Takeshi Takahashi
Cited by
Cited by
Ontological approach toward cybersecurity in cloud computing
T Takahashi, Y Kadobayashi, H Fujiwara
Proceedings of the 3rd international conference on Security of information …, 2010
CYBEX: the cybersecurity information exchange framework (x. 1500)
A Rutkowski, Y Kadobayashi, I Furey, D Rajnovic, R Martin, T Takahashi, ...
ACM SIGCOMM Computer Communication Review 40 (5), 59-64, 2010
Reference ontology for cybersecurity operational information
T Takahashi, Y Kadobayashi
The Computer Journal 58 (10), 2297-2312, 2015
Enabling secure multitenancy in cloud computing: Challenges and approaches
T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo
2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012
Integration of multi-modal features for android malware detection using linear svm
T Ban, T Takahashi, S Guo, D Inoue, K Nakao
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016
Building secure and anonymous communication channel: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, T Takahashi
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1641-1648, 2014
Building ontology of cybersecurity operational information
T Takahashi, H Fujiwara, Y Kadobayashi
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
Risk visualization and alerting system: Architecture and proof-of-concept implementation
T Takahashi, K Emura, A Kanaoka, S Matsuo, T Minowa
Proceedings of the first international workshop on Security in embedded …, 2013
Mindyourprivacy: Design and implementation of a visualization system for third-party web tracking
Y Takano, S Ohta, T Takahashi, R Ando, T Inoue
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
A measurement study of open resolvers and DNS server version
Y Takano, R Ando, T Takahashi, S Uda, T Inoue
Internet Conference (IEICE), 2013
Secure and anonymous communication technique: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, K Omote, T Takahashi
IEEE Transactions on Emerging Topics in Computing 4 (1), 88-101, 2015
Tailored security: Building nonrepudiable security service-level agreements
T Takahashi, J Kannisto, J Harju, S Heikkinen, B Silverajan, M Helenius, ...
IEEE Vehicular Technology Magazine 8 (3), 54-62, 2013
Taxonomical approach to the deployment of traceback mechanisms
T Takahashi, H Hazeyama, D Miyamoto, Y Kadobayashi
2011 Baltic Congress on Future Internet and Communications, 13-20, 2011
3-5 Cybersecurity Information Exchange Techniques: Cybersecurity Information Ontology and CYBEX
T Takahashi, Y Kadobayashi
Journal of the National Institute of Information and Communications …, 2011
Implementation and performance evaluation of multicast control protocol
M Tammi, T Takahashi, H Vatiainen, R Lehtonen, J Hatju
2013 IEEE Symposium on Computers and Communications (ISCC) 2, 1038-1043, 2013
Web of Cybersecurity: Linking, Locating, and Discovering Structured Cybersecurity Information
Takeshi Takahashi, B Panta, Y Kadobayashi, K Nakao
International Journal of Communication System, 2017
Toward automated vulnerability monitoring using open information and standardized tools
T Takahashi, D Miyamoto, K Nakao
2016 IEEE International Conference on Pervasive Computing and Communication …, 2016
A KEM/DEM-based construction for secure and anonymous communication
K Emura, A Kanaoka, S Ohta, T Takahashi
2015 IEEE 39th Annual Computer Software and Applications Conference 3, 680-681, 2015
An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information
T Takahashi, K Landfield, Y Kadobayashi
RFC 7203, 2014
Toward automated reduction of human errors based on cognitive analysis
D Miyamoto, T Takahashi
2013 Seventh International Conference on Innovative Mobile and Internet …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20