Takeshi Takahashi Takeshi Takahashi
English Page “ú–{Œê‚̃y[ƒW
Publications

Peer-Reviewed Journals and Magazines

  1. Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, Daisuke Inoue, "Automatically Generating Malware Analysis Reports Using Sandbox Logs," IEICE Transactions on Information and Systems, 2622 - 2632, 2018.11. [bibtex]
  2. Takeshi Takahashi, Tao Ban, "Android Application Analysis using Machine Learning Techniques," Intelligent Systems Reference Library, 181 - 205, 2019.. doi:10.1007/978-3-319-98842-9_7. [bibtex]
  3. Takeshi Takahashi, Bhola Panta, Youki Kadobayashi, Koji Nakao, "Web of Cybersecurity: Linking, Locating, and Discovering Structured Cybersecurity Information," International Journal of Communication Systems, 2017.12. doi:10.1002/dac.3470. [impact factor:1.066][bibtex]
  4. Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi, "Establishing Secure and Anonymous Communication Channel: KEM/DEM-based Construction and Its Implementation," Journal of Information Security and Applications, 2017.2. doi:10.1016/j.jisa.2016.12.001. [bibtex]
  5. Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi, "Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation," IEEE Transactions on Emerging Topics in Computing, 88 - 101, 2016.2. doi:10.1109/TETC.2015.2400131. [Published PDF][bibtex]
  6. Joona Kannisto, Takeshi Takahashi, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan, "A Non-repudiable Negotiation Protocol for Security Service Level Agreements," International Journal of Communication Systems, 2067 - 2081, 2015.10. doi:10.1002/dac.2856. [impact factor:1.099][bibtex]
  7. Takeshi Takahashi, Youki Kadobayashi, "Reference Ontology for Cybersecurity Operational Information," The Computer Journal, 2297 - 2312, 2015.10. doi:10.1093/comjnl/bxu101. [Published PDF][impact factor:1.000][bibtex]
  8. Yuuki Takano, Ruo Ando, Satoshi Uda, Takeshi Takahashi, Tomoya Inoue, "DNSオープンリゾルãƒã®å®Ÿæ…‹," é›»å­æƒ…報通信学会論文誌, 873 - 889, 2014.10. [bibtex]
  9. Takeshi Takahashi, Jarmo Harju, Joona Kannisto, Bilhanan Silverajan, Jarmo Harju, Shin'ichiro Matsuo, "Tailored security: building nonrepudiable security service level agreements," IEEE Vehicular Technology Magazine, 54 - 62, 2013.7. doi:10.1109/MVT.2013.2269188. [preprint][impact factor:1.567][bibtex]
  10. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, Takeshi Takahashi, "Behind HumanBoost: Analysis of Users' Trust Decision Patterns for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications, 319 - 329, 2012.11. doi:10.4236/jilsa.2012.44033. [Published PDF][bibtex]
  11. Takeshi Takahashi, Koichi Asatani, Jarmo Harju, Hideyoshi Tominaga, "Proactive Handover Scheme based on Forwarding Router Discovery for Mobile IP Networks," IEICE Transactions on Communications, 2718 - 2725, 2005.7. doi:10.1093/ietcom/e88-b.7.2718. [preprint][impact factor:0.348][bibtex]
  12. Takeshi Takahashi, Tsuyoshi Hanamura, Hiroyuki Kasai, Isao Nagayoshi, Hideyoshi Tominaga, "Remultiplexing scheme for MPEG-2 multiprogram transport stream transcoder," Journal of Electronics and Communications in Japan Part1: Communications, 1 - 13, 2002.10. doi:10.1002/ecja.10066. [bibtex]
  13. Takeshi Takahashi, Tsuyoshi Hanamura, Hiroyuki Kasai, Isao Nagayoshi, Hideyoshi Tominaga, "MPEG-2マルãƒãƒ—ログラムトランスãƒãƒ¼ãƒˆã‚¹ãƒˆãƒªãƒ¼ãƒ ãƒˆãƒ©ãƒ³ã‚¹ã‚³ãƒ¼ãƒ€ã«ãŠã‘る出力パケットå†å¤šé‡åŒ–æ–¹å¼," é›»å­æƒ…報通信学会論文誌, 299 - 311, 2002.2. [docInfo][bibtex]
International Standards

  1. Takeshi Takahashi, Roman Danyliw, Mio Suzuki, "JSON binding of IODEF," Internet Draft (draft-ietf-mile-jsoniodef-03), 2018.3. [bibtex]
  2. Takeshi Takahashi, "X.1541: Incident object description exchange format version 2," Recommendation ITU-T X.1541, 2017.9. [bibtex]
  3. Takeshi Takahashi, Kent Landfield, Youki Kadobayashi, "An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information," Request for Comments (RFC) 7203, 2014.4. doi:10.17487/RFC7203. [bibtex]
  4. Takeshi Takahashi, Youki Kadobayashi, "Discovery mechanisms in the exchange of cybersecurity information," Recommendation ITU-T X.1570, 2011.9. [bibtex]
  5. Huirong Tian, Heung Youl Youm, Takeshi Takahashi, "Usability of network traceback," Supplement 10, Recommendation ITU-T X.1205, 2011.9. [bibtex]
  6. Stephen Adegbite, Inette Furey, Youki Kadobayashi, Robert A. Martin, Damir Rajnovic, Gavin Reid, Tony Rutkowski, Gregg Schudel, Takeshi Takahashi, "Overview of Cybersecurity information exchange (CYBEX)," Recommendation ITU-T X.1500, 2011.4. [bibtex]
International Conferences

  1. Ryo Iijima, Shota Minami, Zhou Yunao, Tatsuya Takehisa, Takeshi Takahashi, Yasuo Oikawa, Tatsuya Mori, "Poster: Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams," ACM Conference on Computer and Communications Security, 2018.10. [bibtex]
  2. Lei Zhu, Tao Ban, Takeshi Takahashi, Daisuke Inoue, "Employ Decision Value for Binary Soft Classifier Evaluation with Crispy Reference," The 25th International Conference on Neural Information Processing, 2018.12. [bibtex]
  3. Shun-Chieh Chang, Yeali Sun, Wu Long Chuang, Meng Chang Chen, Bo Sun, Takeshi Takahashi, "ANTSdroid:Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family," IEEE Pacific Rim International Symposium on Dependable Computing, Taipei, 2018.12. [bibtex]
  4. Chalee Vorakulpipat, Takeshi Takahashi, Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, Daisuke Inoue, "Cloud-based IoT Biometric Authentication Development Solution and its Security Extension," IEEE Symposium on Computers and Communications, Natal, 2018.6. [bibtex]
  5. Shaoning Pang, Lei Zhu, Tao Ban, Kazushi Ikeda, Wangfei Zhang, Abdolhossein Sarrafzadeh, Takeshi Takahashi, Daisuke Inoue, "Online Max-flow Learning via Augmenting and De-augmenting Path," International Joint Conference on Neural Networks, Rio, 2018.7. [bibtex]
  6. Takeshi Takahashi, Daisuke Inoue, "Generating Software Identifier Dictionaries from Vulnerability Database," International Conference on Privacy, Security and Trust, Auckland, 2016.12. doi:10.1109/PST.2016.7906965. [bibtex]
  7. Takeshi Takahashi, Tao Ban, Chin-Wei Tien, Chih-Hung Lin, Daisuke Inoue, Koji Nakao, "The Usability of Metadata for Android Application Analysis," The 23rd International Conference on Neural Information Processing, Kyoto, 2016.10. doi:10.1007/978-3-319-46687-3_60. [bibtex]
  8. Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue, Koji Nakao, "Integration of Multimodal Features for Android Malware Detection Based on Linear SVM," Asia Joint Conference on Information Security, 141 - 146, Fukuoka, 2016.8. doi:10.1109/AsiaJCIS.2016.29. [bibtex]
  9. Takeshi Takahashi, Daisuke Miyamoto, "Structured Cybersecurity Information Exchange for Streamlining Incident Response Operations," IEEE/IFIP Network Operations and Management Symposium, 949 - 954, Istanbul, 2016.4. doi:10.1109/NOMS.2016.7502931. [bibtex]
  10. Daisuke Miyamoto, Ryo Nakamura, Takeshi Takahashi, Yuji Sekiya, "Offloading smartphone firewalling using OpenFlow-capable wireless access points," IEEE International Conference on Pervasive Computing and Communication Workshops, 1 - 4, Sydney, 2016.3. doi:10.1109/PERCOMW.2016.7457060. [bibtex]
  11. Takeshi Takahashi, Daisuke Miyamoto, Koji Nakao, "Toward Automated Vulnerability Monitoring using Open Information and Standardized Tool," IEEE International Conference on Pervasive Computing and Communication Workshops, 1 - 4, Sydney, 2016.3. doi:10.1109/PERCOMW.2016.7457049. [bibtex]
  12. Takeshi Takahashi, Tao Ban, Takao Mimura, Koji Nakao, "Fine-Grained Risk Level Quantification Schemes based on APK Metadata," The 22nd International Conference on Neural Information Processing, 663 - 673, Istanbul, 2015.11. doi:10.1007/978-3-319-26555-1_75. [Published PDF][bibtex]
  13. Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi, "A KEM/DEM-based Construction for Secure and Anonymous Communication," The 39th Annual International Computers, Software & Applications Conference, 680 - 681, Taichung, 2015.7. doi:10.1109/COMPSAC.2015.54. [bibtex]
  14. Mio Suzuki, Daisuke Inoue, Takeshi Takahashi, "Cross-Organizational Incident Information Sharing using a Darknet Monitoring System," Coordinating Attack Response at Internet Scale Workshop, Berlin, 2015.6. [docInfo][Published PDF][bibtex]
  15. Takeshi Takahashi, Koji Nakao, Akira Kanaoka, "Data Model for Android Package Information and Its Application to Risk Analysis System," First ACM Workshop on Information Sharing and Collaborative Security, 71 - 80, Arizona, 2014.11. doi:10.1145/2663876.2663881. [bibtex]
  16. Joona Kannisto, Jarmo Harju, Takeshi Takahashi, "Digital Identities and Accountable Agreements in Web Applications," International Conference on Security and Management, 266 - 272, Las Vegas, 2014.7. [bibtex]
  17. Yuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, Tomoya Inoue, "MindYourPrivacy: Design and Implementation of a Visualization System for Third-Party Web Tracking," Annual Conference on Privacy, Security and Trust, 48 - 56, Toronto, 2014.7. doi:10.1109/PST.2014.6890923. [bibtex]
  18. Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Akira Kanaoka, Yuuki Takano, Shin'ichiro Matsuo, "Expressing Security Requirements: Usability of Taxonomy-based Requirement Identification Scheme," IEEE World Congress on Services, 121 - 128, Anchorage, 2014.6. doi:10.1109/SERVICES.2014.31. [bibtex]
  19. Takeshi Takahashi, Youki Kadobayashi, "Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks," IEEE International Conference on Semantic Computing, 279 - 284, Newport Beach, 2014.6. doi:10.1109/ICSC.2014.66. [bibtex]
  20. Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi, "Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation," ACM Symposium On Applied Computing, 1641 - 1648, Gyeongju, 2014.3. doi:10.1145/2554850.2554879. [bibtex]
  21. Daisuke Miyamoto, Takeshi Takahashi, "Toward Automated Reduction of Human Errors based on Cognitive Analysis," International Workshop on Advances In Information Security, 820 - 825, Taichung, 2013.7. doi:10.1109/IMIS.2013.147. [bibtex]
  22. Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan, "Accountable Security Mechanism Based on Security Service Level Agreement," IEEE Symposium on Computers and Communications, 404 - 410, Split, 2013.7. doi:10.1109/ISCC.2013.6754980. [bibtex]
  23. Takeshi Takahashi, Keita Emura, Akira Kanaoka, Shin'ichiro Matsuo, Tadashi Minowa, "Risk Visualization and Alerting System: Architecture and Proof-of-Concept Implementation," International Workshop on Security in Embedded Systems and Smartphones, 3 - 10, Hangzhou, 2013.5. doi:10.1145/2484417.2484421. [bibtex]
  24. Takeshi Takahashi, Joona Kannisto, Bilhanan Silverajan, Jarmo Harju, Marko Helenius, Shin'ichiro Matsuo, "An Accountable Security Mechanism in Light of Security Service Level Agreement," Wireless World Research Forum, Oulu, 2013.4. [bibtex]
  25. Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano, "Linking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism," Annual Computer Security Applications Conference poster session, Orlando, 2012.12. [bibtex]
  26. Eimatsu Moriyama, Takeshi Takahashi, "DNS-based Defense Against IP Spoofing Attacks," The 19th International Conference on Neural Information Processing, 599 - 609, Doha, 2012.11. doi:10.1007/978-3-642-34500-5_71. [bibtex]
  27. Tadashi Minowa, Takeshi Takahashi, "Secure Distributed Storage for Bulk Data," The 19th International Conference on Neural Information Processing, 566 - 575, Doha, 2012.11. doi:10.1007/978-3-642-34500-5_67. [bibtex]
  28. Takeshi Takahashi, Joona Kannisto, Seppo Heikkinen, Bilhanan Silverajan, Marko Helenius, Shin'ichiro Matsuo, Jarmo Harju, "An Architecture of Accountable Security in Light of Security Service Level Agreement," Wireless World Research Forum, Berlin, 2012.10. [bibtex]
  29. Takeshi Takahashi, Shin'ichiro Matsuo, Akira Kanaoka, Keita Emura, Yuuki Takano, "Visualization of user's end-to-end security risks," Symposium On Usable Privacy and Security, Washington, 2012.6. [preprint][bibtex]
  30. Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Tadashi Minowa, "Prototype System for Visualizing Security Risks on Mobile Device," Symposium On Usable Privacy and Security, Washington, 2012.6. [preprint][bibtex]
  31. Takeshi Takahashi, Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo, "Enabling Secure Multitenancy in Cloud Computing: Challenges and Approaches," Baltic Conference on Future Internet Communications, 72 - 79, Vilnius, 2012.4. doi:10.1109/BCFIC.2012.6217983. [preprint][bibtex]
  32. Takeshi Takahashi, Youki Kadobayashi, Koji Nakao, "Toward Global Cybersecurity Collaboration: Cybersecurity Operation Activity Model," Kaleidoscope, 1 - 8, Cape Town, 2011.12. [bibtex]
  33. Ban Tao, Changshui Zhang, Shigeo Abe, Takeshi Takahashi, Youki Kadobayashi, "Mining Interlacing Manifolds in High Dimensional Spaces," The 26th Annual ACM Symposium on Applied Computing, 942 - 949, Taichung, 2011.3. doi:10.1145/1982185.1982392. [preprint][bibtex]
  34. Takeshi Takahashi, Hiroaki Hazeyama, Daisuke Miyamoto, Youki Kadobayashi, "Taxonomical Approach to the Deployment of Traceback Mechanisms," Baltic Conference on Future Internet Communications, 13 - 20, Riga, 2011.2. doi:10.1109/BCFIC-RIGA.2011.5733214. [preprint][bibtex]
  35. Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara, "Ontological Approach toward Cybersecurity in Cloud Computing," International Conference on Security of Information and Networks, 100 - 109, Taganrog, 2010.9. doi:10.1145/1854099.1854121. [preprint][bibtex]
  36. Takeshi Takahashi, Hiroyuki Fujiwara, Youki Kadobayashi, "Building Ontology of Cybersecurity Operational Information," Cyber Security and Information Intelligence Research Workshop, 1 - 4, Oak Ridge, 2010.4. doi:10.1145/1852666.1852756. [preprint][bibtex]
  37. Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "Multicast Source Handover Scheme based on Proxy Router Discovery," IEEE/CreateNet International Conference on Broadband Networks, 805-812, Boston, 2005.10. doi:10.1109/ICBN.2005.1589690. [preprint][bibtex]
  38. Kentaro Dobashi, Takeshi Takahashi, Hideyoshi Tominaga, "Adaptive MAC protocol for high-load inter-vehicle communication," IEEE Interrnational Conference on Wireless and Mobile Computing, Networking and Communications, 138 - 145, Montreal, 2005.8. doi:10.1109/WIMOB.2005.1512896. [bibtex]
  39. Yusuke Shudo, Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "A Framework of a Transcoder Controlling Scheme over Multicast Networks," Asia-Pacific Conference on Communications, 464 - 468, Perth, 2005.8. doi:10.1109/APCC.2005.1554102. [bibtex]
  40. Hirokazu Tashiro, Kentaro Dobashi, Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "A Framework of Real-Time CSMA Protocol for Inter-Vehicle Communications," International Conference on Intelligent Transportation System (ITS) Telecommunications, Brest, 2005.6. [bibtex]
  41. Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "A Routing-Aware Handover Scheme for Mobile IP," IEEE International Conference on Communications, 1400 - 1406, Seoul, 2005.5. doi:10.1109/ICC.2005.1494575. [preprint][bibtex]
  42. Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery," International Conference on Networking, 859 - 867, Reunion Island, 2005.4. doi:10.1007/978-3-540-31957-3_97. [bibtex]
  43. Takeshi Takahashi, Jarmo Harju, Koichi Asatani, Hideyoshi Tominaga, "Inter-domain Handover Scheme based on Forwarding Router Discovery for Mobile IP Networks," IEEE Wireless Communications and Networking Conference, 1409 - 1414, New Orleans, 2005.3. doi:10.1109/WCNC.2005.1424722. [preprint][bibtex]
  44. Takeshi Takahashi, Miikka Tammi, Heikki Vatiainen, Rami Lehtonen, Jarmo Harju, "Implementation and Performance Evaluation of Multicast Control Protocol," IEEE International Symposium on Computers and Communications, 1038 - 1043, Alexandria, 2004.6. doi:10.1109/ISCC.2004.1358677. [preprint][bibtex]
  45. Takeshi Takahashi, Jarmo Harju, Hideyoshi Tominaga, "Handover management in wireless systems based on buffering and signaling," EUNICE Open European Summer School and IFIP Workshop on Next Generation Networks, Budapest, 2003.9. [bibtex]
  46. Takeshi Takahashi, Jarmo Harju, Hideyoshi Tominaga, "Layer 3 handover management based on buffering algorithm," Joint Workshop on Mobile Multimedia Communications, Seoul, 2003.7. [bibtex]
  47. Takeshi Takahashi, Akira Nakagawa, Kiyoshi Sakai, Kiichi Matsuda, Hideyoshi Tominaga, "Adoption of Dynamic Resolution Conversion Scheme for Low-delay MPEG-4 Communication System," Asia-Pacific Conference on Communications, Bandung, 2002.9. [bibtex]
  48. Takeshi Takahashi, Hiroyuki Kasai, Tsuyoshi Hanamura, Hideyoshi Tominaga, "Packet-multiplexing Scheme in MPEG-2 multi-program Transport Stream Transcoder," IEEE International Conference on Acoustics, Speech, and Signal Processing, 4178, Orlando, 2002.5. doi:10.1109/ICASSP.2002.5745636. [bibtex]
  49. Takeshi Takahashi, Hiroyuki Kasai, Tsuyoshi Hanamura, Hideyoshi Tominaga, "Implementation of MPEG-2 Multi-Program Transport Stream Transcoder," Proceedings of International Workshop on Advanced Image Technology, Hualien, 2002.1. [bibtex]
  50. Takeshi Takahashi, Hiroyuki Kasai, Tsuyoshi Hanamura, Maki Sugiura, Hideyoshi Tominaga, "MPEG-2 Multi-Program Transport Stream Transcoder," IEEE International Conference on Multimedia & Expo, 423 - 426, Tokyo, 2001.8. doi:10.1109/ICME.2001.1237747. [bibtex]
Magazines / newsletters

  1. Takeshi Takahashi, "サイãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£å¯¾ç­–ã®è‡ªå‹•åŒ–ã«å‘ã‘ãŸæ©Ÿæ¢°å­¦ç¿’技術ã®æ´»ç”¨," NICT News, 2018.3. [bibtex]
  2. Takeshi Takahashi, "セキュリティオペレーションã®è‡ªå‹•åŒ–ã«å‘ã‘ãŸæ©Ÿæ¢°å­¦ç¿’技術ã®æ´»ç”¨," ITUジャーナル, 2018.3. [bibtex]
  3. Takeshi Takahashi, "セキュリティ情報知識ベースã®æ§‹ç¯‰ã¨æ¨™æº–化活動," NICT機関誌, 2016.8. [bibtex]
  4. Takeshi Takahashi, "ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ä¸Šã®IT資産ã«é–¢ã™ã‚‹è„†å¼±æ€§æƒ…報自動é…信システム," NICT機関誌, 2016.8. [bibtex]
  5. Takeshi Takahashi, "スマートフォンアプリã®ãƒªã‚¹ã‚¯ç›£è¦–・評価技術," NICT機関誌, 2016.8. [bibtex]
  6. Takeshi Takahashi, "セキュリティSLA構築ã®ãŸã‚ã®è¨˜è¿°æ‰‹æ³•ã¨ãƒã‚´ã‚·ã‚¨ãƒ¼ã‚·ãƒ§ãƒ³æŠ€è¡“," NICT機関誌, 2016.8. [bibtex]
  7. Takeshi Takahashi, "国を超ãˆãŸãƒãƒ¼ãƒ ãƒ¯ãƒ¼ã‚¯ã‚’実ç¾ã™ã‚‹å›½éš›æ¨™æº–化活動," é›»å­æƒ…報通信学会通信ソサイエティマガジン, 2013.3. [Published PDF][bibtex]
  8. Takeshi Takahashi, "リスクå¯è¦–化システムã®æ¤œè¨Žã¨ãƒ—ロトタイプ構築," NICTニュース, 2012.9. [Published PDF][bibtex]
  9. Takeshi Takahashi, "サイãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£æƒ…報交æ›ãƒ•ãƒ¬ãƒ¼ãƒ ãƒ¯ãƒ¼ã‚¯ã®æ¦‚è¦ã¨æƒ…報表ç¾æŠ€è¡“ã®ç¾çŠ¶," 日刊工業ITソリューション, 2012.4. [bibtex]
  10. Takeshi Takahashi, Youki Kadobayashi, "Cybersecurity Information Exchange Techniques: Cybersecurity Information Ontology and CYBEX," Journal of the National Institute of Information and Communications Technology, 2012.3. [preprint][bibtex]
  11. Takeshi Takahashi, "ITU-T勧告X.1500: サイãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£æƒ…報交æ›ãƒ•ãƒ¬ãƒ¼ãƒ ãƒ¯ãƒ¼ã‚¯," ITUジャーナル, 2012.2. [preprint][bibtex]
  12. Takeshi Takahashi, Youki Kadobayashi, "サイãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£æƒ…報交æ›æŠ€è¡“: 情報オントロジã®æ§‹ç¯‰ã¨CYBEX," 情報通信研究機構季報, 2011.12. [bibtex]
  13. Anthony Rutkowski, Youki Kadobayashi, Inette Furey, Damir Rajnovic, Robert Martin, Takeshi Takahashi, Craig Schultz, Gavin Reid, Gregg Schudel, Mike Hird, Stephen Adegbite, "CYBEX - The Cybersecurity Information Exchange Framework (X.1500)," ACM CCR technical note, 59 - 64, 2010.10. doi:10.1145/1880153.1880163. [preprint][bibtex]
  14. Takeshi Takahashi, "セキュリティ情報交æ›ãƒ•ãƒ¬ãƒ¼ãƒ ãƒ¯ãƒ¼ã‚¯: 地çƒè¦æ¨¡ã§ã®ã‚µã‚¤ãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£å‘上を目指ã—ã¦," NICTニュース, 2010.9. [bibtex]
Web magazines

  1. Takeshi Takahashi, "第100回IETF IoT関連報告 ソフトウェアアップデートを扱ã†SUIT," JPNIC News & Views, 2017.12. [bibtex]
  2. Yuji Tochio, Takeshi Takahashi, Kaname Nishizuka, "IoTã®ã•ã‚‰ãªã‚‹å®Ÿç¾ã«å‘ã‘ãŸãƒ—ロトコルï¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£," INTERNET Watch, 2017.11. [preprint][bibtex]
  3. Takeshi Takahashi, "セキュリティ情報連æºã®ãã®å…ˆã¸â€•â€•ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£è‡ªå‹•åŒ–ã«å‘ã‘ãŸæ¤œè¨Ž," INTERNET Watch, 2017.10. [preprint][bibtex]
  4. Takeshi Takahashi, "サイãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã‚’“守るå´â€ãŒæƒ…報連æºã™ã‚‹ãŸã‚ã®ãƒ‡ãƒ¼ã‚¿æ§‹é€ ï¼ãƒ—ロトコルãŸã¡," INTERNET Watch, 2017.10. [preprint][bibtex]
  5. Yuji Tochio, Takeshi Takahashi, Kaname Nishizuka, "「IETFã€30周年ã€IoT分野ã§æ–°WGã€ãƒˆãƒ©ãƒ³ã‚¹ãƒãƒ¼ãƒˆãƒ¬ã‚¤ãƒ¤ãƒ¼ã§å¤§ããªå‹•ãã‚‚," INTERNET Watch, 2017.4. [preprint][bibtex]
  6. Takeshi Takahashi, Tao Ban, "Androidセキュリティ: Androidアプリã®ã€Œãƒžãƒ«ã‚¦ã‚§ã‚¢åˆ¤å®šã€ã€Œè„†å¼±æ€§æ¤œçŸ¥ã€æŠ€è¡“," アットマーク・アイティ, 2016.3. [preprint][bibtex]
  7. Takeshi Takahashi, "Androidセキュリティ: アプリã‹ã‚‰ãƒ¦ãƒ¼ã‚¶ãƒ¼è¦–点ã¾ã§ã‚¤ãƒã‹ã‚‰è§£èª¬," アットマーク・アイティ, 2016.3. [preprint][bibtex]
  8. Takeshi Takahashi, Hiroshi Takechi, Youki Kadobayashi, "サイãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã‚ªãƒšãƒ¬ãƒ¼ã‚·ãƒ§ãƒ³ã®å°†æ¥," アットマーク・アイティ, 2010.12. [preprint][bibtex]
  9. Takeshi Takahashi, Hiroshi Takechi, Youki Kadobayashi, "一目ã§åˆ†ã‹ã‚‹ã€CYBEXを構æˆã™ã‚‹5ã¤ã®ãƒ–ロック," アットマーク・アイティ, 2010.11. [preprint][bibtex]
  10. Takeshi Takahashi, Hiroshi Takechi, Youki Kadobayashi, "国境を越ãˆãŸé€£æºã‚’目指ã™æ–°ã—ã„セキュリティ標準," アットマーク・アイティ, 2010.10. [preprint][bibtex]
Domestic Workshops

  1. Ryo Iijima, Shouta Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori, "超音波ã®åˆ†é›¢æ”¾å°„ã«ã‚ˆã‚‹éŸ³å£°èªè­˜æ©Ÿå™¨ã¸ã®æ”»æ’ƒ:ユーザスタディ評価ã¨å¯¾ç­–技術ã®æ案 ," CSS, 2018.10. [bibtex]
  2. Hideaki Kanehara, Yuma Murakami, Jumpei Shimamura, Takeshi Takahashi, Noboru Murata, Daisuke Inoue, "éžè² å€¤Tucker 分解を用ã„ãŸãƒªã‚¢ãƒ«ã‚¿ã‚¤ãƒ ãƒœãƒƒãƒˆãƒãƒƒãƒˆæ¤œçŸ¥ã‚·ã‚¹ãƒ†ãƒ ã®æ§‹ç¯‰," ICSS研究会, 2018.7. [bibtex]
  3. Keisuke Furumoto, Takeshi Takahashi, Ryoichi Isawa, Daisuke Inoue, "Generative Adversarial Networksを利用ã—ãŸãƒžãƒ«ã‚¦ã‚§ã‚¢ã®ç‰¹å¾´é‡æ‘˜å‡ºæ‰‹æ³•ã«é–¢ã™ã‚‹æ¤œè¨Ž," ICSS研究会, 2018.6. [bibtex]
  4. Ryutaro Ushigome, Takeshi Matsuda, Michio Sonoda, Takeshi Takahashi, Mio Suzuki, Jinhui Chao, "Twitter中ã®ç•°å¸¸æŠ•ç¨¿ã«å¯¾ã™ã‚‹è‡ªå‹•åˆ†é¡žã®å¯èƒ½æ€§ã«ã¤ã„ã¦ã®è€ƒå¯Ÿ," ICSS研究会, 2018.6. [bibtex]
  5. Chansu Han, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Masanori Kawakita, Jun'ichi Takeuchi, Koji Nakao, "Graphical Lasso を用ã„ãŸãƒ€ãƒ¼ã‚¯ãƒãƒƒãƒˆãƒ‡ãƒ¼ã‚¿ã®ãƒªã‚¢ãƒ«ã‚¿ã‚¤ãƒ åˆ†æžã«åŸºã¥ãマルウェア活動検知ã«é–¢ã™ã‚‹æ¤œè¨Ž," 信学技報, 沖縄, 2018.3. [bibtex]
  6. Takeshi Takahashi, Tao Ban, Takao Mimura, Koji Nakao, "メタ情報を活用ã—ãŸAndroidアプリケーションã®ãƒªã‚¹ã‚¯åˆ†æžæ‰‹æ³•ã«é–¢ã™ã‚‹æ¤œè¨Ž," コンピュータセキュリティシンãƒã‚¸ã‚¦ãƒ , é•·å´Ž, 2015.10. [docInfo][bibtex]
  7. Takeshi Takahashi, Daisuke Miyamoto, Bhola Panta, Koji Nakao, "組織内ã®ã‚½ãƒ•ãƒˆã‚¦ã‚§ã‚¢è³‡ç”£ã«å¯¾ã™ã‚‹è„†å¼±æ€§ç›£è¦–・警告自動化ツールã®æ¤œè¨Ž," 信学技報, ç¦å²¡, 2015.6. [docInfo][bibtex]
  8. Takeshi Takahashi, Takao Mimura, Kanta Nishida, Koji Nakao, "カテゴリã«åŸºã¥ãAndroid アプリã®ãƒªã‚¹ã‚¯å€¤å®šé‡åŒ–技術ã®æ¤œè¨Ž," 信学技報, 沖縄, 2015.3. [docInfo][bibtex]
  9. Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi, "æš—å·åŒ–匿å通信プロトコルã®æ案ã¨ãã®ãƒ—ロトタイプ実装," DICOMO, 新潟, 2014.7. [docInfo][bibtex]
  10. Takeshi Takahashi, Yuuki Takano, Koji Nakao, Satoshi Ohta, Akira Kanaoka, Shoichi Sakane, Shin'ichiro Matsuo, "Android 端末ã®ãƒªã‚¹ã‚¯è©•ä¾¡ãƒ•ãƒ¬ãƒ¼ãƒ ãƒ¯ãƒ¼ã‚¯ã¨ãã®ãƒ—ロトタイプ構築," æš—å·ã¨æƒ…報セキュリティシンãƒã‚¸ã‚¦ãƒ , 鹿å…島, 2014.1. [docInfo][bibtex]
  11. Yuuki Takano, Ruo Ando, Takeshi Takahashi, Tomoya Inoue, Satoshi Uda, "A Measurement Study of Open Resolvers and DNS Server Version," インターãƒãƒƒãƒˆã‚³ãƒ³ãƒ•ã‚¡ãƒ¬ãƒ³ã‚¹2013, æ±äº¬, 2013.10. [docInfo][bibtex]
  12. Guillermo Horacio Ramirez Caceres, Yohei Murakami, Koji Zettsu, Takeshi Takahashi, Shinichiro Matsuo, "Towards Provenance-Based Security Risk Assessment," 信学技報, æ±äº¬, 2013.3. [docInfo][bibtex]
  13. Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano, "インターãƒãƒƒãƒˆä¸Šã«å­˜åœ¨ã™ã‚‹ã‚µã‚¤ãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£æƒ…å ±ã®ãƒ‡ã‚£ã‚¹ã‚«ãƒãƒªæŠ€è¡“ã«é–¢ã™ã‚‹æ¤œè¨Ž," 信学技報, 北海é“, 2012.7. [docInfo][bibtex]
  14. Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa, "利用方法ã«å¿œã˜ãŸãƒªã‚¹ã‚¯ã®å¯è¦–化ã¨é©åˆ‡ãªã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£å¯¾ç­–実施ã®ãŸã‚ã®ã‚¢ãƒ¼ã‚­ãƒ†ã‚¯ãƒãƒ£ã®ã‚°ãƒ©ãƒ³ãƒ‰ãƒ‡ã‚¶ã‚¤ãƒ³," 信学技報, 北海é“, 2012.7. [docInfo][bibtex]
  15. Akira Kanaoka, Takeshi Takahashi, "Workshop on Usable Security (USEC12) å‚加報告," 情報処ç†å­¦ä¼šSPT研究会, åƒè‘‰, 2012.5. [docInfo][bibtex]
  16. Takeshi Takahashi, Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo, "マルãƒãƒ†ãƒŠãƒ³ãƒˆã‚¯ãƒ©ã‚¦ãƒ‰ã‚³ãƒ³ãƒ”ューティング: セキュリティ上ã®èª²é¡Œã¨ã‚¢ãƒ—ローãƒ," 信学技報, 徳島, 2011.11. [docInfo][bibtex]
  17. Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara, "オントロジã«åŸºã¥ãクラウドセキュリティã®æ¤œè¨Ž," 信学技報, 広島, 2010.11. [docInfo][bibtex]
  18. Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara, "サイãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã‚ªãƒšãƒ¬ãƒ¼ã‚·ãƒ§ãƒ³ã®ãŸã‚ã®æƒ…報オントロジã®æ§‹ç¯‰," 信学技報, é’森, 2010.7. [docInfo][bibtex]
  19. Ken'ichiro Arasaki, Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "転é€ãƒ«ãƒ¼ã‚¿ç™ºè¦‹æ‰‹æ³•ã‚’用ã„ãŸç§»å‹•ç«¯æœ«ã®IPマルãƒã‚­ãƒ£ã‚¹ãƒˆé€šä¿¡ã«é–¢ã™ã‚‹æ¤œè¨Ž," 信学技報, 広島, 2007.1. [docInfo][bibtex]
  20. Ken'ichiro Arasaki, Takeshi Takahashi, Yusuke Shudo, Hideyoshi Tominaga, "æºå¸¯é›»è©±ç¶²ã®åˆ¶å¾¡æ©Ÿèƒ½ã‚’用ã„ãŸMobile IP通信ã«é–¢ã™ã‚‹æ¤œè¨Ž," 信学技報, 神奈å·, 2006.3. [docInfo][bibtex]
  21. Manabu Ito, Takeshi Takahashi, Hirokazu Tashiro, Koichi Asatani, Hideyoshi Tominaga, "多段型モãƒã‚¤ãƒ«ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã«ãŠã‘ã‚‹ãƒãƒ³ãƒ‰ã‚ªãƒ¼ãƒã‚’考慮ã—ãŸçµŒè·¯æœ€é©åŒ–ã«é–¢ã™ã‚‹æ¤œè¨Ž," 信学技報, 大分, 2006.1. [docInfo][bibtex]
  22. Takeshi Takahashi, Ken'ichiro Arasaki, Koichi Asatani, Hideyoshi Tominaga, "IPマルãƒã‚­ãƒ£ã‚¹ãƒˆã«ãŠã‘る転é€ãƒ«ãƒ¼ã‚¿ã‚’用ã„ãŸå—信端末モビリティã«é–¢ã™ã‚‹æ¤œè¨Ž," 信学技報, ç¦å²¡, 2005.11. [docInfo][bibtex]
  23. Yusuke Shudo, Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, " マルãƒã‚­ãƒ£ã‚¹ãƒˆã‚’用ã„ãŸå·®åˆ¥åŒ–QoS実ç¾ã®ãŸã‚ã®ãƒˆãƒ©ãƒ³ã‚¹ã‚³ãƒ¼ãƒ€åˆ¶å¾¡æ–¹å¼ã®æ¤œè¨Ž," 信学技報, æ±äº¬, 2005.7. [docInfo][bibtex]
  24. Takeshi Takahashi, Yusuke Shudo, Koichi Asatani, Hideyoshi Tominaga, "ルーティングを考慮ã—ãŸMIPãƒãƒ³ãƒ‰ã‚ªãƒ¼ãƒæ‰‹æ³•ã«é–¢ã™ã‚‹æ¤œè¨Ž," 信学技報, æ±äº¬, 2005.5. [docInfo][bibtex]
  25. Hirokazu Tashiro, Kentaro Dobashi, Takeshi Takahashi, Hideyoshi Tominaga, "車車間通信ã«ãŠã‘るリアルタイム性å‘上を目的ã¨ã—ãŸé©å¿œåž‹CSMAプロトコルã®æ案," 信学技報, æ±äº¬, 2005.5. [docInfo][bibtex]
  26. Yusuke Shudo, Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "マルãƒã‚­ãƒ£ã‚¹ãƒˆãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ä¸Šã«ãŠã‘るトランスコーダ制御方å¼ã®æ¤œè¨Ž," é›»å­æƒ…報通信学会春季ç·åˆå¤§ä¼š, 大阪, 2005.3. [docInfo][bibtex]
  27. Takeshi Takahashi, Hideyoshi Tominaga, " 転é€ãƒ«ãƒ¼ã‚¿å‹•çš„é¸æŠžæ‰‹æ³•ã«åŸºã¥ããƒãƒ³ãƒ‰ã‚ªãƒ¼ãƒæ–¹å¼ã®æ¤œè¨Ž," 信学技報, 広島, 2004.7. [docInfo][bibtex]
  28. Takeshi Takahashi, Hideyoshi Tominaga, "モãƒã‚¤ãƒ«IP上ã§ã®ãƒžãƒ«ãƒã‚­ãƒ£ã‚¹ãƒˆåˆ¶å¾¡æ–¹å¼ã®æ¤œè¨Ž," 信学技報, 秋田, 2004.6. [docInfo][bibtex]
  29. Hidenobu Miyoshi, Takeshi Takahashi, Akira nakagawa, Kiichi Matsuda, Hideyoshi Tominaga, "Context-based motion vector coding with 2-Dimensional VLC," 信学技報, æ±äº¬, 2002.7. [docInfo][bibtex]
  30. Takeshi Takahashi, Akira nakagawa, Kiyoshi Sakai, Kiichi Matsuda, Hideyoshi Tominaga, "MPEG-4低é…延通信システムã«ãŠã‘る解åƒåº¦å¤‰æ›ã®æœ‰åŠ¹æ€§," 信学技報IE2002-01, 北海é“, 2002.1. [docInfo][bibtex]
  31. Takeshi Takahashi, Tsuyoshi Hanamura, Hideyoshi Tominaga, "マルãƒãƒ—ログラムトランスãƒãƒ¼ãƒˆã‚¹ãƒˆãƒªãƒ¼ãƒ ãƒˆãƒ©ãƒ³ã‚¹ã‚³ãƒ¼ãƒ€ã«ãŠã‘る出力パケットå†å¤šé‡åŒ–æ–¹å¼ã¨ãã®å®Ÿè£…," 情報処ç†å­¦ä¼šã‚ªãƒ¼ãƒ‡ã‚£ã‚ªãƒ“ジュアル複åˆå‡¦ç†ç ”究会, æ±äº¬, 2001.6. [docInfo][bibtex]
  32. Takeshi Takahashi, Tsuyoshi Hanamura, Hideyoshi Tominaga, "マルãƒãƒ—ログラムトランスãƒãƒ¼ãƒˆã‚¹ãƒˆãƒªãƒ¼ãƒ ãƒˆãƒ©ãƒ³ã‚¹ã‚³ãƒ¼ãƒ€ã«ãŠã‘る出力パケットå†å¤šé‡åŒ–æ–¹å¼ã¨ãã®å®Ÿè£…," 信学技報IE2001-04, æ±äº¬, 2001.4. [docInfo][bibtex]
  33. Takeshi Takahashi, Tsuyoshi Hanamura, Hiroyuki Kasai, Maki Sugiura, Hideyoshi Tominaga, "マルãƒãƒ—ログラムトランスãƒãƒ¼ãƒˆã‚¹ãƒˆãƒªãƒ¼ãƒ ãƒˆãƒ©ãƒ³ã‚¹ã‚³ãƒ¼ãƒ€ã«ãŠã‘る出力パケットå†å¤šé‡åŒ–æ–¹å¼," é›»å­æƒ…報通信学会春季ç·åˆå¤§ä¼š, 京都, 2001.3. [docInfo][bibtex]
Others

  1. Takeshi Takahashi, Youki Kadobayashi, "Ontological Approach toward Cybersecurity in Cloud Computing ," ITU-T workshop, 2010.12. [bibtex]
  2. Takeshi Takahashi, "Global Developments in Cybersecurity Information Exchange Framework (invited talk)," Asian Internet Engineering Conference, 2011.10. [bibtex]
  3. Takeshi Takahashi, "Real-Time Communication Architecture in Mobile Environments," 早稲田大学åšå£«è«–æ–‡, 2005.2. [bibtex]
  4. Akira Nakagawa, Takeshi Takahashi, "Context-based motion vector coding with 2-Dimensional VLC," Joint Video Team of ISO/IEC MPEG&ITU-T VCEG, 3rd Meeting: Fairfax, Virginia, USA, JVT-C097, 2002.5. [bibtex]
  5. Takeshi Takahashi, "次世代マルãƒãƒ¡ãƒ‡ã‚£ã‚¢é€šä¿¡ã‚·ã‚¹ãƒ†ãƒ ã®ãŸã‚ã®ãƒªã‚¢ãƒ«ã‚¿ã‚¤ãƒ ã‚¢ãƒ—リケーションã®ç ”究:トランスコーディング,低é…延åŠã³é«˜åœ§ç¸®," 早稲田大学修士論文, 2002.9. [bibtex]
  6. Tsuyoshi Hanamura, Hideyoshi Tominaga, Takeshi Takahashi, Isao Nagayoshi, "マルãƒãƒ—ログラム圧縮符å·åŒ–ä¿¡å·å¤‰æ›æ–¹æ³•ã€è£…ç½®ãŠã‚ˆã³å¤‰æ›ãƒ—ログラムを記録ã—ãŸåª’体," 公開特許広報P2001-79216, 2001.3. [bibtex]
  7. Takeshi Takahashi, "MPEG-2マルãƒãƒ—ログラムトランスãƒãƒ¼ãƒˆã‚¹ãƒˆãƒªãƒ¼ãƒ ãƒˆãƒ©ãƒ³ã‚¹ã‚³ãƒ¼ãƒ€ã«ãŠã‘る出力パケットå†å¤šé‡åŒ–æ–¹å¼," 早稲田大学å’業論文, 2001.2. [bibtex]
Automatically Generated Publication Sites

  1. DBLP
  2. Google Scholar Citations
  3. Research Gate
  4. Microsoft Academic Search
  5. NICT's publication list

Takeshi Takashi's page footer