Author of the publication

Power of Communication Behind Extreme Cybersecurity Incidents.

, and . DASC/PiCom/DataCom/CyberSciTech, page 315-319. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Okubo, Takao
add a person with the name Okubo, Takao
 

Other publications of authors with the same name

Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models., , , , and . SoMeT, volume 286 of Frontiers in Artificial Intelligence and Applications, page 155-166. IOS Press, (2016)Misuse Cases + Assets + Security Goals., , and . CSE (3), page 424-429. IEEE Computer Society, (2009)Threat and countermeasure patterns for cloud computing., , and . RePa, page 43-46. IEEE Computer Society, (2014)An Optimistic Method for Updating Information in Distributed Collaborative Work., , , , and . COMPSAC, page 400-405. IEEE Computer Society, (1998)Reverse Engineering from COBOL to Narrative Specification., , , , , and . COMPSAC, page 284-289. IEEE Computer Society, (1995)Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache., , , , , and . IEEE Access, (2019)Case Base for Secure Software Development Using Software Security Knowledge Base., , , , , , , and . COMPSAC Workshops, page 97-103. IEEE Computer Society, (2015)A Case-based Management System for Secure Software Development Using Software Security Knowledge., , , , , , and . KES, volume 60 of Procedia Computer Science, page 1092-1100. Elsevier, (2015)TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing., , , , , , and . ICST, page 1-8. IEEE Computer Society, (2015)A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base., , , , , , and . RE Workshops, page 134-140. IEEE, (2019)