Profile

Name Takeshi Takahashi
Address Tokyo, Japan
Cellphone +81 80 3490 2971
Email [firstname] [underbar] [familyname] [at] nict.go.jp
Current Affiliation National Institute of Information and Communications Technology
Degree Ph.D. in Telecommunication (Waseda University, 2005)
Languages Japanese, English
Technical domains Cybersecurity, network protocols, and picture coding techniques
Major qualifications CISSP, PMP, TOEIC 980, 1st Grade of STEP English proficiency examination, Information Security Specialist Examination

My availability

If you need my time, feel free to contact me. The calendar below shows some of my schedule. If your google account has received some access right to some of my calenders, you may be able to see more detailed schedule of mine by logging into your google account.

Courses

  • International Standards, coming soon
  • Recent development of cybersecurity, coming soon
  • Basics of multimedia techniques, semeter finished
  • The Internet technologies, semeter finished
  • Information Security, semeter finished
  • Security Workshop, semeter finished

Services

Journal Editorial Boards and Guest Editors

  • Digital Threats: Research and Practice, ACM, associate editor
  • International Journal of Information Security, Springer, guest editor
  • IEICE Transactions on Communications, IEICE, editorial board

Organizational/Steering Committee activities

  • IEICE MoMuC, committee member ('05.4 – '06.3)
  • IEICE Tokyo Section, Committee ('16.6 – '18.6)
  • IEEE COMSOC Tokyo Joint Chapter, Treasurer ('17.1 – '20.12)
  • Information Technology Standards Commission of Japan (ITSCJ) ISO/IEC SC29/WG1 Committee (’01.5 – ’03.3)
  • Internet Engineering Task Force (IETF) Mile Working Group, Co-Chair
  • Internet Engineering Task Force (IETF), Security Directorate
  • Internet Society Japan Chapter, Program Committee ('15.2 - '17.1)
  • Internet Society Japan Chapter (ISOC-JP) Internet Standardization Promotion Committee, chair ('17.2 -'18.1)
  • Internet Society Japan Chapter (ISOC-JP) IETF Publicity working group, vice chair
  • ITU-T Study Group 17 Question 6 Associate Rapporteur
  • The Telecommunication Technology Committee (TTC), Committee
  • Computer Security Symposium 2017, Executive Committee ('17)

Technical Program Comittees

  • Baltic Conference on Future Internet Communications, 2011 and 2012
  • Conference on Future Internet Communications 2013
  • Computer Security Symposium, 2014 and 2017
  • Publications

    Book Chapters

    1. T.Takahashi, T.Ban, "Android Application Analysis using Machine Learning Techniques," Intelligent Systems Reference Library, 181 - 205, Springer Nature Switzerland AG, 2019.DOI:10.1007/978-3-319-98842-9_7

    Peer-Reviewed Journals and Magazines

    1. B.Sun, A.Fujino, T.Mori, T.Ban, T.Takahashi, D.Inoue, "Automatically Generating Malware Analysis Reports Using Sandbox Logs ," IEICE Transactions on Information and Systems, 2622 - 2632, IEICE, November, 2018.
    2. T.Takahashi, B.Panta, Y.Kadobayashi, K.Nakao, "Web of Cybersecurity: Linking, Locating, and Discovering Structured Cybersecurity Information," International Journal of Communication Systems, Wiley, December, 2017.DOI:10.1002/dac.3470 [impact factor=1.066]
    3. K.Emura, A.Kanaoka, S.Ohta, T.Takahashi, "Establishing Secure and Anonymous Communication Channel: KEM/DEM-based Construction and Its Implementation," Journal of Information Security and Applications, Elsevier, February, 2017.DOI:10.1016/j.jisa.2016.12.001
    4. K.Emura, A.Kanaoka, S.Ohta, K.Omote, T.Takahashi, "Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation," IEEE Transactions on Emerging Topics in Computing, 4, 88 - 101, IEEE, February, 2016.DOI:10.1109/TETC.2015.2400131
    5. J.Kannisto, T.Takahashi, J.Harju, S.Heikkinen, M.Helenius, S.Matsuo, B.Silverajan, "A Non-repudiable Negotiation Protocol for Security Service Level Agreements," International Journal of Communication Systems, 28, 2067 - 2081, Wiley, October, 2015.DOI:10.1002/dac.2856 [impact factor=1.099]
    6. T.Takahashi, Y.Kadobayashi, "Reference Ontology for Cybersecurity Operational Information," The Computer Journal, 58, 2297 - 2312, Oxford, October, 2015.DOI:10.1093/comjnl/bxu101 [impact factor=1.000]
    7. Y.Takano, R.Ando, S.Uda, T.Takahashi, T.Inoue, "The Ecology of DNS Open Resolvers," IEICE Transactions on Communications, J97-B, 873 - 889, IEICE, October, 2014.
    8. T.Takahashi, J.Harju, J.Kannisto, B.Silverajan, J.Harju, S.Matsuo, "Tailored security: building nonrepudiable security service level agreements," IEEE Vehicular Technology Magazine, 8, 54 - 62, IEEE, July, 2013.DOI:10.1109/MVT.2013.2269188 [impact factor=1.567]
    9. D.Miyamoto, H.Hazeyama, Y.Kadobayashi, T.Takahashi, "Behind HumanBoost: Analysis of Users' Trust Decision Patterns for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications, 4, 319 - 329, Scientific Research, November, 2012.DOI:10.4236/jilsa.2012.44033
    10. T.Takahashi, K.Asatani, J.Harju, H.Tominaga, "Proactive Handover Scheme based on Forwarding Router Discovery for Mobile IP Networks," IEICE Transactions on Communications, E88-B, 2718 - 2725, IEICE, July, 2005.DOI:10.1093/ietcom/e88-b.7.2718 [impact factor=0.348]
    11. T.Takahashi, T.Hanamura, H.Kasai, I.Nagayoshi, H.Tominaga, "Remultiplexing scheme for MPEG-2 multiprogram transport stream transcoder," Journal of Electronics and Communications in Japan Part1: Communications, 86-2, 1 - 13, Wiley\&Sons. Inc., October, 2002.DOI:10.1002/ecja.10066
    12. T.Takahashi, T.Hanamura, H.Kasai, I.Nagayoshi, H.Tominaga, "Re-multiplexing Scheme for MPEG-2 Multi-Program Transport Stream Transcoder," Journal of the Institute of Electronics, Information and Communication Engineers, J85-B, 299 - 311, IEICE, February, 2002.

    International Standards

    1. T.Takahashi, R.Danyliw, M.Suzuki, "CBOR/JSON binding of IODEF," Internet Draft (draft-ietf-mile-jsoniodef-06), Internet Engineering Task Force (IETF), November, 2018.
    2. T.Takahashi, "X.1541: Incident object description exchange format version 2," Recommendation ITU-T X.1541, ITU-T, September, 2017.
    3. T.Takahashi, K.Landfield, Y.Kadobayashi, "An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information," Request for Comments (RFC) 7203, Internet Engineering Task Force (IETF), April, 2014.DOI:10.17487/RFC7203
    4. T.Takahashi, Y.Kadobayashi, "Discovery mechanisms in the exchange of cybersecurity information," Recommendation ITU-T X.1570, ITU-T, September, 2011.
    5. H.Tian, H.Youm, T.Takahashi, "Usability of network traceback," Supplement 10, Recommendation ITU-T X.1205, ITU-T, September, 2011.
    6. S.Adegbite, I.Furey, Y.Kadobayashi, R.Martin, D.Rajnovic, G.Reid, T.Rutkowski, G.Schudel, T.Takahashi, "Overview of Cybersecurity information exchange (CYBEX)," Recommendation ITU-T X.1500, ITU-T X.1500, April, 2011.

    International Conferences

    1. H.Kanehara, Y.Murakami, J.Shimamura, T.Takahashi, D.Inoue, N.Murata, "Real-Time Botnet Detection Using Nonnegative Tucker Decomposition," ACM Symposium On Applied Computing, ACM, April, 2019.
    2. B.Sun, T.Ban, S.Chang, Y.Sun, T.Takahashi, D.Inoue, "A Scalable and Accurate Feature Representation Method for Identifying Malicious Mobile Applications," ACM Symposium On Applied Computing, ACM, April, 2019.
    3. S.Chang, Y.Sun, W.Chuang, M.Chen, B.Sun, T.Takahashi, "ANTSdroid:Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family," IEEE Pacific Rim International Symposium on Dependable Computing, IEEE, December, 2018.
    4. L.Zhu, T.Ban, T.Takahashi, D.Inoue, "Employ Decision Value for Binary Soft Classifier Evaluation with Crispy Reference," The 25th International Conference on Neural Information Processing, Springer, December, 2018.
    5. R.Iijima, S.Minami, Z.Yunao, T.Takehisa, T.Takahashi, Y.Oikawa, T.Mori, "Poster: Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams," ACM Conference on Computer and Communications Security, ACM, October, 2018.
    6. C.Vorakulpipat, T.Takahashi, E.Rattanalerdnusorn, P.Thaenkaew, D.Inoue, "Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices," IEEE Symposium on Computers and Communications, IEEE, June, 2018.DOI:10.1109/ISCC.2018.8538712
    7. S.Pang, L.Zhu, T.Ban, K.Ikeda, W.Zhang, A.Sarrafzadeh, T.Takahashi, D.Inoue, "Online Max-flow Learning via Augmenting and De-augmenting Path," International Joint Conference on Neural Networks, IEEE, July, 2018.
    8. T.Takahashi, D.Inoue, "Generating Software Identifier Dictionaries from Vulnerability Database," International Conference on Privacy, Security and Trust, Springer, December, 2016.DOI:10.1109/PST.2016.7906965
    9. T.Takahashi, T.Ban, C.Tien, C.Lin, D.Inoue, K.Nakao, "The Usability of Metadata for Android Application Analysis," The 23rd International Conference on Neural Information Processing, Springer, October, 2016.DOI:10.1007/978-3-319-46687-3_60
    10. T.Ban, T.Takahashi, S.Guo, D.Inoue, K.Nakao, "Integration of Multimodal Features for Android Malware Detection Based on Linear SVM," Asia Joint Conference on Information Security, 141 - 146, IEEE, August, 2016.DOI:10.1109/AsiaJCIS.2016.29
    11. T.Takahashi, D.Miyamoto, "Structured Cybersecurity Information Exchange for Streamlining Incident Response Operations," IEEE/IFIP Network Operations and Management Symposium, 949 - 954, IEEE, April, 2016.DOI:10.1109/NOMS.2016.7502931
    12. D.Miyamoto, R.Nakamura, T.Takahashi, Y.Sekiya, "Offloading smartphone firewalling using OpenFlow-capable wireless access points," IEEE International Conference on Pervasive Computing and Communication Workshops, 1 - 4, IEEE, March, 2016.DOI:10.1109/PERCOMW.2016.7457060
    13. T.Takahashi, D.Miyamoto, K.Nakao, "Toward Automated Vulnerability Monitoring using Open Information and Standardized Tool," IEEE International Conference on Pervasive Computing and Communication Workshops, 1 - 4, IEEE, March, 2016.DOI:10.1109/PERCOMW.2016.7457049
    14. T.Takahashi, T.Ban, T.Mimura, K.Nakao, "Fine-Grained Risk Level Quantification Schemes based on APK Metadata," The 22nd International Conference on Neural Information Processing, 663 - 673, Springer, November, 2015.DOI:10.1007/978-3-319-26555-1_75
    15. K.Emura, A.Kanaoka, S.Ohta, T.Takahashi, "A KEM/DEM-based Construction for Secure and Anonymous Communication," The 39th Annual International Computers, Software \& Applications Conference, 680 - 681, IEEE, July, 2015.DOI:10.1109/COMPSAC.2015.54
    16. M.Suzuki, D.Inoue, T.Takahashi, "Cross-Organizational Incident Information Sharing using a Darknet Monitoring System," Coordinating Attack Response at Internet Scale Workshop, Internet Architecture Board, June, 2015.
    17. T.Takahashi, K.Nakao, A.Kanaoka, "Data Model for Android Package Information and Its Application to Risk Analysis System," First ACM Workshop on Information Sharing and Collaborative Security, 71 - 80, ACM, November, 2014.DOI:10.1145/2663876.2663881
    18. J.Kannisto, J.Harju, T.Takahashi, "Digital Identities and Accountable Agreements in Web Applications," International Conference on Security and Management, 266 - 272, International Conference on Security and Management, July, 2014.
    19. Y.Takano, S.Ohta, T.Takahashi, R.Ando, T.Inoue, "MindYourPrivacy: Design and Implementation of a Visualization System for Third-Party Web Tracking," Annual Conference on Privacy, Security and Trust, 48 - 56, IEEE, July, 2014.DOI:10.1109/PST.2014.6890923
    20. T.Takahashi, J.Kannisto, J.Harju, A.Kanaoka, Y.Takano, S.Matsuo, "Expressing Security Requirements: Usability of Taxonomy-based Requirement Identification Scheme," IEEE World Congress on Services, 121 - 128, IEEE, June, 2014.DOI:10.1109/SERVICES.2014.31
    21. T.Takahashi, Y.Kadobayashi, "Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks," IEEE International Conference on Semantic Computing, 279 - 284, IEEE, June, 2014.DOI:10.1109/ICSC.2014.66
    22. K.Emura, A.Kanaoka, S.Ohta, T.Takahashi, "Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation," ACM Symposium On Applied Computing, 1641 - 1648, ACM, March, 2014.DOI:10.1145/2554850.2554879
    23. D.Miyamoto, T.Takahashi, "Toward Automated Reduction of Human Errors based on Cognitive Analysis," International Workshop on Advances In Information Security, 820 - 825, IEEE, July, 2013.DOI:10.1109/IMIS.2013.147
    24. T.Takahashi, J.Kannisto, J.Harju, S.Heikkinen, M.Helenius, S.Matsuo, B.Silverajan, "Accountable Security Mechanism Based on Security Service Level Agreement," IEEE Symposium on Computers and Communications, 404 - 410, IEEE, July, 2013.DOI:10.1109/ISCC.2013.6754980
    25. T.Takahashi, K.Emura, A.Kanaoka, S.Matsuo, T.Minowa, "Risk Visualization and Alerting System: Architecture and Proof-of-Concept Implementation," International Workshop on Security in Embedded Systems and Smartphones, 3 - 10, ACM, May, 2013.DOI:10.1145/2484417.2484421
    26. T.Takahashi, J.Kannisto, B.Silverajan, J.Harju, M.Helenius, S.Matsuo, "An Accountable Security Mechanism in Light of Security Service Level Agreement," Wireless World Research Forum, WWRF, April, 2013.
    27. T.Takahashi, Y.Kadobayashi, Y.Takano, "Linking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism," Annual Computer Security Applications Conference poster session, ACSAC, December, 2012.
    28. E.Moriyama, T.Takahashi, "DNS-based Defense Against IP Spoofing Attacks," The 19th International Conference on Neural Information Processing, 599 - 609, LNCS, November, 2012.DOI:10.1007/978-3-642-34500-5_71
    29. T.Minowa, T.Takahashi, "Secure Distributed Storage for Bulk Data," The 19th International Conference on Neural Information Processing, 566 - 575, LNCS, November, 2012.DOI:10.1007/978-3-642-34500-5_67
    30. T.Takahashi, J.Kannisto, S.Heikkinen, B.Silverajan, M.Helenius, S.Matsuo, J.Harju, "An Architecture of Accountable Security in Light of Security Service Level Agreement," Wireless World Research Forum, WWRF, October, 2012.
    31. T.Takahashi, S.Matsuo, A.Kanaoka, K.Emura, Y.Takano, "Visualization of user's end-to-end security risks," Symposium On Usable Privacy and Security, poster session, SOUPS, June, 2012.
    32. S.Matsuo, A.Kanaoka, T.Takahashi, T.Minowa, "Prototype System for Visualizing Security Risks on Mobile Device," Symposium On Usable Privacy and Security, demo session, SOUPS, June, 2012.
    33. T.Takahashi, G.Blanc, Y.Kadobayashi, D.Fall, H.Hazeyama, S.Matsuo, "Enabling Secure Multitenancy in Cloud Computing: Challenges and Approaches," Baltic Conference on Future Internet Communications, 72 - 79, IEEE, April, 2012.DOI:10.1109/BCFIC.2012.6217983
    34. T.Takahashi, Y.Kadobayashi, K.Nakao, "Toward Global Cybersecurity Collaboration: Cybersecurity Operation Activity Model," Kaleidoscope, 1 - 8, IEEE, December, 2011.
    35. B.Tao, C.Zhang, S.Abe, T.Takahashi, Y.Kadobayashi, "Mining Interlacing Manifolds in High Dimensional Spaces," The 26th Annual ACM Symposium on Applied Computing, 942 - 949, ACM, March, 2011.DOI:10.1145/1982185.1982392
    36. T.Takahashi, H.Hazeyama, D.Miyamoto, Y.Kadobayashi, "Taxonomical Approach to the Deployment of Traceback Mechanisms," Baltic Conference on Future Internet Communications, 13 - 20, IEEE, February, 2011.DOI:10.1109/BCFIC-RIGA.2011.5733214
    37. T.Takahashi, Y.Kadobayashi, H.Fujiwara, "Ontological Approach toward Cybersecurity in Cloud Computing," International Conference on Security of Information and Networks, 100 - 109, ACM, September, 2010.DOI:10.1145/1854099.1854121
    38. T.Takahashi, H.Fujiwara, Y.Kadobayashi, "Building Ontology of Cybersecurity Operational Information," Cyber Security and Information Intelligence Research Workshop, 1 - 4, ACM, April, 2010.DOI:10.1145/1852666.1852756
    39. T.Takahashi, K.Asatani, H.Tominaga, "Multicast Source Handover Scheme based on Proxy Router Discovery," IEEE/CreateNet International Conference on Broadband Networks, 805-812, IEEE, October, 2005.DOI:10.1109/ICBN.2005.1589690
    40. K.Dobashi, T.Takahashi, H.Tominaga, "Adaptive MAC protocol for high-load inter-vehicle communication," IEEE Interrnational Conference on Wireless and Mobile Computing, Networking and Communications, 138 - 145, IEEE, August, 2005.DOI:10.1109/WIMOB.2005.1512896
    41. Y.Shudo, T.Takahashi, K.Asatani, H.Tominaga, "A Framework of a Transcoder Controlling Scheme over Multicast Networks," Asia-Pacific Conference on Communications, 464 - 468, IEEE, August, 2005.DOI:10.1109/APCC.2005.1554102
    42. H.Tashiro, K.Dobashi, T.Takahashi, K.Asatani, H.Tominaga, "A Framework of Real-Time CSMA Protocol for Inter-Vehicle Communications," International Conference on Intelligent Transportation System (ITS) Telecommunications, June, 2005.
    43. T.Takahashi, K.Asatani, H.Tominaga, "A Routing-Aware Handover Scheme for Mobile IP," IEEE International Conference on Communications, 1400 - 1406, IEEE, May, 2005.DOI:10.1109/ICC.2005.1494575
    44. T.Takahashi, K.Asatani, H.Tominaga, "Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery," International Conference on Networking, 859 - 867, April, 2005.DOI:10.1007/978-3-540-31957-3_97
    45. T.Takahashi, J.Harju, K.Asatani, H.Tominaga, "Inter-domain Handover Scheme based on Forwarding Router Discovery for Mobile IP Networks," IEEE Wireless Communications and Networking Conference, 1409 - 1414, IEEE, March, 2005.DOI:10.1109/WCNC.2005.1424722
    46. T.Takahashi, M.Tammi, H.Vatiainen, R.Lehtonen, J.Harju, "Implementation and Performance Evaluation of Multicast Control Protocol," IEEE International Symposium on Computers and Communications, 1038 - 1043, IEEE, June, 2004.DOI:10.1109/ISCC.2004.1358677
    47. T.Takahashi, J.Harju, H.Tominaga, "Handover management in wireless systems based on buffering and signaling," EUNICE Open European Summer School and IFIP Workshop on Next Generation Networks, September, 2003.
    48. T.Takahashi, J.Harju, H.Tominaga, "Layer 3 handover management based on buffering algorithm," Joint Workshop on Mobile Multimedia Communications, July, 2003.
    49. T.Takahashi, A.Nakagawa, K.Sakai, K.Matsuda, H.Tominaga, "Adoption of Dynamic Resolution Conversion Scheme for Low-delay MPEG-4 Communication System," Asia-Pacific Conference on Communications, September, 2002.
    50. T.Takahashi, H.Kasai, T.Hanamura, H.Tominaga, "Packet-multiplexing Scheme in MPEG-2 multi-program Transport Stream Transcoder," IEEE International Conference on Acoustics, Speech, and Signal Processing, 4178, IEEE, May, 2002.DOI:10.1109/ICASSP.2002.5745636
    51. T.Takahashi, H.Kasai, T.Hanamura, H.Tominaga, "Implementation of MPEG-2 Multi-Program Transport Stream Transcoder," Proceedings of International Workshop on Advanced Image Technology, January, 2002.
    52. T.Takahashi, H.Kasai, T.Hanamura, M.Sugiura, H.Tominaga, "MPEG-2 Multi-Program Transport Stream Transcoder," IEEE International Conference on Multimedia \& Expo, 423 - 426, IEEE, August, 2001.DOI:10.1109/ICME.2001.1237747

    Technical Reports and Magazines

    1. T.Takahashi, "Toward Automation of Cybersecurity Operations using Machine-Learning Technologies," NICT News, NICT, March, 2018.
    2. T.Takahashi, "Using Machine Learning Techniques toward Security Operation Automation (translated)," Journal of the ITU Association of Japan, ITUAJ, March, 2018.
    3. T.Takahashi, "Building security knowledge by standardizing interfaces and data models," NICT Journal, NICT, August, 2016.
    4. T.Takahashi, "Automated vulnerability information distribution system for IT assets on networks," NICT Journal, NICT, August, 2016.
    5. T.Takahashi, "Risk management and evaluation system for smart phone applications," NICT Journal, NICT, August, 2016.
    6. T.Takahashi, "Description and negotiation techniques for establishing security service level agreements," NICT Journal, NICT, August, 2016.
    7. T.Takahashi, "International standardization activities that enables global collaboration beyond country boarders," IEICE communicadtion society magazine, IEICE, March, 2013.
    8. T.Takahashi, "Design and Prototype Implementation of Risk Visualization System," NICT News, NICT, September, 2012.
    9. T.Takahashi, "Overview of the cybersecurity information exchange framework and its current status," Nikkan Kogyo IT solution, The Nikkan Kogyo Shimbun, April, 2012.
    10. T.Takahashi, Y.Kadobayashi, "Cybersecurity Information Exchange Techniques: Cybersecurity Information Ontology and CYBEX," Journal of the National Institute of Information and Communications Technology, NICT, March, 2012.
    11. T.Takahashi, "Recommendation ITU-T X.1500: Cybersecurity Information Exchange Framework," Journal of the ITU Association of Japan, ITUAJ, February, 2012.
    12. T.Takahashi, Y.Kadobayashi, "Cybersecurity Information Exchange Techniques: Information Ontology and CYBEX," NICT Journal, NICT, December, 2011.
    13. A.Rutkowski, Y.Kadobayashi, I.Furey, D.Rajnovic, R.Martin, T.Takahashi, C.Schultz, G.Reid, G.Schudel, M.Hird, S.Adegbite, "CYBEX - The Cybersecurity Information Exchange Framework (X.1500)," ACM CCR technical note, 40, 59 - 64, ACM, October, 2010.DOI:10.1145/1880153.1880163
    14. T.Takahashi, "Cybersecurity Information Exchange Framework : Toward the Improved Global Cybersecurity," NICT News, NICT, September, 2010.

    Web Magazines

    1. T.Takahashi, "IETF 100 report: SUIT updates IoT software," JPNIC News \& Views, December, 2017.
    2. Y.Tochio, T.Takahashi, K.Nishizuka, "Protocols and security for further IoT developments," INTERNET Watch, November, 2017.
    3. T.Takahashi, "Beyond information exchanges: automating security operations," INTERNET Watch, October, 2017.
    4. T.Takahashi, "Data structures and protocols for sharing information among organizations," INTERNET Watch, October, 2017.
    5. Y.Tochio, T.Takahashi, K.Nishizuka, "IETF celebrates its 30th anniversary. Prominent activities are found in the area of IoT techniques and transport layer techniques," INTERNET Watch, April, 2017.
    6. T.Takahashi, T.Ban, "Android Security: malware detection and vulnerability identification techniques for Android applications," atmark IT, March, 2016.
    7. T.Takahashi, "Android Security: elaboration from applications to user viewpoints," atmark IT, March, 2016.
    8. T.Takahashi, H.Takechi, Y.Kadobayashi, "Future of Cybersecurity Operations," atmark IT, December, 2010.
    9. T.Takahashi, H.Takechi, Y.Kadobayashi, "Five blocks composing CYBEX, in a nut shell," atmark IT, November, 2010.
    10. T.Takahashi, H.Takechi, Y.Kadobayashi, "New Security Standard Advancing Collaboration beyond National Borders," atmark IT, October, 2010.

    Domestic Workshops

    1. K.Furumoto, R.Isawa, T.Takahashi, D.Inoue, "Malware Analysis Method Using Conditional Generative Adversarial Network ," Technical Report of IEICE, IEICE, November, 2018.
    2. S.Nakagawa, T.Nagai, H.Kanehara, K.Furumoto, M.Takita, Y.Shiraishi, T.Takahashi, M.Mouri, Y.Takano, M.Morii, "Severity estimation of vulnerability notes with machine learning techniques," Technical Report of IEICE, IEICE, November, 2018.
    3. R.Iijima, S.Minami, Y.Zhou, T.Takehisa, T.Takahashi, Y.Oikawa, T.Mori, "An Attack on Voice Assistance Systems Using Separated Ultrasonic Beams and Defense Model," CSS, IPSJ, October, 2018.
    4. H.Kanehara, Y.Murakami, J.Shimamura, T.Takahashi, N.Murata, D.Inoue, "Real-time Botnet Detection Using Nonnegative Tucker Decomposition," Technical Report of IEICE, IEICE, July, 2018.
    5. K.Furumoto, T.Takahashi, R.Isawa, D.Inoue, "A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks," Technical Report of IEICE, IEICE, June, 2018.
    6. R.Ushigome, T.Matsuda, M.Sonoda, T.Takahashi, M.Suzuki, J.Chao, "A consideration on the possibility of automatic classifying for anomalous posts on Twitter," Technical Report of IEICE, IEICE, June, 2018.
    7. C.Han, J.Shimamura, T.Takahashi, D.Inoue, M.Kawakita, J.Takeuchi, K.Nakao, "A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso," Technical Report of IEICE, IEICE, March, 2018.
    8. T.Takahashi, T.Ban, T.Mimura, K.Nakao, "Studies on Risk Level Evaluation Schemes using APK Metadata," Computer Security Symposium, IPSJ, October, 2015.
    9. T.Takahashi, D.Miyamoto, B.Panta, K.Nakao, "A study on a Tool for Automated Vulnerability Monitoring and Alerting on Software Assets inside Organizations," Technical Report of IEICE, IEICE, June, 2015.
    10. T.Takahashi, T.Mimura, K.Nishida, K.Nakao, "A Study on Risk Quantification Techniques for Android Applications with Category Information," Technical Report of IEICE, IEICE, March, 2015.
    11. K.Emura, A.Kanaoka, S.Ohta, K.Omote, T.Takahashi, "A Secure and Anonymous Communication Protocol and its PrototypeImplementation," DICOMO, DICOMO, July, 2014.
    12. T.Takahashi, Y.Takano, K.Nakao, S.Ohta, A.Kanaoka, S.Sakane, S.Matsuo, "A Risk Evaluation Framework for Android Terminal and its Prototype Implementation," The 31st Symposium on Cryptography and Information Security, IEICE, January, 2014.
    13. Y.Takano, R.Ando, T.Takahashi, T.Inoue, S.Uda, "A Measurement Study of Open Resolvers and DNS Server Version," Internet Conference 2013, IEICE, October, 2013.
    14. G.Ramirez Caceres, Y.Murakami, K.Zettsu, T.Takahashi, S.Matsuo, "Towards Provenance-Based Security Risk Assessment," Technical Report of IEICE, IEICE, March, 2013.
    15. T.Takahashi, Y.Kadobayashi, Y.Takano, "A Study on Cybersecurity Information Discovery Mechanisms over the Internet," Technical Report of IEICE, IEICE, July, 2012.
    16. S.Matsuo, A.Kanaoka, T.Takahashi, S.Miwa, T.Minowa, "Visualization for Risk Evaluation and Grand Design for Architecture of Adequate Security," Technical Report of IEICE, IEICE, July, 2012.
    17. A.Kanaoka, T.Takahashi, "Workshop on Usable Security (USEC12) Report," IPSJ workshop, IPSJ, May, 2012.
    18. T.Takahashi, G.Blanc, Y.Kadobayashi, D.Fall, H.Hazeyama, S.Matsuo, "Multitenant Cloud Computing: Security Challenges and Approaches," Technical Report of IEICE, IEICE, November, 2011.
    19. T.Takahashi, Y.Kadobayashi, H.Fujiwara, "Ontological Approach Toward Cybersecurity in Cloud Computing," Technical Report of IEICE, IEICE, November, 2010.
    20. T.Takahashi, Y.Kadobayashi, H.Fujiwara, "Building Ontology of Cybersecurity Operational Information," Technical Report of IEICE, IEICE, July, 2010.
    21. K.Arasaki, T.Takahashi, K.Asatani, H.Tominaga, "Routing-Aware Handover for IP Multicasting based on Forwarding Router Discovery," Technical Report of IEICE, IEICE, January, 2007.
    22. K.Arasaki, T.Takahashi, Y.Shudo, H.Tominaga, "Mobile IP Communication based on the Control over Cellular Networks," Technical Report of IEICE, IEICE, March, 2006.
    23. M.Ito, T.Takahashi, H.Tashiro, K.Asatani, H.Tominaga, "A Route Optimization in Consideration of Handover in Nested Mobile Network," Technical Report of IEICE, IEICE, January, 2006.
    24. T.Takahashi, K.Arasaki, K.Asatani, H.Tominaga, "Multicast Receiver Mobility over Mobile IP Networks Based on Forwarding Router Discovery," Technical Report of IEICE, IEICE, November, 2005.
    25. Y.Shudo, T.Takahashi, K.Asatani, H.Tominaga, "Transcoder Controlling Scheme over Multicast Networks," Technical Report of IEICE, IEICE, July, 2005.
    26. T.Takahashi, Y.Shudo, K.Asatani, H.Tominaga, "A Routing-Aware Handover Scheme over Mobile IP Networks," Technical Report of IEICE, IEICE, May, 2005.
    27. H.Tashiro, K.Dobashi, T.Takahashi, H.Tominaga, "A Framework of Non-persistent CSMA Protocol for Inter-Vehicle Communications," Technical Report of IEICE, IEICE, May, 2005.
    28. Y.Shudo, T.Takahashi, K.Asatani, H.Tominaga, "A Framework of a Transcoder Controlling Scheme over Multicast Networks," Technical Report of IEICE, IEICE, March, 2005.
    29. T.Takahashi, H.Tominaga, "Handover Management based on Forwarding Router Discovery Scheme," Technical Report of IEICE, IEICE, July, 2004.
    30. T.Takahashi, H.Tominaga, "Framework of Multicast controlling scheme over Mobile IP network," Technical Report of IEICE, IEICE, June, 2004.
    31. H.Miyoshi, T.Takahashi, A.nakagawa, K.Matsuda, H.Tominaga, "Context-based motion vector coding with 2-Dimensional VLC," Technical Report of IEICE, IEICE, July, 2002.
    32. T.Takahashi, A.nakagawa, K.Sakai, K.Matsuda, H.Tominaga, "Efficiency of Dynamic Resolution Conversion Scheme in MPEG-4 Low-delay Communication System," Technical Report of IEICE, IEICE, January, 2002.
    33. T.Takahashi, T.Hanamura, H.Tominaga, "Implementation of Packet-multiplexing scheme in MPEG-2 multi-program Transport Stream Transcoder," AVM study group workshop of IPSJ, IPSJ, June, 2001.
    34. T.Takahashi, T.Hanamura, H.Tominaga, "Implementation of Packet-multiplexing scheme in MPEG-2 multi-program Transport Stream Transcoder," Technical Report of IEICE, IEICE, April, 2001.
    35. T.Takahashi, T.Hanamura, H.Kasai, M.Sugiura, H.Tominaga, "Packet-multiplexing scheme in MPEG-2 multi-program Transport Stream Transcoder," Technical Report of IEICE, IEICE, March, 2001.

    Others

    1. T.Takahashi, Y.Kadobayashi, "Ontological Approach toward Cybersecurity in Cloud Computing ," ITU-T workshop, December, 2010.
    2. T.Takahashi, "Global Developments in Cybersecurity Information Exchange Framework (invited talk)," Asian Internet Engineering Conference, October, 2011.
    3. T.Takahashi, "Real-Time Communication Architecture in Mobile Environments," Doctoral thesis at Waseda University Japan, Waseda University, February, 2005.
    4. A.Nakagawa, T.Takahashi, "Context-based motion vector coding with 2-Dimensional VLC," Joint Video Team of ISO/IEC MPEG\&ITU-T VCEG, 3rd Meeting: Fairfax, Virginia, USA, JVT-C097, ISO/IEC, ITU-T, May, 2002.
    5. T.Takahashi, "Research of realtime application for next generational multimedia communication : Transcoding, Low-delay, and high-compression," Master thesis at Waseda University Japan, Waseda University, September, 2002.
    6. T.Hanamura, H.Tominaga, T.Takahashi, I.Nagayoshi, "Remultiplexing scheme for MPEG-2 multiprogram transport stream transcoder," patent, P2001-79216, March, 2001.
    7. T.Takahashi, "Packet-multiplexing scheme in MPEG-2 multi-program Transport Stream Transcoder," Graduation thesis at Waseda University Japan, Waseda University, February, 2001.