Takeshi Takahashi
Cited by
Cited by
Ontological approach toward cybersecurity in cloud computing
T Takahashi, Y Kadobayashi, H Fujiwara
Proceedings of the 3rd international conference on Security of information …, 2010
CYBEX: the cybersecurity information exchange framework (x. 1500)
A Rutkowski, Y Kadobayashi, I Furey, D Rajnovic, R Martin, T Takahashi, ...
ACM SIGCOMM Computer Communication Review 40 (5), 59-64, 2010
Reference ontology for cybersecurity operational information
T Takahashi, Y Kadobayashi
The Computer Journal 58 (10), 2297-2312, 2015
Enabling secure multitenancy in cloud computing: Challenges and approaches
T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo
2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012
Integration of multi-modal features for android malware detection using linear svm
T Ban, T Takahashi, S Guo, D Inoue, K Nakao
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing
RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao
2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020
Automation of Vulnerability Classification from its Description using Machine Learning
M Aota, H Kanehara, M Kubo, N Murata, B Sun, T Takahashi
2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020
Web of Cybersecurity: Linking, Locating, and Discovering Structured Cybersecurity Information
Takeshi Takahashi, B Panta, Y Kadobayashi, K Nakao
International Journal of Communication System, 2017
Building ontology of cybersecurity operational information
T Takahashi, H Fujiwara, Y Kadobayashi
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis
ME Aminanto, T Ban, R Isawa, T Takahashi, D Inoue
IEEE Access 8, 217977-217986, 2020
Secure and anonymous communication technique: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, K Omote, T Takahashi
IEEE Transactions on Emerging Topics in Computing 4 (1), 88-101, 2015
Mindyourprivacy: Design and implementation of a visualization system for third-party web tracking
Y Takano, S Ohta, T Takahashi, R Ando, T Inoue
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
A measurement study of open resolvers and dns server version
Y Takano, R Ando, T Takahashi, S Uda, T Inoue
Internet Conference (IEICE) 21, 2013
Risk visualization and alerting system: Architecture and proof-of-concept implementation
T Takahashi, K Emura, A Kanaoka, S Matsuo, T Minowa
Proceedings of the first international workshop on Security in embedded …, 2013
Cross Platform IoT-Malware Family Classification based on Printable Strings
YT Lee, T Ban, TL Wan, SM Cheng, R Isawa, T Takahashi, D Inoue
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
Building secure and anonymous communication channel: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, T Takahashi
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1641-1648, 2014
Tailored security: Building nonrepudiable security service-level agreements
T Takahashi, J Kannisto, J Harju, S Heikkinen, B Silverajan, M Helenius, ...
IEEE Vehicular Technology Magazine 8 (3), 54-62, 2013
Android Application Analysis Using Machine Learning Techniques
T Takahashi, T Ban
AI in Cybersecurity, 181-205, 2019
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files
TL Wan, T Ban, SM Cheng, YT Lee, B Sun, R Isawa, T Takahashi, D Inoue
IEEE Open Journal of the Computer Society 1, 262-275, 2020
Combat Security Alert Fatigue with AI-Assisted Techniques
T Ban, N Samuel, T Takahashi, D Inoue
Cyber Security Experimentation and Test Workshop, 9-16, 2021
The system can't perform the operation now. Try again later.
Articles 1–20