header_TakeTaka 本文へジャンプ
English Page 日本語のページ
Publications

Peer-Reviewed Journals and Magazines

  1. Takeshi Takahashi, Bhola Panta, Youki Kadobayashi, Koji Nakao, "Web of Cybersecurity: Linking, Locating, and Discovering Structured Cybersecurity Information," International Journal of Communication Systems, 2017.12. doi:10.1002/dac.3470. [bibtex]
  2. Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi, "Establishing Secure and Anonymous Communication Channel: KEM/DEM-based Construction and Its Implementation," Journal of Information Security and Applications, 2017.2. doi:10.1016/j.jisa.2016.12.001. [bibtex]
  3. Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi, "Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation," IEEE Transactions on Emerging Topics in Computing, 88 - 101, 2016.2. doi:10.1109/TETC.2015.2400131. [Published PDF][bibtex]
  4. Joona Kannisto, Takeshi Takahashi, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan, "A Non-repudiable Negotiation Protocol for Security Service Level Agreements," International Journal of Communication Systems, 2067 - 2081, 2015.10. doi:10.1002/dac.2856. [impact factor:1.099][bibtex]
  5. Takeshi Takahashi, Youki Kadobayashi, "Reference Ontology for Cybersecurity Operational Information," The Computer Journal, 2297 - 2312, 2015.10. doi:10.1093/comjnl/bxu101. [Published PDF][impact factor:1.000][bibtex]
  6. Yuuki Takano, Ruo Ando, Satoshi Uda, Takeshi Takahashi, Tomoya Inoue, "DNS繧ェ繝シ繝励Φ繝ェ繧セ繝ォ繝舌ョ螳滓," 髮サ蟄先ュ蝣ア騾壻ソ。蟄ヲ莨夊ォ匁枚隱, 873 - 889, 2014.10. [bibtex]
  7. Takeshi Takahashi, Jarmo Harju, Joona Kannisto, Bilhanan Silverajan, Jarmo Harju, Shin'ichiro Matsuo, "Tailored security: building nonrepudiable security service level agreements," IEEE Vehicular Technology Magazine, 54 - 62, 2013.7. doi:10.1109/MVT.2013.2269188. [preprint][impact factor:1.567][bibtex]
  8. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, Takeshi Takahashi, "Behind HumanBoost: Analysis of Users' Trust Decision Patterns for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications, 319 - 329, 2012.11. doi:10.4236/jilsa.2012.44033. [Published PDF][bibtex]
  9. Takeshi Takahashi, Koichi Asatani, Jarmo Harju, Hideyoshi Tominaga, "Proactive Handover Scheme based on Forwarding Router Discovery for Mobile IP Networks," IEICE Transactions on Communications, 2718 - 2725, 2005.7. doi:10.1093/ietcom/e88-b.7.2718. [preprint][impact factor:0.348][bibtex]
  10. Takeshi Takahashi, Tsuyoshi Hanamura, Hiroyuki Kasai, Isao Nagayoshi, Hideyoshi Tominaga, "Remultiplexing scheme for MPEG-2 multiprogram transport stream transcoder," Journal of Electronics and Communications in Japan Part1: Communications, 1 - 13, 2002.10. doi:10.1002/ecja.10066. [bibtex]
  11. Takeshi Takahashi, Tsuyoshi Hanamura, Hiroyuki Kasai, Isao Nagayoshi, Hideyoshi Tominaga, "MPEG-2繝槭Ν繝√励Ο繧ー繝ゥ繝繝医Λ繝ウ繧ケ繝昴シ繝医せ繝医Μ繝シ繝繝医Λ繝ウ繧ケ繧ウ繝シ繝縺ォ縺翫¢繧句コ蜉帙ヱ繧ア繝繝亥榊、夐榊喧譁ケ蠑," 髮サ蟄先ュ蝣ア騾壻ソ。蟄ヲ莨夊ォ匁枚隱, 299 - 311, 2002.2. [docInfo][bibtex]
International Standards

  1. Takeshi Takahashi, "JSON binding of IODEF," Internet Draft (draft-ietf-mile-jsoniodef-00), 2017.9. [bibtex]
  2. Takeshi Takahashi, Kent Landfield, Youki Kadobayashi, "An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information," Request for Comments (RFC) 7203, 2014.4. doi:10.17487/RFC7203. [bibtex]
  3. Takeshi Takahashi, Youki Kadobayashi, "Discovery mechanisms in the exchange of cybersecurity information," Recommendation ITU-T X.1570, 2011.9. [bibtex]
  4. Huirong Tian, Heung Youl Youm, Takeshi Takahashi, "Usability of network traceback," Supplement 10, Recommendation ITU-T X.1205, 2011.9. [bibtex]
  5. Stephen Adegbite, Inette Furey, Youki Kadobayashi, Robert A. Martin, Damir Rajnovic, Gavin Reid, Tony Rutkowski, Gregg Schudel, Takeshi Takahashi, "Overview of Cybersecurity information exchange (CYBEX)," Recommendation ITU-T X.1500, 2011.4. [bibtex]
International Conferences

  1. Takeshi Takahashi, Daisuke Inoue, "Generating Software Identifier Dictionaries from Vulnerability Database," International Conference on Privacy, Security and Trust, Auckland, 2016.12. doi:10.1109/PST.2016.7906965. [bibtex]
  2. Takeshi Takahashi, Tao Ban, Chin-Wei Tien, Chih-Hung Lin, Daisuke Inoue, Koji Nakao, "The Usability of Metadata for Android Application Analysis," The 23nd International Conference on Neural Information Processing, Kyoto, 2016.10. [bibtex]
  3. Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue, Koji Nakao, "Integration of Multimodal Features for Android Malware Detection Based on Linear SVM," Asia Joint Conference on Information Security, Fukuoka, 2016.8. [bibtex]
  4. Takeshi Takahashi, Daisuke Miyamoto, "Structured Cybersecurity Information Exchange for Streamlining Incident Response Operations," IEEE/IFIP Network Operations and Management Symposium, 949 - 954, Istanbul, 2016.4. doi:10.1109/NOMS.2016.7502931. [bibtex]
  5. Daisuke Miyamoto, Ryo Nakamura, Takeshi Takahashi, Yuji Sekiya, "Offloading smartphone firewalling using OpenFlow-capable wireless access points," IEEE International Conference on Pervasive Computing and Communication Workshops, 1 - 4, Sydney, 2016.3. doi:10.1109/PERCOMW.2016.7457060. [bibtex]
  6. Takeshi Takahashi, Daisuke Miyamoto, Koji Nakao, "Toward Automated Vulnerability Monitoring using Open Information and Standardized Tool," IEEE International Conference on Pervasive Computing and Communication Workshops, 1 - 4, Sydney, 2016.3. doi:10.1109/PERCOMW.2016.7457049. [bibtex]
  7. Takeshi Takahashi, Tao Ban, Takao Mimura, Koji Nakao, "Fine-Grained Risk Level Quantification Schemes based on APK Metadata," The 22nd International Conference on Neural Information Processing, 663 - 673, Istanbul, 2015.11. doi:10.1007/978-3-319-26555-1_75. [Published PDF][bibtex]
  8. Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi, "A KEM/DEM-based Construction for Secure and Anonymous Communication," The 39th Annual International Computers, Software & Applications Conference, 680 - 681, Taichung, 2015.7. doi:10.1109/COMPSAC.2015.54. [bibtex]
  9. Mio Suzuki, Daisuke Inoue, Takeshi Takahashi, "Cross-Organizational Incident Information Sharing using a Darknet Monitoring System," Coordinating Attack Response at Internet Scale Workshop, Berlin, 2015.6. [docInfo][Published PDF][bibtex]
  10. Takeshi Takahashi, Koji Nakao, Akira Kanaoka, "Data Model for Android Package Information and Its Application to Risk Analysis System," First ACM Workshop on Information Sharing and Collaborative Security, 71 - 80, Arizona, 2014.11. doi:10.1145/2663876.2663881. [bibtex]
  11. Joona Kannisto, Jarmo Harju, Takeshi Takahashi, "Digital Identities and Accountable Agreements in Web Applications," International Conference on Security and Management, 266 - 272, Las Vegas, 2014.7. [bibtex]
  12. Yuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, Tomoya Inoue, "MindYourPrivacy: Design and Implementation of a Visualization System for Third-Party Web Tracking," Annual Conference on Privacy, Security and Trust, 48 - 56, Toronto, 2014.7. doi:10.1109/PST.2014.6890923. [bibtex]
  13. Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Akira Kanaoka, Yuuki Takano, Shin'ichiro Matsuo, "Expressing Security Requirements: Usability of Taxonomy-based Requirement Identification Scheme," IEEE World Congress on Services, 121 - 128, Anchorage, 2014.6. doi:10.1109/SERVICES.2014.31. [bibtex]
  14. Takeshi Takahashi, Youki Kadobayashi, "Mechanism for Linking and Discovering Structured Cybersecurity Information over Networks," IEEE International Conference on Semantic Computing, 279 - 284, Newport Beach, 2014.6. doi:10.1109/ICSC.2014.66. [bibtex]
  15. Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi, "Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation," ACM Symposium On Applied Computing, 1641 - 1648, Gyeongju, 2014.3. doi:10.1145/2554850.2554879. [bibtex]
  16. Daisuke Miyamoto, Takeshi Takahashi, "Toward Automated Reduction of Human Errors based on Cognitive Analysis," International Workshop on Advances In Information Security, 820 - 825, Taichung, 2013.7. doi:10.1109/IMIS.2013.147. [bibtex]
  17. Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan, "Accountable Security Mechanism Based on Security Service Level Agreement," IEEE Symposium on Computers and Communications, 404 - 410, Split, 2013.7. doi:10.1109/ISCC.2013.6754980. [bibtex]
  18. Takeshi Takahashi, Keita Emura, Akira Kanaoka, Shin'ichiro Matsuo, Tadashi Minowa, "Risk Visualization and Alerting System: Architecture and Proof-of-Concept Implementation," International Workshop on Security in Embedded Systems and Smartphones, 3 - 10, Hangzhou, 2013.5. doi:10.1145/2484417.2484421. [bibtex]
  19. Takeshi Takahashi, Joona Kannisto, Bilhanan Silverajan, Jarmo Harju, Marko Helenius, Shin'ichiro Matsuo, "An Accountable Security Mechanism in Light of Security Service Level Agreement," Wireless World Research Forum, Oulu, 2013.4. [bibtex]
  20. Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano, "Linking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism," Annual Computer Security Applications Conference poster session, Orlando, 2012.12. [bibtex]
  21. Eimatsu Moriyama, Takeshi Takahashi, "DNS-based Defense Against IP Spoofing Attacks," The 19th International Conference on Neural Information Processing, 599 - 609, Doha, 2012.11. [bibtex]
  22. Tadashi Minowa, Takeshi Takahashi, "Secure Distributed Storage for Bulk Data," The 19th International Conference on Neural Information Processing, 566 - 575, Doha, 2012.11. doi:10.1007/978-3-642-34500-5_67. [bibtex]
  23. Takeshi Takahashi, Joona Kannisto, Seppo Heikkinen, Bilhanan Silverajan, Marko Helenius, Shin'ichiro Matsuo, Jarmo Harju, "An Architecture of Accountable Security in Light of Security Service Level Agreement," Wireless World Research Forum, Berlin, 2012.10. [bibtex]
  24. Takeshi Takahashi, Shin'ichiro Matsuo, Akira Kanaoka, Keita Emura, Yuuki Takano, "Visualization of user's end-to-end security risks," Symposium On Usable Privacy and Security, Washington, 2012.6. [preprint][bibtex]
  25. Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Tadashi Minowa, "Prototype System for Visualizing Security Risks on Mobile Device," Symposium On Usable Privacy and Security, Washington, 2012.6. [preprint][bibtex]
  26. Takeshi Takahashi, Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo, "Enabling Secure Multitenancy in Cloud Computing: Challenges and Approaches," Baltic Conference on Future Internet Communications, 72 - 79, Vilnius, 2012.4. doi:10.1109/BCFIC.2012.6217983. [preprint][bibtex]
  27. Takeshi Takahashi, Youki Kadobayashi, Koji Nakao, "Toward Global Cybersecurity Collaboration: Cybersecurity Operation Activity Model," Kaleidoscope, 1 - 8, Cape Town, 2011.12. [bibtex]
  28. Ban Tao, Changshui Zhang, Shigeo Abe, Takeshi Takahashi, Youki Kadobayashi, "Mining Interlacing Manifolds in High Dimensional Spaces," The 26th Annual ACM Symposium on Applied Computing, 942 - 949, Taichung, 2011.3. doi:10.1145/1982185.1982392. [preprint][bibtex]
  29. Takeshi Takahashi, Hiroaki Hazeyama, Daisuke Miyamoto, Youki Kadobayashi, "Taxonomical Approach to the Deployment of Traceback Mechanisms," Baltic Conference on Future Internet Communications, 13 - 20, Riga, 2011.2. doi:10.1109/BCFIC-RIGA.2011.5733214. [preprint][bibtex]
  30. Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara, "Ontological Approach toward Cybersecurity in Cloud Computing," International Conference on Security of Information and Networks, 100 - 109, Taganrog, 2010.9. doi:10.1145/1854099.1854121. [preprint][bibtex]
  31. Takeshi Takahashi, Hiroyuki Fujiwara, Youki Kadobayashi, "Building Ontology of Cybersecurity Operational Information," Cyber Security and Information Intelligence Research Workshop, 1 - 4, Oak Ridge, 2010.4. doi:10.1145/1852666.1852756. [preprint][bibtex]
  32. Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "Multicast Source Handover Scheme based on Proxy Router Discovery," IEEE/CreateNet International Conference on Broadband Networks, 805-812, Boston, 2005.10. doi:10.1109/ICBN.2005.1589690. [preprint][bibtex]
  33. Kentaro Dobashi, Takeshi Takahashi, Hideyoshi Tominaga, "Adaptive MAC protocol for high-load inter-vehicle communication," IEEE Interrnational Conference on Wireless and Mobile Computing, Networking and Communications, 138 - 145, Montreal, 2005.8. doi:10.1109/WIMOB.2005.1512896. [bibtex]
  34. Yusuke Shudo, Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "A Framework of a Transcoder Controlling Scheme over Multicast Networks," Asia-Pacific Conference on Communications, 464 - 468, Perth, 2005.8. doi:10.1109/APCC.2005.1554102. [bibtex]
  35. Hirokazu Tashiro, Kentaro Dobashi, Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "A Framework of Real-Time CSMA Protocol for Inter-Vehicle Communications," International Conference on Intelligent Transportation System (ITS) Telecommunications, Brest, 2005.6. [bibtex]
  36. Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "A Routing-Aware Handover Scheme for Mobile IP," IEEE International Conference on Communications, 1400 - 1406, Seoul, 2005.5. doi:10.1109/ICC.2005.1494575. [preprint][bibtex]
  37. Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery," International Conference on Networking, 859 - 867, Reunion Island, 2005.4. doi:10.1007/978-3-540-31957-3_97. [bibtex]
  38. Takeshi Takahashi, Jarmo Harju, Koichi Asatani, Hideyoshi Tominaga, "Inter-domain Handover Scheme based on Forwarding Router Discovery for Mobile IP Networks," IEEE Wireless Communications and Networking Conference, 1409 - 1414, New Orleans, 2005.3. doi:10.1109/WCNC.2005.1424722. [preprint][bibtex]
  39. Takeshi Takahashi, Miikka Tammi, Heikki Vatiainen, Rami Lehtonen, Jarmo Harju, "Implementation and Performance Evaluation of Multicast Control Protocol," IEEE International Symposium on Computers and Communications, 1038 - 1043, Alexandria, 2004.6. doi:10.1109/ISCC.2004.1358677. [preprint][bibtex]
  40. Takeshi Takahashi, Jarmo Harju, Hideyoshi Tominaga, "Handover management in wireless systems based on buffering and signaling," EUNICE Open European Summer School and IFIP Workshop on Next Generation Networks, Budapest, 2003.9. [bibtex]
  41. Takeshi Takahashi, Jarmo Harju, Hideyoshi Tominaga, "Layer 3 handover management based on buffering algorithm," Joint Workshop on Mobile Multimedia Communications, Seoul, 2003.7. [bibtex]
  42. Takeshi Takahashi, Akira Nakagawa, Kiyoshi Sakai, Kiichi Matsuda, Hideyoshi Tominaga, "Adoption of Dynamic Resolution Conversion Scheme for Low-delay MPEG-4 Communication System," Asia-Pacific Conference on Communications, Bandung, 2002.9. [bibtex]
  43. Takeshi Takahashi, Hiroyuki Kasai, Tsuyoshi Hanamura, Hideyoshi Tominaga, "Packet-multiplexing Scheme in MPEG-2 multi-program Transport Stream Transcoder," IEEE International Conference on Acoustics, Speech, and Signal Processing, 4178, Orlando, 2002.5. doi:10.1109/ICASSP.2002.5745636. [bibtex]
  44. Takeshi Takahashi, Hiroyuki Kasai, Tsuyoshi Hanamura, Hideyoshi Tominaga, "Implementation of MPEG-2 Multi-Program Transport Stream Transcoder," Proceedings of International Workshop on Advanced Image Technology, Hualien, 2002.1. [bibtex]
  45. Takeshi Takahashi, Hiroyuki Kasai, Tsuyoshi Hanamura, Maki Sugiura, Hideyoshi Tominaga, "MPEG-2 Multi-Program Transport Stream Transcoder," IEEE International Conference on Multimedia & Expo, 423 - 426, Tokyo, 2001.8. doi:10.1109/ICME.2001.1237747. [bibtex]
Magazines / newsletters

  1. Takeshi Takahashi, "繧サ繧ュ繝・繝ェ繝繧」諠蝣ア遏・隴倥吶シ繧ケ縺ョ讒狗ッ峨→讓呎コ門喧豢サ蜍," NICT讖滄未隱, 2016.8. [bibtex]
  2. Takeshi Takahashi, "繝阪ャ繝医Ρ繝シ繧ッ荳翫ョIT雉逕」縺ォ髢「縺吶k閼蠑ア諤ァ諠蝣ア閾ェ蜍暮堺ソ。繧キ繧ケ繝繝," NICT讖滄未隱, 2016.8. [bibtex]
  3. Takeshi Takahashi, "繧ケ繝槭シ繝医ヵ繧ゥ繝ウ繧「繝励Μ縺ョ繝ェ繧ケ繧ッ逶」隕悶サ隧穂セ。謚陦," NICT讖滄未隱, 2016.8. [bibtex]
  4. Takeshi Takahashi, "繧サ繧ュ繝・繝ェ繝繧」SLA讒狗ッ峨ョ縺溘a縺ョ險倩ソー謇区ウ輔→繝阪ざ繧キ繧ィ繝シ繧キ繝ァ繝ウ謚陦," NICT讖滄未隱, 2016.8. [bibtex]
  5. Takeshi Takahashi, "蝗ス繧定カ縺医◆繝√シ繝繝ッ繝シ繧ッ繧貞ョ溽樟縺吶k蝗ス髫帶ィ呎コ門喧豢サ蜍," 髮サ蟄先ュ蝣ア騾壻ソ。蟄ヲ莨夐壻ソ。繧ス繧オ繧、繧ィ繝繧」繝槭ぎ繧ク繝ウ, 2013.3. [Published PDF][bibtex]
  6. Takeshi Takahashi, "繝ェ繧ケ繧ッ蜿ッ隕門喧繧キ繧ケ繝繝縺ョ讀懆ィ弱→繝励Ο繝医ち繧、繝玲ァ狗ッ," NICT繝九Η繝シ繧ケ, 2012.9. [Published PDF][bibtex]
  7. Takeshi Takahashi, "繧オ繧、繝舌シ繧サ繧ュ繝・繝ェ繝繧」諠蝣ア莠、謠帙ヵ繝ャ繝シ繝繝ッ繝シ繧ッ縺ョ讎りヲ√→諠蝣ア陦ィ迴セ謚陦薙ョ迴セ迥カ," 譌・蛻雁キ・讌ュIT繧ス繝ェ繝・繝シ繧キ繝ァ繝ウ, 2012.4. [bibtex]
  8. Takeshi Takahashi, Youki Kadobayashi, "Cybersecurity Information Exchange Techniques: Cybersecurity Information Ontology and CYBEX," Journal of the National Institute of Information and Communications Technology, 2012.3. [preprint][bibtex]
  9. Takeshi Takahashi, "ITU-T蜍ァ蜻街.1500: 繧オ繧、繝舌シ繧サ繧ュ繝・繝ェ繝繧」諠蝣ア莠、謠帙ヵ繝ャ繝シ繝繝ッ繝シ繧ッ," ITU繧ク繝」繝シ繝翫Ν, 2012.2. [preprint][bibtex]
  10. Takeshi Takahashi, Youki Kadobayashi, "繧オ繧、繝舌シ繧サ繧ュ繝・繝ェ繝繧」諠蝣ア莠、謠帶橿陦: 諠蝣ア繧ェ繝ウ繝医Ο繧ク縺ョ讒狗ッ峨→CYBEX," 諠蝣ア騾壻ソ。遐皮ゥカ讖滓ァ句ュ」蝣ア, 2011.12. [bibtex]
  11. Anthony Rutkowski, Youki Kadobayashi, Inette Furey, Damir Rajnovic, Robert Martin, Takeshi Takahashi, Craig Schultz, Gavin Reid, Gregg Schudel, Mike Hird, Stephen Adegbite, "CYBEX - The Cybersecurity Information Exchange Framework (X.1500)," ACM CCR technical note, 59 - 64, 2010.10. doi:10.1145/1880153.1880163. [preprint][bibtex]
  12. Takeshi Takahashi, "繧サ繧ュ繝・繝ェ繝繧」諠蝣ア莠、謠帙ヵ繝ャ繝シ繝繝ッ繝シ繧ッ: 蝨ー逅隕乗ィ。縺ァ縺ョ繧オ繧、繝舌シ繧サ繧ュ繝・繝ェ繝繧」蜷台ク翫r逶ョ謖縺励※," NICT繝九Η繝シ繧ケ, 2010.9. [bibtex]
Web magazines

  1. Takeshi Takahashi, "隨ャ100蝗曵ETF IoT髢「騾」蝣ア蜻 繧ス繝輔ヨ繧ヲ繧ァ繧「繧「繝繝励ョ繝シ繝医r謇ア縺SUIT," JPNIC News & Views, 2017.12. [bibtex]
  2. Yuji Tochio, Takeshi Takahashi, Kaname Nishizuka, "IoT縺ョ縺輔i縺ェ繧句ョ溽樟縺ォ蜷代¢縺溘励Ο繝医さ繝ォシ上そ繧ュ繝・繝ェ繝繧」," INTERNET Watch, 2017.11. [preprint][bibtex]
  3. Takeshi Takahashi, "繧サ繧ュ繝・繝ェ繝繧」諠蝣ア騾」謳コ縺ョ縺昴ョ蜈医∈窶補輔そ繧ュ繝・繝ェ繝繧」閾ェ蜍募喧縺ォ蜷代¢縺滓、懆ィ," INTERNET Watch, 2017.10. [preprint][bibtex]
  4. Takeshi Takahashi, "繧オ繧、繝舌シ繧サ繧ュ繝・繝ェ繝繧」繧停懷ョ医k蛛エ窶昴′諠蝣ア騾」謳コ縺吶k縺溘a縺ョ繝繝シ繧ソ讒矩シ上励Ο繝医さ繝ォ縺溘■," INTERNET Watch, 2017.10. [preprint][bibtex]
  5. Yuji Tochio, Takeshi Takahashi, Kaname Nishizuka, "縲栗ETF縲30蜻ィ蟷エ縲!oT蛻驥弱〒譁ーWG縲√ヨ繝ゥ繝ウ繧ケ繝昴シ繝医Ξ繧、繝、繝シ縺ァ螟ァ縺阪↑蜍輔″繧," INTERNET Watch, 2017.4. [preprint][bibtex]
  6. Takeshi Takahashi, Tao Ban, "Android繧サ繧ュ繝・繝ェ繝繧」: Android繧「繝励Μ縺ョ縲後槭Ν繧ヲ繧ァ繧「蛻、螳壹阪瑚ф蠑ア諤ァ讀懃衍縲肴橿陦," 繧「繝繝医槭シ繧ッ繝サ繧「繧、繝繧」, 2016.3. [preprint][bibtex]
  7. Takeshi Takahashi, "Android繧サ繧ュ繝・繝ェ繝繧」: 繧「繝励Μ縺九i繝ヲ繝シ繧カ繝シ隕也せ縺セ縺ァ繧、繝√°繧芽ァ」隱ャ," 繧「繝繝医槭シ繧ッ繝サ繧「繧、繝繧」, 2016.3. [preprint][bibtex]
  8. Takeshi Takahashi, Hiroshi Takechi, Youki Kadobayashi, "繧オ繧、繝舌シ繧サ繧ュ繝・繝ェ繝繧」繧ェ繝壹Ξ繝シ繧キ繝ァ繝ウ縺ョ蟆譚・," 繧「繝繝医槭シ繧ッ繝サ繧「繧、繝繧」, 2010.12. [preprint][bibtex]
  9. Takeshi Takahashi, Hiroshi Takechi, Youki Kadobayashi, "荳逶ョ縺ァ蛻縺九k縲,YBEX繧呈ァ区舌☆繧5縺、縺ョ繝悶Ο繝繧ッ," 繧「繝繝医槭シ繧ッ繝サ繧「繧、繝繧」, 2010.11. [preprint][bibtex]
  10. Takeshi Takahashi, Hiroshi Takechi, Youki Kadobayashi, "蝗ス蠅繧定カ翫∴縺滄」謳コ繧堤岼謖縺呎眠縺励>繧サ繧ュ繝・繝ェ繝繧」讓呎コ," 繧「繝繝医槭シ繧ッ繝サ繧「繧、繝繧」, 2010.10. [preprint][bibtex]
Domestic Workshops

  1. Takeshi Takahashi, Daisuke Miyamoto, Bhola Panta, Koji Nakao, "邨郢泌縺ョ繧ス繝輔ヨ繧ヲ繧ァ繧「雉逕」縺ォ蟇セ縺吶k閼蠑ア諤ァ逶」隕悶サ隴ヲ蜻願ェ蜍募喧繝繝シ繝ォ縺ョ讀懆ィ," 菫。蟄ヲ謚蝣ア, 遖丞イ。, 2015.6. [docInfo][bibtex]
  2. Takeshi Takahashi, Takao Mimura, Kanta Nishida, Koji Nakao, "繧ォ繝繧エ繝ェ縺ォ蝓コ縺・縺就ndroid 繧「繝励Μ縺ョ繝ェ繧ケ繧ッ蛟、螳夐丞喧謚陦薙ョ讀懆ィ," 菫。蟄ヲ謚蝣ア, 豐也ク, 2014.3. [docInfo][bibtex]
  3. Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi, "證怜捷蛹門諺蜷埼壻ソ。繝励Ο繝医さ繝ォ縺ョ謠先。医→縺昴ョ繝励Ο繝医ち繧、繝怜ョ溯」," DICOMO, 譁ー貎, 2014.7. [docInfo][bibtex]
  4. Takeshi Takahashi, Yuuki Takano, Koji Nakao, Satoshi Ohta, Akira Kanaoka, Shoichi Sakane, Shin'ichiro Matsuo, "Android 遶ッ譛ォ縺ョ繝ェ繧ケ繧ッ隧穂セ。繝輔Ξ繝シ繝繝ッ繝シ繧ッ縺ィ縺昴ョ繝励Ο繝医ち繧、繝玲ァ狗ッ," 證怜捷縺ィ諠蝣ア繧サ繧ュ繝・繝ェ繝繧」繧キ繝ウ繝昴ず繧ヲ繝, 鮖ソ蜈仙ウカ, 2014.1. [docInfo][bibtex]
  5. Takeshi Takahashi, Guillermo Horacio Ramirez Caceres, Yohei Murakami, Koji Zettsu, Shinichiro Matsuo, "Towards Provenance-Based Security Risk Assessment," 菫。蟄ヲ謚蝣ア, 譚ア莠ャ, 2013.3. [docInfo][bibtex]
  6. Yuuki Takano, Ruo Ando, Takeshi Takahashi, Tomoya Inoue, Satoshi Uda, "A Measurement Study of Open Resolvers and DNS Server Version," 繧、繝ウ繧ソ繝シ繝阪ャ繝医さ繝ウ繝輔ぃ繝ャ繝ウ繧ケ2013, 譚ア莠ャ, 2013.10. [docInfo][bibtex]
  7. Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano, "繧、繝ウ繧ソ繝シ繝阪ャ繝井ク翫↓蟄伜惠縺吶k繧オ繧、繝舌シ繧サ繧ュ繝・繝ェ繝繧」諠蝣ア縺ョ繝繧」繧ケ繧ォ繝舌Μ謚陦薙↓髢「縺吶k讀懆ィ," 菫。蟄ヲ謚蝣ア, 蛹玲オキ驕, 2012.7. [docInfo][bibtex]
  8. Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa, "蛻ゥ逕ィ譁ケ豕輔↓蠢懊§縺溘Μ繧ケ繧ッ縺ョ蜿ッ隕門喧縺ィ驕ゥ蛻縺ェ繧サ繧ュ繝・繝ェ繝繧」蟇セ遲門ョ滓命縺ョ縺溘a縺ョ繧「繝シ繧ュ繝繧ッ繝√Ε縺ョ繧ー繝ゥ繝ウ繝峨ョ繧カ繧、繝ウ," 菫。蟄ヲ謚蝣ア, 蛹玲オキ驕, 2012.7. [docInfo][bibtex]
  9. Akira Kanaoka, Takeshi Takahashi, "Workshop on Usable Security (USEC12) 蜿ょ刈蝣ア蜻," 諠蝣ア蜃ヲ逅蟄ヲ莨售PT遐皮ゥカ莨, 蜊闡, 2012.5. [docInfo][bibtex]
  10. Takeshi Takahashi, Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo, "繝槭Ν繝√ユ繝翫Φ繝医け繝ゥ繧ヲ繝峨さ繝ウ繝斐Η繝シ繝繧」繝ウ繧ー: 繧サ繧ュ繝・繝ェ繝繧」荳翫ョ隱イ鬘後→繧「繝励Ο繝シ繝," 菫。蟄ヲ謚蝣ア, 蠕ウ蟲カ, 2011.11. [docInfo][bibtex]
  11. Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara, "繧ェ繝ウ繝医Ο繧ク縺ォ蝓コ縺・縺上け繝ゥ繧ヲ繝峨そ繧ュ繝・繝ェ繝繧」縺ョ讀懆ィ," 菫。蟄ヲ謚蝣ア, 蠎蟲カ, 2010.11. [docInfo][bibtex]
  12. Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara, "繧オ繧、繝舌シ繧サ繧ュ繝・繝ェ繝繧」繧ェ繝壹Ξ繝シ繧キ繝ァ繝ウ縺ョ縺溘a縺ョ諠蝣ア繧ェ繝ウ繝医Ο繧ク縺ョ讒狗ッ," 菫。蟄ヲ謚蝣ア, 髱呈」ョ, 2010.7. [docInfo][bibtex]
  13. Ken'ichiro Arasaki, Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "霆「騾√Ν繝シ繧ソ逋コ隕区焔豕輔r逕ィ縺縺溽ァサ蜍慕ォッ譛ォ縺ョIP繝槭Ν繝√く繝」繧ケ繝磯壻ソ。縺ォ髢「縺吶k讀懆ィ," 菫。蟄ヲ謚蝣ア, 蠎蟲カ, 2007.1. [docInfo][bibtex]
  14. Ken'ichiro Arasaki, Takeshi Takahashi, Yusuke Shudo, Hideyoshi Tominaga, "謳コ蟶ッ髮サ隧ア邯イ縺ョ蛻カ蠕。讖溯ス繧堤畑縺縺櫪obile IP騾壻ソ。縺ォ髢「縺吶k讀懆ィ," 菫。蟄ヲ謚蝣ア, 逾槫・亥キ, 2006.3. [docInfo][bibtex]
  15. Manabu Ito, Takeshi Takahashi, Hirokazu Tashiro, Koichi Asatani, Hideyoshi Tominaga, "螟壽ョオ蝙九Δ繝舌う繝ォ繝阪ャ繝医Ρ繝シ繧ッ縺ォ縺翫¢繧九ワ繝ウ繝峨が繝シ繝舌r閠諷ョ縺励◆邨瑚キッ譛驕ゥ蛹悶↓髢「縺吶k讀懆ィ," 菫。蟄ヲ謚蝣ア, 螟ァ蛻, 2006.1. [docInfo][bibtex]
  16. Takeshi Takahashi, Ken'ichiro Arasaki, Koichi Asatani, Hideyoshi Tominaga, "IP繝槭Ν繝√く繝」繧ケ繝医↓縺翫¢繧玖サ「騾√Ν繝シ繧ソ繧堤畑縺縺溷女菫。遶ッ譛ォ繝「繝薙Μ繝繧」縺ォ髢「縺吶k讀懆ィ," 菫。蟄ヲ謚蝣ア, 遖丞イ。, 2005.11. [docInfo][bibtex]
  17. Yusuke Shudo, Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, " 繝槭Ν繝√く繝」繧ケ繝医r逕ィ縺縺溷キョ蛻・蛹鵬oS螳溽樟縺ョ縺溘a縺ョ繝医Λ繝ウ繧ケ繧ウ繝シ繝蛻カ蠕。譁ケ蠑上ョ讀懆ィ," 菫。蟄ヲ謚蝣ア, 譚ア莠ャ, 2005.7. [docInfo][bibtex]
  18. Takeshi Takahashi, Yusuke Shudo, Koichi Asatani, Hideyoshi Tominaga, "繝ォ繝シ繝繧」繝ウ繧ー繧定諷ョ縺励◆MIP繝上Φ繝峨が繝シ繝先焔豕輔↓髢「縺吶k讀懆ィ," 菫。蟄ヲ謚蝣ア, 譚ア莠ャ, 2005.5. [docInfo][bibtex]
  19. Hirokazu Tashiro, Kentaro Dobashi, Takeshi Takahashi, Hideyoshi Tominaga, "霆願サ企俣騾壻ソ。縺ォ縺翫¢繧九Μ繧「繝ォ繧ソ繧、繝諤ァ蜷台ク翫r逶ョ逧縺ィ縺励◆驕ゥ蠢懷梛CSMA繝励Ο繝医さ繝ォ縺ョ謠先。," 菫。蟄ヲ謚蝣ア, 譚ア莠ャ, 2005.5. [docInfo][bibtex]
  20. Yusuke Shudo, Takeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga, "繝槭Ν繝√く繝」繧ケ繝医ロ繝繝医Ρ繝シ繧ッ荳翫↓縺翫¢繧九ヨ繝ゥ繝ウ繧ケ繧ウ繝シ繝蛻カ蠕。譁ケ蠑上ョ讀懆ィ," 髮サ蟄先ュ蝣ア騾壻ソ。蟄ヲ莨壽丼蟄」邱丞粋螟ァ莨, 螟ァ髦ェ, 2005.3. [docInfo][bibtex]
  21. Takeshi Takahashi, Hideyoshi Tominaga, " 霆「騾√Ν繝シ繧ソ蜍慕噪驕ク謚樊焔豕輔↓蝓コ縺・縺上ワ繝ウ繝峨が繝シ繝先婿蠑上ョ讀懆ィ," 菫。蟄ヲ謚蝣ア, 蠎蟲カ, 2004.7. [docInfo][bibtex]
  22. Takeshi Takahashi, Hideyoshi Tominaga, "繝「繝舌う繝ォIP荳翫〒縺ョ繝槭Ν繝√く繝」繧ケ繝亥宛蠕。譁ケ蠑上ョ讀懆ィ," 菫。蟄ヲ謚蝣ア, 遘狗伐, 2004.6. [docInfo][bibtex]
  23. Hidenobu Miyoshi, Takeshi Takahashi, Akira nakagawa, Kiichi Matsuda, Hideyoshi Tominaga, "Context-based motion vector coding with 2-Dimensional VLC," 菫。蟄ヲ謚蝣ア, 譚ア莠ャ, 2002.7. [docInfo][bibtex]
  24. Takeshi Takahashi, Akira nakagawa, Kiyoshi Sakai, Kiichi Matsuda, Hideyoshi Tominaga, "MPEG-4菴朱≦蟒カ騾壻ソ。繧キ繧ケ繝繝縺ォ縺翫¢繧玖ァ」蜒丞コヲ螟画鋤縺ョ譛牙柑諤ァ," 菫。蟄ヲ謚蝣アIE2002-01, 蛹玲オキ驕, 2002.1. [docInfo][bibtex]
  25. Takeshi Takahashi, Tsuyoshi Hanamura, Hideyoshi Tominaga, "繝槭Ν繝√励Ο繧ー繝ゥ繝繝医Λ繝ウ繧ケ繝昴シ繝医せ繝医Μ繝シ繝繝医Λ繝ウ繧ケ繧ウ繝シ繝縺ォ縺翫¢繧句コ蜉帙ヱ繧ア繝繝亥榊、夐榊喧譁ケ蠑上→縺昴ョ螳溯」," 諠蝣ア蜃ヲ逅蟄ヲ莨壹が繝シ繝繧」繧ェ繝薙ず繝・繧「繝ォ隍蜷亥ヲ逅遐皮ゥカ莨, 譚ア莠ャ, 2001.6. [docInfo][bibtex]
  26. Takeshi Takahashi, Tsuyoshi Hanamura, Hideyoshi Tominaga, "繝槭Ν繝√励Ο繧ー繝ゥ繝繝医Λ繝ウ繧ケ繝昴シ繝医せ繝医Μ繝シ繝繝医Λ繝ウ繧ケ繧ウ繝シ繝縺ォ縺翫¢繧句コ蜉帙ヱ繧ア繝繝亥榊、夐榊喧譁ケ蠑上→縺昴ョ螳溯」," 菫。蟄ヲ謚蝣アIE2001-04, 譚ア莠ャ, 2001.4. [docInfo][bibtex]
  27. Takeshi Takahashi, Tsuyoshi Hanamura, Hiroyuki Kasai, Maki Sugiura, Hideyoshi Tominaga, "繝槭Ν繝√励Ο繧ー繝ゥ繝繝医Λ繝ウ繧ケ繝昴シ繝医せ繝医Μ繝シ繝繝医Λ繝ウ繧ケ繧ウ繝シ繝縺ォ縺翫¢繧句コ蜉帙ヱ繧ア繝繝亥榊、夐榊喧譁ケ蠑," 髮サ蟄先ュ蝣ア騾壻ソ。蟄ヲ莨壽丼蟄」邱丞粋螟ァ莨, 莠ャ驛ス, 2001.3. [docInfo][bibtex]
Others

  1. Takeshi Takahashi, "TBD," NICT News, .. [bibtex]
  2. Takeshi Takahashi, "TBD," ITU繧ク繝」繝シ繝翫Ν, .. [bibtex]
  3. Bo Sun, Akinori Fujino, Tatsuyao Mori, Tao Ban, Takeshi Takahashi, Daisuke Inoue, "Automatically Generating Malware Analysis Reports Using Sandbox Logs ," IEICE Transactions, .. [bibtex]
  4. Chalee Vorakulpipat, Takeshi Takahashi, Daisuke Inoue, "Cloud-based IoT Biometric Authentication Development Solution and its Security Extension," NOMS, .. [bibtex]
  5. Takeshi Takahashi, "Android Application Analysis using Machine-Learning Techniques," Intelligent Systems Reference Library, .. [bibtex]
  6. Takeshi Takahashi, Youki Kadobayashi, "Ontological Approach toward Cybersecurity in Cloud Computing ," ITU-T workshop, 2010.12. [bibtex]
  7. Takeshi Takahashi, "Global Developments in Cybersecurity Information Exchange Framework (invited talk)," Asian Internet Engineering Conference, 2011.10. [bibtex]
  8. Takeshi Takahashi, "Real-Time Communication Architecture in Mobile Environments," 譌ゥ遞イ逕ー螟ァ蟄ヲ蜊壼」ォ隲匁枚, 2005.2. [bibtex]
  9. Akira Nakagawa, Takeshi Takahashi, "Context-based motion vector coding with 2-Dimensional VLC," Joint Video Team of ISO/IEC MPEG&ITU-T VCEG, 3rd Meeting: Fairfax, Virginia, USA, JVT-C097, 2002.5. [bibtex]
  10. Takeshi Takahashi, "谺。荳紋サ」繝槭Ν繝√Γ繝繧」繧「騾壻ソ。繧キ繧ケ繝繝縺ョ縺溘a縺ョ繝ェ繧「繝ォ繧ソ繧、繝繧「繝励Μ繧ア繝シ繧キ繝ァ繝ウ縺ョ遐皮ゥカシ壹ヨ繝ゥ繝ウ繧ケ繧ウ繝シ繝繧」繝ウ繧ーシ御ス朱≦蟒カ蜿翫ウ鬮伜悸邵ョ," 譌ゥ遞イ逕ー螟ァ蟄ヲ菫ョ螢ォ隲匁枚, 2002.9. [bibtex]
  11. Tsuyoshi Hanamura, Hideyoshi Tominaga, Takeshi Takahashi, Isao Nagayoshi, "繝槭Ν繝√励Ο繧ー繝ゥ繝蝨ァ邵ョ隨ヲ蜿キ蛹紋ソ。蜿キ螟画鋤譁ケ豕輔∬」鄂ョ縺翫h縺ウ螟画鋤繝励Ο繧ー繝ゥ繝繧定ィ倬鹸縺励◆蟐剃ス," 蜈ャ髢狗音險ア蠎蝣アP2001-79216, 2001.3. [bibtex]
  12. Takeshi Takahashi, "MPEG-2繝槭Ν繝√励Ο繧ー繝ゥ繝繝医Λ繝ウ繧ケ繝昴シ繝医せ繝医Μ繝シ繝繝医Λ繝ウ繧ケ繧ウ繝シ繝縺ォ縺翫¢繧句コ蜉帙ヱ繧ア繝繝亥榊、夐榊喧譁ケ蠑," 譌ゥ遞イ逕ー螟ァ蟄ヲ蜊呈・ュ隲匁枚, 2001.2. [bibtex]
Automatically Generated Publication Sites

  1. DBLP
  2. Google Scholar Citations
  3. Research Gate
  4. Microsoft Academic Search
  5. NICT's publication list

Takeshi Takashi's page footer