Summary of WESPr-18: The international workshop on evidence-based security and privacy in the wild , CEUR Workshop Proceedings, 2809, 1- 2, 2021,
|
17 | STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT , 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C) 168 - 175, , , Dec. 2020,
|
18 | CC-Case: Safety & Security Engineering Methodology , the International Journal of Systems and Software Security and Protection (IJSSSP), 12( 1), , Nov. 2020,
|
19 | Cyber Security Incident Analysis by CAST , 1st Asian STAMP Workshop, , , Nov. 2020,
|
20 | Information security incident analysis by accident analysis method CAST based on system theory , IPSJ SIG Technical Report, , , Oct. 2020,
|
21 | Consideration on an Integrated Research for AI and Security in the IoT Era - Aiming “Beyond the Attackers”- , IPSJ SIG Technical Report, , , Oct. 2020,
|
22 | ENSURING THE SAFETY OF THE ENTIRE MACHINE LEARNING SYSTEM , THE INSTITUTE OF ELECTRONICS, IEICE Technical Report INFORMATION AND COMMUNICATION ENGINEERS, , , Sep. 2020,
|
23 | A five-layer model for analyses of complex socio-technical systems , The 27TH CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS(PLoP2020), , , Sep. 2020,
|
24 | A Study on Classification and Integration of Research on both AI and Security in the IoT Era , 11th International Conference on Information Science and Applications 2020(ICISA2020), , , Sep. 2020,
|
25 | STAMP S&S: Layered Modeling for the complexed system in the society of AI/IoT , 13th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE2020), , 122- 131, May. 2020, https://doi.org/10.1007/978-3-030-53949-8_11
|
26 | Risk Assessment Method for Medical IoT System with Remote Maintenance and Feedback , , , , May. 2020,
|
27 | Security Accident Analysis by CAST and FRAM-System Thinking and Resilience- , Union of Japanese Scientists and Engineers Software Quality Control Study Group, , , Feb. 2020,
|
28 | CC-CASE: SAFETY& SECURITY ENGINEERING METHODOLOGY FOR AI/IOT , Tomoko KANEKO; Nobukazu YOSHIOKA, , , Jan. 2020,
|
29 | STAMP S&S~Safety and Security Integrated Risk Analysis based on the System Theory , IPSJ SIG Technical Report, , , Oct. 2019,
|
30 | The modeling pattern of human and society for AI business , AsianPLoP 2019, , , Mar. 2019,
|
31 | Verification of the effectiveness of STAMP / STPA in safety & security development , Union of Japanese Scientists and Engineers Software Quality Control Study Group, , , Feb. 2019,
|
32 | Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT , ICNCC 2018, 157( 164), , Dec. 2018,
|
33 | Threat analysis using STRIDE with STAMP/STPA , The International Workshop on Evidence-based Security and Privacy in the Wild(APSEC2018), , , Dec. 2018,
|
34 | Proposal and application of security / safety evaluation methods for medical device systems including IoT , DICOMO2018, , , Jul. 2018,
|
35 | Proposing enhancement of a threat analysis from the security perspective for STAMP/STPA as a safety analysis , IPSJ SIG Technical Report(Web), 2018( CSEC-80), Vol.2018‐CSEC‐80,No.6,1‐8 (WEB ONLY)- , Feb. 26, 2018,
|
36 | A Proposal of a Technology Integration and Case Study for Development of Safety and Security , , , , Feb. 2018,
|
37 | Evaluation Practice for the Effectiveness of CC-Case as an Integrated Method of Security Requirement Analysis and Assurance , , 8( 1), 11- 26, Jan. 30, 2018,
|
38 | Proposal of;an;IoT Risk Assessment Framework;its assistant tool SS-Rat , , , , Jan. 2018,
|
39 | Proposal of an IoT Security Certification Method Using CC-Case , , 2016( 2), 120- 127, Oct. 4, 2016,
|
40 | Visualization of security requirements by CC-Case_i for more secure system construction , , 30( 5月号), 11- 22, May. 2016,
|
41 | PS-Case –A Problem Solving Method Based on a set of Evidence , ProMAC2015, , , Oct. 2015,
|
42 | CC-Case as an Efficient Method of Assurance Case for the Security Risk Management , ProMAC2014, , , Dec. 2014,
|
43 | The Concept of Life-Cycle Support of CC-Case and Its Capability with the Trend of CC , コンピュータセキュリティシンポジウム2014論文集, 2014( 2), 252- 259, Oct. 15, 2014,
|
44 | CC-Case As an Integrated Method of Security Analysis and Assurance Using Common Criteria-based Assurance Case , , 55( 9), 2134- 2148, Sep. 15, 2014,
|
45 | CC-Case as an Integrated Method of Security Analysis and Assurance , ICCC2014, , , Sep. 2014,
|
46 | CC-Case as an Integrated Method of Security Analysis and Assurance over Life-cycle Process , ComSec2014 p29-35, , , May. 2014,
|
47 | CC-Case as an Integrated Method of Security Analysis and Assurance over Life-cycle Process , International Journal of Cyber-Security and Digital Forensics, 3( 1), 49- 62, 2014, https://doi.org/10.17781/p001274
|
48 | Efficient Use of Assurance Case for the Risk Management within System Development Projects(<Special Issue>Risk of Project and Organization & Mechanism and Organization Activity for Succeeding Project) , Journal of the Society of Project Management, 16( 4), 14- 19, 2014, https://doi.org/10.14914/spmj.16.4_14
|
49 | CC-Case for the System Development over Life-cycle Process , ComSec2014, , , 2014,
|
50 |
|
51 | Efficient Use of Assurance Case against System Risk in the Project Management , ProMAC2013, , , 2013,
|
52 |
|
53 | Proposal on Countermeasure Decision Method Using Assurance Case And Common Criteria , ProMAC2012, , , Nov. 2012,
|
54 |
|
55 | Specification of Whole Steps for the Security Requirements Analysis Method (SARM) - From Requirement Analysis to Countermeasure Decision – , ProMAC2011, , , Nov. 2011,
|
56 | Proposal of a Security Requirements Analysis Method based on "Actor RelationshipMatrix" , コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集, 2009( 2009), 1- 6, Oct. 12, 2011,
|
57 | A Spiral Review Method for Security Requirements Based on "Actor Relationship Matrix" , , 52( 9), 2775- 2787, Sep. 15, 2011,
|
58 |
|
59 | A Spiral Review Method for Security Requirements , ProMAC2010, , , Nov. 2010,
|
60 | Improvement Proposal of a Security Requirements Analysis Method based on "Actor Relationship Matrix" , 全国大会講演論文集, 72( 0), 639- 640, Mar. 8, 2010,
|