Shinpei Ogata
Title
Cited by
Cited by
Year
A method of automatic integration test case generation from UML-based scenario
S Ogata, S Matsuura
WSEAS Trans. Information Science and Applications 7 (4), 598-607, 2010
272010
Evaluation of a use-case-driven requirements analysis tool employing web UI prototype generation
S Ogata, S Matsuura
WSEAS Trans. Info. Sci. and App 7 (2), 273-282, 2010
212010
A UML-based requirements analysis with automatic prototype system generation
S Ogata, S Matsuura
Communications of SIWN 3, 166-172, 2008
182008
A metamodel for security and privacy knowledge in cloud services
H Washizaki, S Fukumoto, M Yamamoto, M Yoshizawa, Y Fukazawa, ...
2016 IEEE World Congress on Services (SERVICES), 142-143, 2016
162016
Landscape of IoT patterns
H Washizaki, N Yoshioka, A Hazeyama, T Kato, H Kaiya, S Ogata, ...
2019 IEEE/ACM 1st International Workshop on Software Engineering Research …, 2019
152019
Cloud security and privacy metamodel
T Xia, H Washizaki, T Kato, H Kaiya, S Ogata, EB Fernandez, H Kanuka, ...
Proceedings of the 6th International Conference on Model-Driven Engineering …, 2018
152018
Landscape of architecture and design patterns for iot systems
H Washizaki, S Ogata, A Hazeyama, T Okubo, EB Fernandez, N Yoshioka
IEEE Internet of Things Journal 7 (10), 10091-10101, 2020
142020
A practical conceptual modeling teaching method based on quantitative error analyses for novices learning to create error-free simple class diagrams
M Kayama, S Ogata, K Masymoto, M Hashimoto, M Otani
2014 IIAI 3rd International Conference on Advanced Applied Informatics, 616-622, 2014
142014
Taxonomy and literature survey of security pattern research
H Washizaki, T Xia, N Kamata, Y Fukazawa, H Kanuka, D Yamaoto, ...
2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018
122018
Automatic method of generating a web prototype employing live interactive widget to validate functional usability requirements
S Kamimori, S Ogata, K Kaijiri
2015 3rd International Conference on Applied Computing and Information …, 2015
122015
Security requirements analysis using knowledge in capec
H Kaiya, S Kono, S Ogata, T Okubo, N Yoshioka, H Washizaki, K Kaijiri
International conference on advanced information systems engineering, 343-348, 2014
82014
A review method for UML requirements analysis model employing system-side prototyping
S Ogata, S Matsuura
SpringerPlus 2 (1), 1-11, 2013
82013
Scenario-based automatic prototype generation
S Ogata, S Matsuura
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
82008
Automated inspection method for an STAMP/STPA-fallen barrier trap at railroad crossing
P Yang, R Karashima, K Okano, S Ogata
Procedia Computer Science 159, 1165-1174, 2019
72019
Preliminary systematic literature review of software and systems traceability
H Kaiya, R Sato, A Hazeyama, S Ogata, T Okubo, T Tanaka, N Yoshioka, ...
Procedia computer science 112, 1141-1150, 2017
72017
Early requirements analysis for a socio-technical system based on goal dependencies
H Kaiya, S Ogata, S Hayashi, M Saeki
New Trends in Software Methodologies, Tools and Techniques, 125-138, 2016
72016
Eliciting security requirements for an information system using asset flows and processor deployment
H Kaiya, J Sakai, S Ogata, K Kaijiri
International Journal of Secure Software Engineering (IJSSE) 4 (3), 42-63, 2013
72013
Security and privacy behavior definition for behavior driven development
T Okubo, Y Kakizaki, T Kobashi, H Washizaki, S Ogata, H Kaiya, ...
International Conference on Product-Focused Software Process Improvement …, 2014
62014
Experimental development based on mapping rule between requirements analysis model and web framework specific design model
H Okuda, S Ogata, S Matsuura
SpringerPlus 2 (1), 1-8, 2013
62013
Goal-oriented security requirements analysis for a system used in several different activities
H Kaiya, T Okubo, N Kanaya, Y Suzuki, S Ogata, K Kaijiri, N Yoshioka
International Conference on Advanced Information Systems Engineering, 478-489, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20