Inokuchi, Masaki
175  results:
Search for persons X
?
1

Extending Attack Graphs to Represent Cyber-Attacks in Commu..:

Stan, Orly ; Bitton, Ron ; Ezrets, Michal...
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  3 - p. 1936-1954 , 2022
 
?
2

A Framework for Modeling Cyber Attack Techniques from Secur..:

, In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining,
Binyamini, Hodaya ; Bitton, Ron ; Inokuchi, Masaki... - p. 2574-2583 , 2021
 
?
3

Heuristic Approach for Countermeasure Selection Using Attac..:

, In: 2021 IEEE 34th Computer Security Foundations Symposium (CSF),
Stan, Orly ; Bitton, Ron ; Ezrets, Michal... - p. 1-16 , 2021
 
?
4

Design Procedure of Knowledge Base for Practical Attack Gra..:

, In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security,
 
?
5

Deriving a Cost-Effective Digital Twin of an ICS to Facilit..:

, In: Computer Security; Lecture Notes in Computer Science,
Bitton, Ron ; Gluck, Tomer ; Stan, Orly... - p. 533-554 , 2018
 
?
11

Clinical features and oncological outcomes of bladder cance..:

Nagakawa, Shohei ; Shiota, Masaki ; Takamatsu, Dai...
International Journal of Urology.  31 (2024)  4 - p. 438-445 , 2024
 
?
13

Importance of TKI treatment duration in treatment-free remi..:

Yoshida, Chikashi ; Yamaguchi, Hiroki ; Doki, Noriko...
International Journal of Hematology.  117 (2023)  5 - p. 694-705 , 2023
 
?
15

Dynamic tumor-tracking stereotactic body radiotherapy with ..:

Iizuka, Yusuke ; Hiraoka, Masahiro ; Kokubo, Masaki...
Clinical and Translational Radiation Oncology.  39 (2023)  - p. 100591 , 2023
 
1-15