Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ruo Ando
@article{DBLP:journals/corr/abs-2201-03301, author = {Ruo Ando and Yoshiyasu Takefuji}, title = {An experiment of the complexity of sliding block puzzles by 2D heat flow in paramodulation}, journal = {CoRR}, volume = {abs/2201.03301}, year = {2022}, url = {https://arxiv.org/abs/2201.03301}, eprinttype = {arXiv}, eprint = {2201.03301}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-03301.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-08512, author = {Ruo Ando and Yoshiyasu Takefuji}, title = {An Experiment of Randomized Hints on an Axiom of Infinite-Valued Lukasiewicz Logic}, journal = {CoRR}, volume = {abs/2204.08512}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.08512}, doi = {10.48550/ARXIV.2204.08512}, eprinttype = {arXiv}, eprint = {2204.08512}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-08512.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/AndoKT21, author = {Ruo Ando and Youki Kadobayashi and Hiroki Takakura}, title = {Choice of parallelism: multi-GPU driven pipeline for huge academic backbone network}, journal = {Int. J. Parallel Emergent Distributed Syst.}, volume = {36}, number = {6}, pages = {609--622}, year = {2021}, url = {https://doi.org/10.1080/17445760.2021.1941009}, doi = {10.1080/17445760.2021.1941009}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paapp/AndoKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-12863, author = {Ruo Ando and Youki Kadobayashi and Hiroki Takakura}, title = {Choice of Parallelism: Multi-GPU Driven Pipeline for Huge Academic Backbone Network}, journal = {CoRR}, volume = {abs/2106.12863}, year = {2021}, url = {https://arxiv.org/abs/2106.12863}, eprinttype = {arXiv}, eprint = {2106.12863}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-12863.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-09409, author = {Ruo Ando and Yoshiyasu Takefuji}, title = {A constrained recursion algorithm for batch normalization of tree-sturctured {LSTM}}, journal = {CoRR}, volume = {abs/2008.09409}, year = {2020}, url = {https://arxiv.org/abs/2008.09409}, eprinttype = {arXiv}, eprint = {2008.09409}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-09409.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-00775, author = {Ruo Ando and Yoshiyasu Takefuji}, title = {A Curious New Result of Resolution Strategies in Negation-Limited Inverters Problem}, journal = {CoRR}, volume = {abs/2011.00775}, year = {2020}, url = {https://arxiv.org/abs/2011.00775}, eprinttype = {arXiv}, eprint = {2011.00775}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-00775.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-08231, author = {Ruo Ando and Yoshiyasu Takefuji}, title = {A new perspective of paramodulation complexity by solving massive 8 puzzles}, journal = {CoRR}, volume = {abs/2012.08231}, year = {2020}, url = {https://arxiv.org/abs/2012.08231}, eprinttype = {arXiv}, eprint = {2012.08231}, timestamp = {Sat, 02 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-08231.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aipr2/Ando19, author = {Ruo Ando}, editor = {Li Ma and Xu Huang}, title = {A lock-free algorithm of tree-based reduction for large scale clustering on {GPGPU}}, booktitle = {Proceedings of the 2nd International Conference on Artificial Intelligence and Pattern Recognition, {AIPR} 2019, Beijing, China, August 16-18, 2019}, pages = {129--133}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3357254.3357271}, doi = {10.1145/3357254.3357271}, timestamp = {Tue, 19 Nov 2019 11:03:19 +0100}, biburl = {https://dblp.org/rec/conf/aipr2/Ando19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/XuLAS18, author = {Yang Xu and Jia Liu and Ruo Ando and Norio Shiratori}, title = {End-to-end Congestion Relief and Physical Layer Security-Aware Routing Design for Ad Hoc Networks in IoT Applications}, journal = {J. Inf. Sci. Eng.}, volume = {34}, number = {4}, pages = {1015--1030}, year = {2018}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=163\_2162}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/XuLAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdiot/Ando18, author = {Ruo Ando}, title = {Parallel Edge Contraction for Large Nonplanar Graph Clustering}, booktitle = {Proceedings of the 2018 2nd International Conference on Big Data and Internet of Things, {BDIOT} 2018, Beijing, China, October 24-26, 2018}, pages = {61--64}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3289430.3289468}, doi = {10.1145/3289430.3289468}, timestamp = {Tue, 09 Jul 2019 13:16:54 +0200}, biburl = {https://dblp.org/rec/conf/bdiot/Ando18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/LiuXATX17, author = {Jia Liu and Yang Xu and Ruo Ando and Hiroki Takakura and Yifei Xu}, title = {Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc Networks}, booktitle = {International Conference on Networking and Network Applications, NaNA 2017, Kathmandu City, Nepal, October 16-19, 2017}, pages = {80--86}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/NaNA.2017.10}, doi = {10.1109/NANA.2017.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nana/LiuXATX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/XuLAS17, author = {Yang Xu and Jia Liu and Ruo Ando and Norio Shiratori}, title = {End-to-End Congestion Relief Routing Protocol for Ad Hoc Networks}, booktitle = {International Conference on Networking and Network Applications, NaNA 2017, Kathmandu City, Nepal, October 16-19, 2017}, pages = {87--92}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/NaNA.2017.9}, doi = {10.1109/NANA.2017.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nana/XuLAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/TakanoOTAI14, author = {Yuuki Takano and Satoshi Ohta and Takeshi Takahashi and Ruo Ando and Tomoya Inoue}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {48--56}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890923}, doi = {10.1109/PST.2014.6890923}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/TakanoOTAI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AndoTS12, author = {Ruo Ando and Kazushi Takahashi and Kuniyasu Suzaki}, title = {Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {120--137}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.120}, doi = {10.22667/JOWUA.2012.03.31.120}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AndoTS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Ando12, author = {Ruo Ando}, title = {Flaw and Configuration Analysis of Cloud Component Using First Order Logic}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {104--108}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.25}, doi = {10.1109/ASIAJCIS.2012.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Ando12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AndoS11, author = {Ruo Ando and Kuniyasu Suzaki}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Wai{-}Chi Fang and L. Javier Garc{\'{\i}}a{-}Villalba and Kirk P. Arnett and Muhammad Khurram Khan}, title = {A Lightweight Access Log Filter of Windows {OS} Using Simple Debug Register Manipulation}, booktitle = {Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {259}, pages = {215--227}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27189-2\_23}, doi = {10.1007/978-3-642-27189-2\_23}, timestamp = {Sat, 30 Sep 2023 09:41:06 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AndoS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/AndoM11, author = {Ruo Ando and Shinsuke Miwa}, editor = {Bao{-}Liang Lu and Liqing Zhang and James T. Kwok}, title = {Faster Log Analysis and Integration of Security Incidents Using Knuth-Bendix Completion}, booktitle = {Neural Information Processing - 18th International Conference, {ICONIP} 2011, Shanghai, China, November 13-17, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7063}, pages = {28--36}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24958-7\_4}, doi = {10.1007/978-3-642-24958-7\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconip/AndoM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/BanGZAK11, author = {Tao Ban and Shanqing Guo and Zonghua Zhang and Ruo Ando and Youki Kadobayashi}, title = {Practical network traffic analysis in {P2P} environment}, booktitle = {Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2011, Istanbul, Turkey, 4-8 July, 2011}, pages = {1801--1807}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IWCMC.2011.5982808}, doi = {10.1109/IWCMC.2011.5982808}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/BanGZAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/BlancAK11, author = {Gregory Blanc and Ruo Ando and Youki Kadobayashi}, title = {Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection}, booktitle = {4th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2011, Paris, France, February 7-10, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/NTMS.2011.5720649}, doi = {10.1109/NTMS.2011.5720649}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/BlancAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/BanAK10, author = {Tao Ban and Ruo Ando and Youki Kadobayashi}, editor = {Kok Wai Wong and B. Sumudu U. Mendis and Abdesselam Bouzerdoum}, title = {A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis}, booktitle = {Neural Information Processing. Models and Applications - 17th International Conference, {ICONIP} 2010, Sydney, Australia, November 22-25, 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6444}, pages = {267--274}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17534-3\_33}, doi = {10.1007/978-3-642-17534-3\_33}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/iconip/BanAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/AndoBK10, author = {Ruo Ando and Kang Byung and Youki Kadobayashi}, editor = {Kok Wai Wong and B. Sumudu U. Mendis and Abdesselam Bouzerdoum}, title = {Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning}, booktitle = {Neural Information Processing. Models and Applications - 17th International Conference, {ICONIP} 2010, Sydney, Australia, November 22-25, 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6444}, pages = {337--343}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17534-3\_41}, doi = {10.1007/978-3-642-17534-3\_41}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconip/AndoBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/AndoKS10, author = {Ruo Ando and Youki Kadobayashi and Yoichi Shinoda}, title = {Blink: Large-scale {P2P} network monitoring and visualization system using {VM} introspection}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2010, Sixth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2010: International Conference on Networked Computing, {IMS} 2010: International Conference on Advanced Information Management and Service, {IDC} 2010: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 16-18, 2010}, pages = {351--358}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5572049/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncm/AndoKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/Ando09, author = {Ruo Ando}, editor = {Leonard Barolli and Fatos Xhafa and Hui{-}Huang Hsu}, title = {A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server}, booktitle = {2009 International Conference on Complex, Intelligent and Software Intensive Systems, {CISIS} 2009, Fukuoka, Japan, March 16-19, 2009}, pages = {633--638}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CISIS.2009.62}, doi = {10.1109/CISIS.2009.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisis/Ando09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/AndoZKS09, author = {Ruo Ando and Zonghua Zhang and Youki Kadobayashi and Yoichi Shinoda}, title = {A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration}, booktitle = {Eighth {IEEE} International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2009, Chengdu, China, 12-14 December, 2009}, pages = {95--102}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DASC.2009.154}, doi = {10.1109/DASC.2009.154}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/AndoZKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/Ando09a, author = {Ruo Ando}, editor = {Chi{-}Sing Leung and Minho Lee and Jonathan Hoyin Chan}, title = {Automated Log Analysis of Infected Windows {OS} Using Mechanized Reasoning}, booktitle = {Neural Information Processing, 16th International Conference, {ICONIP} 2009, Bangkok, Thailand, December 1-5, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5864}, pages = {540--547}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10684-2\_60}, doi = {10.1007/978-3-642-10684-2\_60}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/iconip/Ando09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangAK08, author = {Zonghua Zhang and Ruo Ando and Youki Kadobayashi}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Hardening Botnet by a Rational Botmaster}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {348--369}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_27}, doi = {10.1007/978-3-642-01440-6\_27}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/Ando09, author = {Ruo Ando}, editor = {Mario K{\"{o}}ppen and Nikola K. Kasabov and George G. Coghill}, title = {Faster Parameter Detection of Polymorphic Viral Code Using Hot List Strategy}, booktitle = {Advances in Neuro-Information Processing, 15th International Conference, {ICONIP} 2008, Auckland, New Zealand, November 25-28, 2008, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {5506}, pages = {555--562}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-02490-0\_68}, doi = {10.1007/978-3-642-02490-0\_68}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/iconip/Ando09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/AndoKS08, author = {Ruo Ando and Youki Kadobayashi and Yoichi Shinoda}, title = {An Enhancement of Trusted Domain Enforcement using {VMM} Interruption Mechanism}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {2222--2229}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.341}, doi = {10.1109/ICYCS.2008.341}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/AndoKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AndoKS07, author = {Ruo Ando and Youki Kadobayashi and Yoichi Shinoda}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized {VMM} Using Split Kernel Module}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {131--143}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_11}, doi = {10.1007/978-3-540-76788-6\_11}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AndoKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/Ando07, author = {Ruo Ando}, editor = {Wenying Feng and Feng Gao}, title = {Parallel analysis of polymorphic viral code using automated deduction system}, booktitle = {Proceedings of the 8th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China}, pages = {585--592}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SNPD.2007.417}, doi = {10.1109/SNPD.2007.417}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/Ando07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/NguyenAT06, author = {Anh{-}Quynh Nguyen and Ruo Ando and Yoshiyasu Takefuji}, editor = {William LeFebvre}, title = {Centralized Security Policy Support for Virtual Machine}, booktitle = {Proceedings of the 20th Conference on Systems Administration {(LISA} 2006), Washington, DC, USA, December 3-8, 2006}, pages = {79--87}, publisher = {{USENIX}}, year = {2006}, url = {http://www.usenix.org/events/lisa06/tech/quynh.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/NguyenAT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AndoT05, author = {Ruo Ando and Yoshiyasu Takefuji}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {85--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_8}, doi = {10.1007/11599371\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/AndoT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/AndoT03, author = {Ruo Ando and Yoshiyasu Takefuji}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with {SMTP} Proxy}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {424--427}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_37}, doi = {10.1007/978-3-540-45215-7\_37}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/AndoT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.