Follow
Takeshi Takahashi
Title
Cited by
Cited by
Year
Ontological approach toward cybersecurity in cloud computing
T Takahashi, Y Kadobayashi, H Fujiwara
Proceedings of the 3rd international conference on Security of information …, 2010
1232010
CYBEX: the cybersecurity information exchange framework (x. 1500)
A Rutkowski, Y Kadobayashi, I Furey, D Rajnovic, R Martin, T Takahashi, ...
ACM SIGCOMM Computer Communication Review 40 (5), 59-64, 2010
782010
Reference ontology for cybersecurity operational information
T Takahashi, Y Kadobayashi
The Computer Journal 58 (10), 2297-2312, 2015
652015
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing
RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao
2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020
582020
Automation of Vulnerability Classification from its Description using Machine Learning
M Aota, H Kanehara, M Kubo, N Murata, B Sun, T Takahashi
2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020
482020
Enabling secure multitenancy in cloud computing: Challenges and approaches
T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo
2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012
412012
Combat security alert fatigue with ai-assisted techniques
T Ban, N Samuel, T Takahashi, D Inoue
Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 9-16, 2021
372021
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis
ME Aminanto, T Ban, R Isawa, T Takahashi, D Inoue
IEEE Access 8, 217977-217986, 2020
372020
Explainable artificial intelligence for cybersecurity: a literature survey
F Charmet, HC Tanuwidjaja, S Ayoubi, PF Gimenez, Y Han, H Jmila, ...
Annals of Telecommunications 77 (11), 789-812, 2022
282022
Integration of multi-modal features for android malware detection using linear svm
T Ban, T Takahashi, S Guo, D Inoue, K Nakao
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016
282016
Cross Platform IoT-Malware Family Classification based on Printable Strings
YT Lee, T Ban, TL Wan, SM Cheng, R Isawa, T Takahashi, D Inoue
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
272020
Web of Cybersecurity: Linking, Locating, and Discovering Structured Cybersecurity Information
Takeshi Takahashi, B Panta, Y Kadobayashi, K Nakao
International Journal of Communication System, 2017
27*2017
Secure and anonymous communication technique: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, K Omote, T Takahashi
IEEE Transactions on Emerging Topics in Computing 4 (1), 88-101, 2015
262015
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files
TL Wan, T Ban, SM Cheng, YT Lee, B Sun, R Isawa, T Takahashi, D Inoue
IEEE Open Journal of the Computer Society 1, 262-275, 2020
252020
Building ontology of cybersecurity operational information
T Takahashi, H Fujiwara, Y Kadobayashi
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
252010
Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
T Takahashi, Y Umemura, C Han, T Ban, K Furumoto, O Nakamura, ...
2021 IEEE International Conference on Pervasive Computing and Communications …, 2021
232021
Mindyourprivacy: Design and implementation of a visualization system for third-party web tracking
Y Takano, S Ohta, T Takahashi, R Ando, T Inoue
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
222014
Android Application Analysis Using Machine Learning Techniques
T Takahashi, T Ban
AI in Cybersecurity, 181-205, 2019
212019
A measurement study of open resolvers and dns server version
Y Takano, R Ando, T Takahashi, S Uda, T Inoue
Internet Conference (IEICE) 21, 2013
202013
Combating threat-alert fatigue with online anomaly detection using isolation forest
ME Aminanto, L Zhu, T Ban, R Isawa, T Takahashi, D Inoue
Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019
192019
The system can't perform the operation now. Try again later.
Articles 1–20