Follow
Shinpei Ogata
Title
Cited by
Cited by
Year
Landscape of architecture and design patterns for iot systems
H Washizaki, S Ogata, A Hazeyama, T Okubo, EB Fernandez, N Yoshioka
IEEE Internet of Things Journal 7 (10), 10091-10101, 2020
772020
Tracing cve vulnerability information to capec attack patterns using natural language processing techniques
K Kanakogi, H Washizaki, Y Fukazawa, S Ogata, T Okubo, T Kato, ...
Information 12 (8), 298, 2021
462021
Tracing capec attack patterns from cve vulnerability information using natural language processing technique
K Kanakogi, H Washizaki, Y Fukazawa, S Ogata, T Okubo, T Kato, ...
302021
Landscape of IoT patterns
H Washizaki, N Yoshioka, A Hazeyama, T Kato, H Kaiya, S Ogata, ...
2019 IEEE/ACM 1st International Workshop on Software Engineering Research …, 2019
282019
A method of automatic integration test case generation from UML-based scenario
S Ogata, S Matsuura
WSEAS Trans. Information Science and Applications 7 (4), 598-607, 2010
272010
A practical conceptual modeling teaching method based on quantitative error analyses for novices learning to create error-free simple class diagrams
M Kayama, S Ogata, K Masymoto, M Hashimoto, M Otani
2014 IIAI 3rd International Conference on Advanced Applied Informatics, 616-622, 2014
252014
Automated inspection method for an STAMP/STPA-fallen barrier trap at railroad crossing
P Yang, R Karashima, K Okano, S Ogata
Procedia Computer Science 159, 1165-1174, 2019
222019
Evaluation of a use-case-driven requirements analysis tool employing web UI prototype generation
S Ogata, S Matsuura
WSEAS Trans. Info. Sci. and App 7 (2), 273-282, 2010
222010
Cloud security and privacy metamodel
T Xia, H Washizaki, T Kato, H Kaiya, S Ogata, EB Fernandez, H Kanuka, ...
Proceedings of the 6th International Conference on Model-Driven Engineering …, 2018
192018
A UML-based requirements analysis with automatic prototype system generation
S Ogata, S Matsuura
Communications of SIWN 3, 166-172, 2008
182008
Systematic literature review of security pattern research
H Washizaki, T Xia, N Kamata, Y Fukazawa, H Kanuka, T Kato, M Yoshino, ...
Information 12 (1), 36, 2021
172021
Comparative evaluation of nlp-based approaches for linking capec attack patterns from cve vulnerability information
K Kanakogi, H Washizaki, Y Fukazawa, S Ogata, T Okubo, T Kato, ...
Applied Sciences 12 (7), 3400, 2022
162022
A metamodel for security and privacy knowledge in cloud services
H Washizaki, S Fukumoto, M Yamamoto, M Yoshizawa, Y Fukazawa, ...
2016 IEEE World Congress on Services (SERVICES), 142-143, 2016
152016
Agro-ecological condition of the Oxisol-Ultisol area of the Amazon River system
A Tanaka, T Sakuma, N Okagawa, H Imai, S Ogata, K Ito, J Yamaguchi
Fac. Agric., Hokkaido Univ., Sapporo, Japan, 1986
151986
Taxonomy and literature survey of security pattern research
H Washizaki, T Xia, N Kamata, Y Fukazawa, H Kanuka, D Yamaoto, ...
2018 IEEE conference on application, information and network security (AINS …, 2018
132018
Automatic method of generating a web prototype employing live interactive widget to validate functional usability requirements
S Kamimori, S Ogata, K Kaijiri
2015 3rd International Conference on Applied Computing and Information …, 2015
132015
Security requirements analysis using knowledge in capec
H Kaiya, S Kono, S Ogata, T Okubo, N Yoshioka, H Washizaki, K Kaijiri
Advanced Information Systems Engineering Workshops: CAiSE 2014 International …, 2014
132014
Preliminary systematic literature review of software and systems traceability
H Kaiya, R Sato, A Hazeyama, S Ogata, T Okubo, T Tanaka, N Yoshioka, ...
Procedia computer science 112, 1141-1150, 2017
122017
SMart-Learning: State machine simulators for developing thinking skills
S Ogata, M Kayama, K Okano
2017 IEEE 17th International Conference on Advanced Learning Technologies …, 2017
92017
Security and privacy behavior definition for behavior driven development
T Okubo, Y Kakizaki, T Kobashi, H Washizaki, S Ogata, H Kaiya, ...
Product-Focused Software Process Improvement: 15th International Conference …, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20