BibTeX records: Ruo Ando

download as .bib file

@article{DBLP:journals/corr/abs-2201-03301,
  author       = {Ruo Ando and
                  Yoshiyasu Takefuji},
  title        = {An experiment of the complexity of sliding block puzzles by 2D heat
                  flow in paramodulation},
  journal      = {CoRR},
  volume       = {abs/2201.03301},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.03301},
  eprinttype    = {arXiv},
  eprint       = {2201.03301},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-03301.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-08512,
  author       = {Ruo Ando and
                  Yoshiyasu Takefuji},
  title        = {An Experiment of Randomized Hints on an Axiom of Infinite-Valued Lukasiewicz
                  Logic},
  journal      = {CoRR},
  volume       = {abs/2204.08512},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.08512},
  doi          = {10.48550/ARXIV.2204.08512},
  eprinttype    = {arXiv},
  eprint       = {2204.08512},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-08512.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/AndoKT21,
  author       = {Ruo Ando and
                  Youki Kadobayashi and
                  Hiroki Takakura},
  title        = {Choice of parallelism: multi-GPU driven pipeline for huge academic
                  backbone network},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {36},
  number       = {6},
  pages        = {609--622},
  year         = {2021},
  url          = {https://doi.org/10.1080/17445760.2021.1941009},
  doi          = {10.1080/17445760.2021.1941009},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paapp/AndoKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-12863,
  author       = {Ruo Ando and
                  Youki Kadobayashi and
                  Hiroki Takakura},
  title        = {Choice of Parallelism: Multi-GPU Driven Pipeline for Huge Academic
                  Backbone Network},
  journal      = {CoRR},
  volume       = {abs/2106.12863},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.12863},
  eprinttype    = {arXiv},
  eprint       = {2106.12863},
  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-12863.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-09409,
  author       = {Ruo Ando and
                  Yoshiyasu Takefuji},
  title        = {A constrained recursion algorithm for batch normalization of tree-sturctured
                  {LSTM}},
  journal      = {CoRR},
  volume       = {abs/2008.09409},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.09409},
  eprinttype    = {arXiv},
  eprint       = {2008.09409},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-09409.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-00775,
  author       = {Ruo Ando and
                  Yoshiyasu Takefuji},
  title        = {A Curious New Result of Resolution Strategies in Negation-Limited
                  Inverters Problem},
  journal      = {CoRR},
  volume       = {abs/2011.00775},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.00775},
  eprinttype    = {arXiv},
  eprint       = {2011.00775},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-00775.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-08231,
  author       = {Ruo Ando and
                  Yoshiyasu Takefuji},
  title        = {A new perspective of paramodulation complexity by solving massive
                  8 puzzles},
  journal      = {CoRR},
  volume       = {abs/2012.08231},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.08231},
  eprinttype    = {arXiv},
  eprint       = {2012.08231},
  timestamp    = {Sat, 02 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-08231.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aipr2/Ando19,
  author       = {Ruo Ando},
  editor       = {Li Ma and
                  Xu Huang},
  title        = {A lock-free algorithm of tree-based reduction for large scale clustering
                  on {GPGPU}},
  booktitle    = {Proceedings of the 2nd International Conference on Artificial Intelligence
                  and Pattern Recognition, {AIPR} 2019, Beijing, China, August 16-18,
                  2019},
  pages        = {129--133},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3357254.3357271},
  doi          = {10.1145/3357254.3357271},
  timestamp    = {Tue, 19 Nov 2019 11:03:19 +0100},
  biburl       = {https://dblp.org/rec/conf/aipr2/Ando19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/XuLAS18,
  author       = {Yang Xu and
                  Jia Liu and
                  Ruo Ando and
                  Norio Shiratori},
  title        = {End-to-end Congestion Relief and Physical Layer Security-Aware Routing
                  Design for Ad Hoc Networks in IoT Applications},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {34},
  number       = {4},
  pages        = {1015--1030},
  year         = {2018},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=163\_2162},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/XuLAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdiot/Ando18,
  author       = {Ruo Ando},
  title        = {Parallel Edge Contraction for Large Nonplanar Graph Clustering},
  booktitle    = {Proceedings of the 2018 2nd International Conference on Big Data and
                  Internet of Things, {BDIOT} 2018, Beijing, China, October 24-26, 2018},
  pages        = {61--64},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289430.3289468},
  doi          = {10.1145/3289430.3289468},
  timestamp    = {Tue, 09 Jul 2019 13:16:54 +0200},
  biburl       = {https://dblp.org/rec/conf/bdiot/Ando18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nana/LiuXATX17,
  author       = {Jia Liu and
                  Yang Xu and
                  Ruo Ando and
                  Hiroki Takakura and
                  Yifei Xu},
  title        = {Resource Allocation for Throughput Optimization in Buffer-Limited
                  Mobile Ad Hoc Networks},
  booktitle    = {International Conference on Networking and Network Applications, NaNA
                  2017, Kathmandu City, Nepal, October 16-19, 2017},
  pages        = {80--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/NaNA.2017.10},
  doi          = {10.1109/NANA.2017.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nana/LiuXATX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nana/XuLAS17,
  author       = {Yang Xu and
                  Jia Liu and
                  Ruo Ando and
                  Norio Shiratori},
  title        = {End-to-End Congestion Relief Routing Protocol for Ad Hoc Networks},
  booktitle    = {International Conference on Networking and Network Applications, NaNA
                  2017, Kathmandu City, Nepal, October 16-19, 2017},
  pages        = {87--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/NaNA.2017.9},
  doi          = {10.1109/NANA.2017.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nana/XuLAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/TakanoOTAI14,
  author       = {Yuuki Takano and
                  Satoshi Ohta and
                  Takeshi Takahashi and
                  Ruo Ando and
                  Tomoya Inoue},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {MindYourPrivacy: Design and implementation of a visualization system
                  for third-party Web tracking},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {48--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890923},
  doi          = {10.1109/PST.2014.6890923},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/TakanoOTAI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AndoTS12,
  author       = {Ruo Ando and
                  Kazushi Takahashi and
                  Kuniyasu Suzaki},
  title        = {Inter-domain Communication Protocol for Real-time File Access Monitor
                  of Virtual Machine},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {120--137},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.120},
  doi          = {10.22667/JOWUA.2012.03.31.120},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AndoTS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Ando12,
  author       = {Ruo Ando},
  title        = {Flaw and Configuration Analysis of Cloud Component Using First Order
                  Logic},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {104--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.25},
  doi          = {10.1109/ASIAJCIS.2012.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Ando12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AndoS11,
  author       = {Ruo Ando and
                  Kuniyasu Suzaki},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Wai{-}Chi Fang and
                  L. Javier Garc{\'{\i}}a{-}Villalba and
                  Kirk P. Arnett and
                  Muhammad Khurram Khan},
  title        = {A Lightweight Access Log Filter of Windows {OS} Using Simple Debug
                  Register Manipulation},
  booktitle    = {Security Technology - International Conference, SecTech 2011, Held
                  as Part of the Future Generation Information Technology Conference,
                  {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December
                  8-10, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {259},
  pages        = {215--227},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27189-2\_23},
  doi          = {10.1007/978-3-642-27189-2\_23},
  timestamp    = {Sat, 30 Sep 2023 09:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/AndoS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/AndoM11,
  author       = {Ruo Ando and
                  Shinsuke Miwa},
  editor       = {Bao{-}Liang Lu and
                  Liqing Zhang and
                  James T. Kwok},
  title        = {Faster Log Analysis and Integration of Security Incidents Using Knuth-Bendix
                  Completion},
  booktitle    = {Neural Information Processing - 18th International Conference, {ICONIP}
                  2011, Shanghai, China, November 13-17, 2011, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7063},
  pages        = {28--36},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24958-7\_4},
  doi          = {10.1007/978-3-642-24958-7\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/AndoM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/BanGZAK11,
  author       = {Tao Ban and
                  Shanqing Guo and
                  Zonghua Zhang and
                  Ruo Ando and
                  Youki Kadobayashi},
  title        = {Practical network traffic analysis in {P2P} environment},
  booktitle    = {Proceedings of the 7th International Wireless Communications and Mobile
                  Computing Conference, {IWCMC} 2011, Istanbul, Turkey, 4-8 July, 2011},
  pages        = {1801--1807},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IWCMC.2011.5982808},
  doi          = {10.1109/IWCMC.2011.5982808},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/BanGZAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/BlancAK11,
  author       = {Gregory Blanc and
                  Ruo Ando and
                  Youki Kadobayashi},
  title        = {Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware
                  Detection},
  booktitle    = {4th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2011, Paris, France, February 7-10, 2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/NTMS.2011.5720649},
  doi          = {10.1109/NTMS.2011.5720649},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/BlancAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/BanAK10,
  author       = {Tao Ban and
                  Ruo Ando and
                  Youki Kadobayashi},
  editor       = {Kok Wai Wong and
                  B. Sumudu U. Mendis and
                  Abdesselam Bouzerdoum},
  title        = {A Fast Kernel on Hierarchial Tree Structures and Its Application to
                  Windows Application Behavior Analysis},
  booktitle    = {Neural Information Processing. Models and Applications - 17th International
                  Conference, {ICONIP} 2010, Sydney, Australia, November 22-25, 2010,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6444},
  pages        = {267--274},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17534-3\_33},
  doi          = {10.1007/978-3-642-17534-3\_33},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/BanAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/AndoBK10,
  author       = {Ruo Ando and
                  Kang Byung and
                  Youki Kadobayashi},
  editor       = {Kok Wai Wong and
                  B. Sumudu U. Mendis and
                  Abdesselam Bouzerdoum},
  title        = {Log Analysis of Exploitation in Cloud Computing Environment Using
                  Automated Reasoning},
  booktitle    = {Neural Information Processing. Models and Applications - 17th International
                  Conference, {ICONIP} 2010, Sydney, Australia, November 22-25, 2010,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6444},
  pages        = {337--343},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17534-3\_41},
  doi          = {10.1007/978-3-642-17534-3\_41},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/AndoBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/AndoKS10,
  author       = {Ruo Ando and
                  Youki Kadobayashi and
                  Yoichi Shinoda},
  title        = {Blink: Large-scale {P2P} network monitoring and visualization system
                  using {VM} introspection},
  booktitle    = {International Conference on Networked Computing and Advanced Information
                  Management, {NCM} 2010, Sixth International Joint Conference on INC,
                  {IMS} and {IDC:} {INC} 2010: International Conference on Networked
                  Computing, {IMS} 2010: International Conference on Advanced Information
                  Management and Service, {IDC} 2010: International Conference on Digital
                  Content, Multimedia Technology and its Applications, Seoul, Korea,
                  August 16-18, 2010},
  pages        = {351--358},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5572049/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ncm/AndoKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/Ando09,
  author       = {Ruo Ando},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Hui{-}Huang Hsu},
  title        = {A Lightweight Implementation of Trusted Domain Enforcement for Secure
                  Embedded Web Server},
  booktitle    = {2009 International Conference on Complex, Intelligent and Software
                  Intensive Systems, {CISIS} 2009, Fukuoka, Japan, March 16-19, 2009},
  pages        = {633--638},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISIS.2009.62},
  doi          = {10.1109/CISIS.2009.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisis/Ando09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/AndoZKS09,
  author       = {Ruo Ando and
                  Zonghua Zhang and
                  Youki Kadobayashi and
                  Yoichi Shinoda},
  title        = {A Dynamic Protection System of Web Server in Virtual Cluster Using
                  Live Migration},
  booktitle    = {Eighth {IEEE} International Conference on Dependable, Autonomic and
                  Secure Computing, {DASC} 2009, Chengdu, China, 12-14 December, 2009},
  pages        = {95--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DASC.2009.154},
  doi          = {10.1109/DASC.2009.154},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/AndoZKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/Ando09a,
  author       = {Ruo Ando},
  editor       = {Chi{-}Sing Leung and
                  Minho Lee and
                  Jonathan Hoyin Chan},
  title        = {Automated Log Analysis of Infected Windows {OS} Using Mechanized Reasoning},
  booktitle    = {Neural Information Processing, 16th International Conference, {ICONIP}
                  2009, Bangkok, Thailand, December 1-5, 2009, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5864},
  pages        = {540--547},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10684-2\_60},
  doi          = {10.1007/978-3-642-10684-2\_60},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/Ando09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangAK08,
  author       = {Zonghua Zhang and
                  Ruo Ando and
                  Youki Kadobayashi},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Hardening Botnet by a Rational Botmaster},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {348--369},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_27},
  doi          = {10.1007/978-3-642-01440-6\_27},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/Ando09,
  author       = {Ruo Ando},
  editor       = {Mario K{\"{o}}ppen and
                  Nikola K. Kasabov and
                  George G. Coghill},
  title        = {Faster Parameter Detection of Polymorphic Viral Code Using Hot List
                  Strategy},
  booktitle    = {Advances in Neuro-Information Processing, 15th International Conference,
                  {ICONIP} 2008, Auckland, New Zealand, November 25-28, 2008, Revised
                  Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5506},
  pages        = {555--562},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-02490-0\_68},
  doi          = {10.1007/978-3-642-02490-0\_68},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/Ando09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/AndoKS08,
  author       = {Ruo Ando and
                  Youki Kadobayashi and
                  Yoichi Shinoda},
  title        = {An Enhancement of Trusted Domain Enforcement using {VMM} Interruption
                  Mechanism},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {2222--2229},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.341},
  doi          = {10.1109/ICYCS.2008.341},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/AndoKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AndoKS07,
  author       = {Ruo Ando and
                  Youki Kadobayashi and
                  Yoichi Shinoda},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized
                  {VMM} Using Split Kernel Module},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {131--143},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_11},
  doi          = {10.1007/978-3-540-76788-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AndoKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/Ando07,
  author       = {Ruo Ando},
  editor       = {Wenying Feng and
                  Feng Gao},
  title        = {Parallel analysis of polymorphic viral code using automated deduction
                  system},
  booktitle    = {Proceedings of the 8th {ACIS} International Conference on Software
                  Engineering, Artificial Intelligence, Networking and Parallel/Distributed
                  Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China},
  pages        = {585--592},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SNPD.2007.417},
  doi          = {10.1109/SNPD.2007.417},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/Ando07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/NguyenAT06,
  author       = {Anh{-}Quynh Nguyen and
                  Ruo Ando and
                  Yoshiyasu Takefuji},
  editor       = {William LeFebvre},
  title        = {Centralized Security Policy Support for Virtual Machine},
  booktitle    = {Proceedings of the 20th Conference on Systems Administration {(LISA}
                  2006), Washington, DC, USA, December 3-8, 2006},
  pages        = {79--87},
  publisher    = {{USENIX}},
  year         = {2006},
  url          = {http://www.usenix.org/events/lisa06/tech/quynh.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/NguyenAT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AndoT05,
  author       = {Ruo Ando and
                  Yoshiyasu Takefuji},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {Self Debugging Mode for Patch-Independent Nullification of Unknown
                  Remote Process Infection},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {85--95},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_8},
  doi          = {10.1007/11599371\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/AndoT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/AndoT03,
  author       = {Ruo Ando and
                  Yoshiyasu Takefuji},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination
                  with {SMTP} Proxy},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {424--427},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_37},
  doi          = {10.1007/978-3-540-45215-7\_37},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/AndoT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics