Profile

Name Takeshi Takahashi
Address Tokyo, Japan
Cellphone +81 80 3490 2971
Email takeshi_takahashi at nict.go.jp
Current Affiliation National Institute of Information and Communications Technology
Degree Ph.D. in Telecommunication (Waseda University, 2005)
Languages Japanese, English
Technical domains Cybersecurity, network protocols, and picture coding techniques
Major qualifications CISSP, PMP, TOEIC 980, 1st Grade of STEP English proficiency examination, Information Security Specialist Examination

My availability

If you need my time, feel free to contact me. The calendar below shows some of my schedule. If your google account has received some access right to some of my calenders, you may be able to see more detailed schedule of mine by logging into your google account.

Courses

  • International Standards, coming soon
  • Recent development of cybersecurity, coming soon
  • Basics of multimedia techniques, semeter finished
  • The Internet technologies, semeter finished
  • Information Security, semeter finished
  • Security Workshop, semeter finished

Services

Journal Editorial Boards and Guest Editors

  • Digital Threats: Research and Practice, ACM, associate editor
  • International Journal of Information Security, Springer, guest editor
  • IEICE Transactions on Communications, IEICE, editorial board

Organizational/Steering Committee activities

  • IEICE MoMuC, committee member ('05.4 – '06.3)
  • IEICE Tokyo Section, Committee ('16.6 – '18.6)
  • IEEE COMSOC Tokyo Joint Chapter, Treasurer ('17.1 – '20.12)
  • Information Technology Standards Commission of Japan (ITSCJ) ISO/IEC SC29/WG1 Committee (’01.5 – ’03.3)
  • Internet Engineering Task Force (IETF) Mile Working Group, Co-Chair
  • Internet Engineering Task Force (IETF), Security Directorate
  • Internet Society Japan Chapter, Program Committee ('15.2 - '17.1)
  • Internet Society Japan Chapter (ISOC-JP) Internet Standardization Promotion Committee, chair ('17.2 -'18.1)
  • Internet Society Japan Chapter (ISOC-JP) IETF Publicity working group, vice chair
  • ITU-T Study Group 17 Question 6 Associate Rapporteur
  • The Telecommunication Technology Committee (TTC), Committee
  • Computer Security Symposium 2017, Executive Committee ('17)

Technical Program Comittees

  • Baltic Conference on Future Internet Communications, 2011 and 2012
  • Conference on Future Internet Communications 2013
  • Computer Security Symposium, 2014 and 2017
  • Publications

    Peer-Reviewed Journals and Magazines

    1. B.Sun, A.Fujino, T.Mori, T.Ban, T.Takahashi, D.Inoue, "Automatically Generating Malware Analysis Reports Using Sandbox Logs ," IEICE Transactions, IEICE, in press.
    2. T.Takahashi, T.Ban, "Android Application Analysis using Machine Learning Techniques," Intelligent Systems Reference Library, Springer Nature Switzerland AG, 2019.DOI:10.1007/978-3-319-98842-9_7
    3. T.Takahashi, B.Panta, Y.Kadobayashi, K.Nakao, "Web of Cybersecurity: Linking, Locating, and Discovering Structured Cybersecurity Information," International Journal of Communication Systems, Wiley, December, 2017.DOI:10.1002/dac.3470 [impact factor=1.066]
    4. K.Emura, A.Kanaoka, S.Ohta, T.Takahashi, "Establishing Secure and Anonymous Communication Channel: KEM/DEM-based Construction and Its Implementation," Journal of Information Security and Applications, Elsevier, February, 2017.DOI:10.1016/j.jisa.2016.12.001
    5. K.Emura, A.Kanaoka, S.Ohta, K.Omote, T.Takahashi, "Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation," IEEE Transactions on Emerging Topics in Computing, 4, 88 - 101, IEEE, February, 2016.DOI:10.1109/TETC.2015.2400131
    6. J.Kannisto, T.Takahashi, J.Harju, S.Heikkinen, M.Helenius, S.Matsuo, B.Silverajan, "A Non-repudiable Negotiation Protocol for Security Service Level Agreements," International Journal of Communication Systems, 28, 2067 - 2081, Wiley, October, 2015.DOI:10.1002/dac.2856 [impact factor=1.099]
    7. T.Takahashi, Y.Kadobayashi, "Reference Ontology for Cybersecurity Operational Information," The Computer Journal, 58, 2297 - 2312, Oxford, October, 2015.DOI:10.1093/comjnl/bxu101 [impact factor=1.000]
    8. Y.Takano, R.Ando, S.Uda, T.Takahashi, T.Inoue, "The Ecology of DNS Open Resolvers," IEICE Transactions on Communications, J97-B, 873 - 889, IEICE, October, 2014.
    9. T.Takahashi, J.Harju, J.Kannisto, B.Silverajan, J.Harju, S.Matsuo, "Tailored security: building nonrepudiable security service level agreements," IEEE Vehicular Technology Magazine, 8, 54 - 62, IEEE, July, 2013.DOI:10.1109/MVT.2013.2269188 [impact factor=1.567]
    10. D.Miyamoto, H.Hazeyama, Y.Kadobayashi, T.Takahashi, "Behind HumanBoost: Analysis of Users' Trust Decision Patterns for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications, 4, 319 - 329, Scientific Research, November, 2012.DOI:10.4236/jilsa.2012.44033
    11. T.Takahashi, K.Asatani, J.Harju, H.Tominaga, "Proactive Handover Scheme based on Forwarding Router Discovery for Mobile IP Networks," IEICE Transactions on Communications, E88-B, 2718 - 2725, IEICE, July, 2005.DOI:10.1093/ietcom/e88-b.7.2718 [impact factor=0.348]
    12. T.Takahashi, T.Hanamura, H.Kasai, I.Nagayoshi, H.Tominaga, "Remultiplexing scheme for MPEG-2 multiprogram transport stream transcoder," Journal of Electronics and Communications in Japan Part1: Communications, 86-2, 1 - 13, Wiley\&Sons. Inc., October, 2002.DOI:10.1002/ecja.10066
    13. T.Takahashi, T.Hanamura, H.Kasai, I.Nagayoshi, H.Tominaga, "Re-multiplexing Scheme for MPEG-2 Multi-Program Transport Stream Transcoder," Journal of the Institute of Electronics, Information and Communication Engineers, J85-B, 299 - 311, IEICE, February, 2002.

    International Standards

    1. T.Takahashi, R.Danyliw, M.Suzuki, "JSON binding of IODEF," Internet Draft (draft-ietf-mile-jsoniodef-03), Internet Engineering Task Force (IETF), March, 2018.
    2. T.Takahashi, "X.1541: Incident object description exchange format version 2," Recommendation ITU-T X.1541, ITU-T, September, 2017.
    3. T.Takahashi, K.Landfield, Y.Kadobayashi, "An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information," Request for Comments (RFC) 7203, Internet Engineering Task Force (IETF), April, 2014.DOI:10.17487/RFC7203
    4. T.Takahashi, Y.Kadobayashi, "Discovery mechanisms in the exchange of cybersecurity information," Recommendation ITU-T X.1570, ITU-T, September, 2011.
    5. H.Tian, H.Youm, T.Takahashi, "Usability of network traceback," Supplement 10, Recommendation ITU-T X.1205, ITU-T, September, 2011.
    6. S.Adegbite, I.Furey, Y.Kadobayashi, R.Martin, D.Rajnovic, G.Reid, T.Rutkowski, G.Schudel, T.Takahashi, "Overview of Cybersecurity information exchange (CYBEX)," Recommendation ITU-T X.1500, ITU-T X.1500, April, 2011.

    International Conferences

    1. C.Vorakulpipat, T.Takahashi, E.Rattanalerdnusorn, P.Thaenkaew, D.Inoue, "Cloud-based IoT Biometric Authentication Development Solution and its Security Extension," IEEE Symposium on Computers and Communications, IEEE, June, 2018.
    2. S.Pang, L.Zhu, T.Ban, K.Ikeda, W.Zhang, A.Sarrafzadeh, T.Takahashi, D.Inoue, "Online Max-flow Learning via Augmenting and De-augmenting Path," International Joint Conference on Neural Networks, IEEE, July, 2018.
    3. T.Takahashi, D.Inoue, "Generating Software Identifier Dictionaries from Vulnerability Database," International Conference on Privacy, Security and Trust, Springer, December, 2016.DOI:10.1109/PST.2016.7906965
    4. T.Takahashi, T.Ban, C.Tien, C.Lin, D.Inoue, K.Nakao, "The Usability of Metadata for Android Application Analysis," The 23rd International Conference on Neural Information Processing, Springer, October, 2016.DOI:10.1007/978-3-319-46687-3_60
    5. T.Ban, T.Takahashi, S.Guo, D.Inoue, K.Nakao, "Integration of Multimodal Features for Android Malware Detection Based on Linear SVM," Asia Joint Conference on Information Security, 141 - 146, IEEE, August, 2016.DOI:10.1109/AsiaJCIS.2016.29
    6. T.Takahashi, D.Miyamoto, "Structured Cybersecurity Information Exchange for Streamlining Incident Response Operations," IEEE/IFIP Network Operations and Management Symposium, 949 - 954, IEEE, April, 2016.DOI:10.1109/NOMS.2016.7502931
    7. D.Miyamoto, R.Nakamura, T.Takahashi, Y.Sekiya, "Offloading smartphone firewalling using OpenFlow-capable wireless access points," IEEE International Conference on Pervasive Computing and Communication Workshops, 1 - 4, IEEE, March, 2016.DOI:10.1109/PERCOMW.2016.7457060
    8. T.Takahashi, D.Miyamoto, K.Nakao, "Toward Automated Vulnerability Monitoring using Open Information and Standardized Tool," IEEE International Conference on Pervasive Computing and Communication Workshops, 1 - 4, IEEE, March, 2016.DOI:10.1109/PERCOMW.2016.7457049
    9. T.Takahashi, T.Ban, T.Mimura, K.Nakao, "Fine-Grained Risk Level Quantification Schemes based on APK Metadata," The 22nd International Conference on Neural Information Processing, 663 - 673, Springer, November, 2015.DOI:10.1007/978-3-319-26555-1_75
    10. K.Emura, A.Kanaoka, S.Ohta, T.Takahashi, "A KEM/DEM-based Construction for Secure and Anonymous Communication," The 39th Annual International Computers, Software \& Applications Conference, 680 - 681, IEEE, July, 2015.DOI:10.1109/COMPSAC.2015.54
    11. M.Suzuki, D.Inoue, T.Takahashi, "Cross-Organizational Incident Information Sharing using a Darknet Monitoring System," Coordinating Attack Response at Internet Scale Workshop, Internet Architecture Board, June, 2015.
    12. T.Takahashi, K.Nakao, A.Kanaoka, "Data Model for Android Package Information and Its Application to Risk Analysis System," First ACM Workshop on Information Sharing and Collaborative Security, 71 - 80, ACM, November, 2014.DOI:10.1145/2663876.2663881
    13. J.Kannisto, J.Harju, T.Takahashi, "Digital Identities and Accountable Agreements in Web Applications," International Conference on Security and Management, 266 - 272, International Conference on Security and Management, July, 2014.
    14. Y.Takano, S.Ohta, T.Takahashi, R.Ando, T.Inoue, "MindYourPrivacy: Design and Implementation of a Visualization System for Third-Party Web Tracking," Annual Conference on Privacy, Security and Trust, 48 - 56, IEEE, July, 2014.DOI:10.1109/PST.2014.6890923
    15. T.Takahashi, J.Kannisto, J.Harju, A.Kanaoka, Y.Takano, S.Matsuo, "Expressing Security Requirements: Usability of Taxonomy-based Requirement Identification Scheme," IEEE World Congress on Services, 121 - 128, IEEE, June, 2014.DOI:10.1109/SERVICES.2014.31
    16. T.Takahashi, Y.Kadobayashi, "Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks," IEEE International Conference on Semantic Computing, 279 - 284, IEEE, June, 2014.DOI:10.1109/ICSC.2014.66
    17. K.Emura, A.Kanaoka, S.Ohta, T.Takahashi, "Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation," ACM Symposium On Applied Computing, 1641 - 1648, ACM, March, 2014.DOI:10.1145/2554850.2554879
    18. D.Miyamoto, T.Takahashi, "Toward Automated Reduction of Human Errors based on Cognitive Analysis," International Workshop on Advances In Information Security, 820 - 825, IEEE, July, 2013.DOI:10.1109/IMIS.2013.147
    19. T.Takahashi, J.Kannisto, J.Harju, S.Heikkinen, M.Helenius, S.Matsuo, B.Silverajan, "Accountable Security Mechanism Based on Security Service Level Agreement," IEEE Symposium on Computers and Communications, 404 - 410, IEEE, July, 2013.DOI:10.1109/ISCC.2013.6754980
    20. T.Takahashi, K.Emura, A.Kanaoka, S.Matsuo, T.Minowa, "Risk Visualization and Alerting System: Architecture and Proof-of-Concept Implementation," International Workshop on Security in Embedded Systems and Smartphones, 3 - 10, ACM, May, 2013.DOI:10.1145/2484417.2484421
    21. T.Takahashi, J.Kannisto, B.Silverajan, J.Harju, M.Helenius, S.Matsuo, "An Accountable Security Mechanism in Light of Security Service Level Agreement," Wireless World Research Forum, WWRF, April, 2013.
    22. T.Takahashi, Y.Kadobayashi, Y.Takano, "Linking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism," Annual Computer Security Applications Conference poster session, ACSAC, December, 2012.
    23. E.Moriyama, T.Takahashi, "DNS-based Defense Against IP Spoofing Attacks," The 19th International Conference on Neural Information Processing, 599 - 609, LNCS, November, 2012.DOI:10.1007/978-3-642-34500-5_71
    24. T.Minowa, T.Takahashi, "Secure Distributed Storage for Bulk Data," The 19th International Conference on Neural Information Processing, 566 - 575, LNCS, November, 2012.DOI:10.1007/978-3-642-34500-5_67
    25. T.Takahashi, J.Kannisto, S.Heikkinen, B.Silverajan, M.Helenius, S.Matsuo, J.Harju, "An Architecture of Accountable Security in Light of Security Service Level Agreement," Wireless World Research Forum, WWRF, October, 2012.
    26. T.Takahashi, S.Matsuo, A.Kanaoka, K.Emura, Y.Takano, "Visualization of user's end-to-end security risks," Symposium On Usable Privacy and Security, poster session, SOUPS, June, 2012.
    27. S.Matsuo, A.Kanaoka, T.Takahashi, T.Minowa, "Prototype System for Visualizing Security Risks on Mobile Device," Symposium On Usable Privacy and Security, demo session, SOUPS, June, 2012.
    28. T.Takahashi, G.Blanc, Y.Kadobayashi, D.Fall, H.Hazeyama, S.Matsuo, "Enabling Secure Multitenancy in Cloud Computing: Challenges and Approaches," Baltic Conference on Future Internet Communications, 72 - 79, IEEE, April, 2012.DOI:10.1109/BCFIC.2012.6217983
    29. T.Takahashi, Y.Kadobayashi, K.Nakao, "Toward Global Cybersecurity Collaboration: Cybersecurity Operation Activity Model," Kaleidoscope, 1 - 8, IEEE, December, 2011.
    30. B.Tao, C.Zhang, S.Abe, T.Takahashi, Y.Kadobayashi, "Mining Interlacing Manifolds in High Dimensional Spaces," The 26th Annual ACM Symposium on Applied Computing, 942 - 949, ACM, March, 2011.DOI:10.1145/1982185.1982392
    31. T.Takahashi, H.Hazeyama, D.Miyamoto, Y.Kadobayashi, "Taxonomical Approach to the Deployment of Traceback Mechanisms," Baltic Conference on Future Internet Communications, 13 - 20, IEEE, February, 2011.DOI:10.1109/BCFIC-RIGA.2011.5733214
    32. T.Takahashi, Y.Kadobayashi, H.Fujiwara, "Ontological Approach toward Cybersecurity in Cloud Computing," International Conference on Security of Information and Networks, 100 - 109, ACM, September, 2010.DOI:10.1145/1854099.1854121
    33. T.Takahashi, H.Fujiwara, Y.Kadobayashi, "Building Ontology of Cybersecurity Operational Information," Cyber Security and Information Intelligence Research Workshop, 1 - 4, ACM, April, 2010.DOI:10.1145/1852666.1852756
    34. T.Takahashi, K.Asatani, H.Tominaga, "Multicast Source Handover Scheme based on Proxy Router Discovery," IEEE/CreateNet International Conference on Broadband Networks, 805-812, IEEE, October, 2005.DOI:10.1109/ICBN.2005.1589690
    35. K.Dobashi, T.Takahashi, H.Tominaga, "Adaptive MAC protocol for high-load inter-vehicle communication," IEEE Interrnational Conference on Wireless and Mobile Computing, Networking and Communications, 138 - 145, IEEE, August, 2005.DOI:10.1109/WIMOB.2005.1512896
    36. Y.Shudo, T.Takahashi, K.Asatani, H.Tominaga, "A Framework of a Transcoder Controlling Scheme over Multicast Networks," Asia-Pacific Conference on Communications, 464 - 468, IEEE, August, 2005.DOI:10.1109/APCC.2005.1554102
    37. H.Tashiro, K.Dobashi, T.Takahashi, K.Asatani, H.Tominaga, "A Framework of Real-Time CSMA Protocol for Inter-Vehicle Communications," International Conference on Intelligent Transportation System (ITS) Telecommunications, June, 2005.
    38. T.Takahashi, K.Asatani, H.Tominaga, "A Routing-Aware Handover Scheme for Mobile IP," IEEE International Conference on Communications, 1400 - 1406, IEEE, May, 2005.DOI:10.1109/ICC.2005.1494575
    39. T.Takahashi, K.Asatani, H.Tominaga, "Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery," International Conference on Networking, 859 - 867, April, 2005.DOI:10.1007/978-3-540-31957-3_97
    40. T.Takahashi, J.Harju, K.Asatani, H.Tominaga, "Inter-domain Handover Scheme based on Forwarding Router Discovery for Mobile IP Networks," IEEE Wireless Communications and Networking Conference, 1409 - 1414, IEEE, March, 2005.DOI:10.1109/WCNC.2005.1424722
    41. T.Takahashi, M.Tammi, H.Vatiainen, R.Lehtonen, J.Harju, "Implementation and Performance Evaluation of Multicast Control Protocol," IEEE International Symposium on Computers and Communications, 1038 - 1043, IEEE, June, 2004.DOI:10.1109/ISCC.2004.1358677
    42. T.Takahashi, J.Harju, H.Tominaga, "Handover management in wireless systems based on buffering and signaling," EUNICE Open European Summer School and IFIP Workshop on Next Generation Networks, September, 2003.
    43. T.Takahashi, J.Harju, H.Tominaga, "Layer 3 handover management based on buffering algorithm," Joint Workshop on Mobile Multimedia Communications, July, 2003.
    44. T.Takahashi, A.Nakagawa, K.Sakai, K.Matsuda, H.Tominaga, "Adoption of Dynamic Resolution Conversion Scheme for Low-delay MPEG-4 Communication System," Asia-Pacific Conference on Communications, September, 2002.
    45. T.Takahashi, H.Kasai, T.Hanamura, H.Tominaga, "Packet-multiplexing Scheme in MPEG-2 multi-program Transport Stream Transcoder," IEEE International Conference on Acoustics, Speech, and Signal Processing, 4178, IEEE, May, 2002.DOI:10.1109/ICASSP.2002.5745636
    46. T.Takahashi, H.Kasai, T.Hanamura, H.Tominaga, "Implementation of MPEG-2 Multi-Program Transport Stream Transcoder," Proceedings of International Workshop on Advanced Image Technology, January, 2002.
    47. T.Takahashi, H.Kasai, T.Hanamura, M.Sugiura, H.Tominaga, "MPEG-2 Multi-Program Transport Stream Transcoder," IEEE International Conference on Multimedia \& Expo, 423 - 426, IEEE, August, 2001.DOI:10.1109/ICME.2001.1237747

    Technical Reports and Magazines

    1. T.Takahashi, "Toward Automation of Cybersecurity Operations using Machine-Learning Technologies," NICT News, NICT, March, 2018.
    2. T.Takahashi, "セキュリティオペレーションの自動化に向けた機械学習技術の活用," ITUジャーナル, ITUAJ, March, 2018.
    3. T.Takahashi, "Building security knowledge by standardizing interfaces and data models," NICT Journal, NICT, August, 2016.
    4. T.Takahashi, "Automated vulnerability information distribution system for IT assets on networks," NICT Journal, NICT, August, 2016.
    5. T.Takahashi, "Risk management and evaluation system for smart phone applications," NICT Journal, NICT, August, 2016.
    6. T.Takahashi, "Description and negotiation techniques for establishing security service level agreements," NICT Journal, NICT, August, 2016.
    7. T.Takahashi, "International standardization activities that enables global collaboration beyond country boarders," IEICE communicadtion society magazine, IEICE, March, 2013.
    8. T.Takahashi, "Design and Prototype Implementation of Risk Visualization System," NICT News, NICT, September, 2012.
    9. T.Takahashi, "Overview of the cybersecurity information exchange framework and its current status," Nikkan Kogyo IT solution, The Nikkan Kogyo Shimbun, April, 2012.
    10. T.Takahashi, Y.Kadobayashi, "Cybersecurity Information Exchange Techniques: Cybersecurity Information Ontology and CYBEX," Journal of the National Institute of Information and Communications Technology, NICT, March, 2012.
    11. T.Takahashi, "Recommendation ITU-T X.1500: Cybersecurity Information Exchange Framework," Journal of the ITU Association of Japan, ITUAJ, February, 2012.
    12. T.Takahashi, Y.Kadobayashi, "Cybersecurity Information Exchange Techniques: Information Ontology and CYBEX," NICT Journal, NICT, December, 2011.
    13. A.Rutkowski, Y.Kadobayashi, I.Furey, D.Rajnovic, R.Martin, T.Takahashi, C.Schultz, G.Reid, G.Schudel, M.Hird, S.Adegbite, "CYBEX - The Cybersecurity Information Exchange Framework (X.1500)," ACM CCR technical note, 40, 59 - 64, ACM, October, 2010.DOI:10.1145/1880153.1880163
    14. T.Takahashi, "Cybersecurity Information Exchange Framework : Toward the Improved Global Cybersecurity," NICT News, NICT, September, 2010.

    Web Magazines

    1. T.Takahashi, "IETF 100 report: SUIT updates IoT software," JPNIC News \& Views, December, 2017.
    2. Y.Tochio, T.Takahashi, K.Nishizuka, "Protocols and security for further IoT developments," INTERNET Watch, November, 2017.
    3. T.Takahashi, "Beyond information exchanges: automating security operations," INTERNET Watch, October, 2017.
    4. T.Takahashi, "Data structures and protocols for sharing information among organizations," INTERNET Watch, October, 2017.
    5. Y.Tochio, T.Takahashi, K.Nishizuka, "IETF celebrates its 30th anniversary. Prominent activities are found in the area of IoT techniques and transport layer techniques," INTERNET Watch, April, 2017.
    6. T.Takahashi, T.Ban, "Android Security: malware detection and vulnerability identification techniques for Android applications," atmark IT, March, 2016.
    7. T.Takahashi, "Android Security: elaboration from applications to user viewpoints," atmark IT, March, 2016.
    8. T.Takahashi, H.Takechi, Y.Kadobayashi, "Future of Cybersecurity Operations," atmark IT, December, 2010.
    9. T.Takahashi, H.Takechi, Y.Kadobayashi, "Five blocks composing CYBEX, in a nut shell," atmark IT, November, 2010.
    10. T.Takahashi, H.Takechi, Y.Kadobayashi, "New Security Standard Advancing Collaboration beyond National Borders," atmark IT, October, 2010.

    Domestic Workshops

    1. H.Kanehara, Y.Murakami, J.Shimamura, T.Takahashi, N.Murata, D.Inoue, "非負値Tucker 分解を用いたリアルタイムボットネット検知システムの構築," ICSS研究会, IEICE, July, 2018.
    2. K.Furumoto, T.Takahashi, R.Isawa, D.Inoue, "Generative Adversarial Networksを利用したマルウェアの特徴量摘出手法に関する検討," ICSS研究会, IEICE, June, 2018.
    3. R.Ushigome, T.Matsuda, M.Sonoda, T.Takahashi, M.Suzuki, J.Chao, "Twitter中の異常投稿に対する自動分類の可能性についての考察," ICSS研究会, IEICE, June, 2018.
    4. C.Han, J.Shimamura, T.Takahashi, D.Inoue, M.Kawakita, J.Takeuchi, K.Nakao, "A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso," Technical Report of IEICE, 電子情報通信学会, March, 2018.
    5. T.Takahashi, T.Ban, T.Mimura, K.Nakao, "Studies on Risk Level Evaluation Schemes using APK Metadata," Computer Security Symposium, 情報処理学会, October, 2015.
    6. T.Takahashi, D.Miyamoto, B.Panta, K.Nakao, "A study on a Tool for Automated Vulnerability Monitoring and Alerting on Software Assets inside Organizations," Technical Report of IEICE, 電子情報通信学会, June, 2015.
    7. T.Takahashi, T.Mimura, K.Nishida, K.Nakao, "A Study on Risk Quantification Techniques for Android Applications with Category Information," Technical Report of IEICE, 電子情報通信学会, March, 2015.
    8. K.Emura, A.Kanaoka, S.Ohta, K.Omote, T.Takahashi, "A Secure and Anonymous Communication Protocol and its PrototypeImplementation," DICOMO, DICOMO, July, 2014.
    9. T.Takahashi, Y.Takano, K.Nakao, S.Ohta, A.Kanaoka, S.Sakane, S.Matsuo, "A Risk Evaluation Framework for Android Terminal and its Prototype Implementation," The 31st Symposium on Cryptography and Information Security, 電子情報通信学会, January, 2014.
    10. Y.Takano, R.Ando, T.Takahashi, T.Inoue, S.Uda, "A Measurement Study of Open Resolvers and DNS Server Version," Internet Conference 2013, 電子情報通信学会, October, 2013.
    11. G.Ramirez Caceres, Y.Murakami, K.Zettsu, T.Takahashi, S.Matsuo, "Towards Provenance-Based Security Risk Assessment," Technical Report of IEICE, 電子情報通信学会, March, 2013.
    12. T.Takahashi, Y.Kadobayashi, Y.Takano, "A Study on Cybersecurity Information Discovery Mechanisms over the Internet," Technical Report of IEICE, 電子情報通信学会, July, 2012.
    13. S.Matsuo, A.Kanaoka, T.Takahashi, S.Miwa, T.Minowa, "Visualization for Risk Evaluation and Grand Design for Architecture of Adequate Security," Technical Report of IEICE, 電子情報通信学会, July, 2012.
    14. A.Kanaoka, T.Takahashi, "Workshop on Usable Security (USEC12) Report," IPSJ workshop, 情報処理学会, May, 2012.
    15. T.Takahashi, G.Blanc, Y.Kadobayashi, D.Fall, H.Hazeyama, S.Matsuo, "Multitenant Cloud Computing: Security Challenges and Approaches," Technical Report of IEICE, 電子情報通信学会, November, 2011.
    16. T.Takahashi, Y.Kadobayashi, H.Fujiwara, "Ontological Approach Toward Cybersecurity in Cloud Computing," Technical Report of IEICE, 電子情報通信学会, November, 2010.
    17. T.Takahashi, Y.Kadobayashi, H.Fujiwara, "Building Ontology of Cybersecurity Operational Information," Technical Report of IEICE, 電子情報通信学会, July, 2010.
    18. K.Arasaki, T.Takahashi, K.Asatani, H.Tominaga, "Routing-Aware Handover for IP Multicasting based on Forwarding Router Discovery," Technical Report of IEICE, 電子情報通信学会, January, 2007.
    19. K.Arasaki, T.Takahashi, Y.Shudo, H.Tominaga, "Mobile IP Communication based on the Control over Cellular Networks," Technical Report of IEICE, 電子情報通信学会, March, 2006.
    20. M.Ito, T.Takahashi, H.Tashiro, K.Asatani, H.Tominaga, "A Route Optimization in Consideration of Handover in Nested Mobile Network," Technical Report of IEICE, 電子情報通信学会, January, 2006.
    21. T.Takahashi, K.Arasaki, K.Asatani, H.Tominaga, "Multicast Receiver Mobility over Mobile IP Networks Based on Forwarding Router Discovery," Technical Report of IEICE, 電子情報通信学会, November, 2005.
    22. Y.Shudo, T.Takahashi, K.Asatani, H.Tominaga, "Transcoder Controlling Scheme over Multicast Networks," Technical Report of IEICE, 電子情報通信学会, July, 2005.
    23. T.Takahashi, Y.Shudo, K.Asatani, H.Tominaga, "A Routing-Aware Handover Scheme over Mobile IP Networks," Technical Report of IEICE, 電子情報通信学会, May, 2005.
    24. H.Tashiro, K.Dobashi, T.Takahashi, H.Tominaga, "A Framework of Non-persistent CSMA Protocol for Inter-Vehicle Communications," Technical Report of IEICE, 電子情報通信学会, May, 2005.
    25. Y.Shudo, T.Takahashi, K.Asatani, H.Tominaga, "A Framework of a Transcoder Controlling Scheme over Multicast Networks," Technical Report of IEICE, 電子情報通信学会, March, 2005.
    26. T.Takahashi, H.Tominaga, "Handover Management based on Forwarding Router Discovery Scheme," Technical Report of IEICE, 電子情報通信学会, July, 2004.
    27. T.Takahashi, H.Tominaga, "Framework of Multicast controlling scheme over Mobile IP network," Technical Report of IEICE, 電子情報通信学会, June, 2004.
    28. H.Miyoshi, T.Takahashi, A.nakagawa, K.Matsuda, H.Tominaga, "Context-based motion vector coding with 2-Dimensional VLC," Technical Report of IEICE, 電子情報通信学会, July, 2002.
    29. T.Takahashi, A.nakagawa, K.Sakai, K.Matsuda, H.Tominaga, "Efficiency of Dynamic Resolution Conversion Scheme in MPEG-4 Low-delay Communication System," Technical Report of IEICE, 電子情報通信学会, January, 2002.
    30. T.Takahashi, T.Hanamura, H.Tominaga, "Implementation of Packet-multiplexing scheme in MPEG-2 multi-program Transport Stream Transcoder," AVM study group workshop of IPSJ, 情報処理学会, June, 2001.
    31. T.Takahashi, T.Hanamura, H.Tominaga, "Implementation of Packet-multiplexing scheme in MPEG-2 multi-program Transport Stream Transcoder," Technical Report of IEICE, 電子情報通信学会, April, 2001.
    32. T.Takahashi, T.Hanamura, H.Kasai, M.Sugiura, H.Tominaga, "Packet-multiplexing scheme in MPEG-2 multi-program Transport Stream Transcoder," Technical Report of IEICE, 電子情報通信学会, March, 2001.

    Others

    1. T.Takahashi, Y.Kadobayashi, "Ontological Approach toward Cybersecurity in Cloud Computing ," ITU-T workshop, December, 2010.
    2. T.Takahashi, "Global Developments in Cybersecurity Information Exchange Framework (invited talk)," Asian Internet Engineering Conference, October, 2011.
    3. T.Takahashi, "Real-Time Communication Architecture in Mobile Environments," Doctoral thesis at Waseda University Japan, 早稲田大学, February, 2005.
    4. A.Nakagawa, T.Takahashi, "Context-based motion vector coding with 2-Dimensional VLC," Joint Video Team of ISO/IEC MPEG\&ITU-T VCEG, 3rd Meeting: Fairfax, Virginia, USA, JVT-C097, ISO/IEC, ITU-T, May, 2002.
    5. T.Takahashi, "Research of realtime application for next generational multimedia communication : Transcoding, Low-delay, and high-compression," Master thesis at Waseda University Japan, 早稲田大学, September, 2002.
    6. T.Hanamura, H.Tominaga, T.Takahashi, I.Nagayoshi, "Remultiplexing scheme for MPEG-2 multiprogram transport stream transcoder," patent, P2001-79216, March, 2001.
    7. T.Takahashi, "Packet-multiplexing scheme in MPEG-2 multi-program Transport Stream Transcoder," Graduation thesis at Waseda University Japan, 早稲田大学, February, 2001.