Ruo Ando
According to our database1,
Ruo Ando
authored at least 32 papers
between 2003 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
CoRR, 2022
An experiment of the complexity of sliding block puzzles by 2D heat flow in paramodulation.
CoRR, 2022
2021
Int. J. Parallel Emergent Distributed Syst., 2021
2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
2019
Proceedings of the 2nd International Conference on Artificial Intelligence and Pattern Recognition, 2019
2018
End-to-end Congestion Relief and Physical Layer Security-Aware Routing Design for Ad Hoc Networks in IoT Applications.
J. Inf. Sci. Eng., 2018
Proceedings of the 2018 2nd International Conference on Big Data and Internet of Things, 2018
2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017
2014
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
2012
Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Faster Log Analysis and Integration of Security Incidents Using Knuth-Bendix Completion.
Proceedings of the Neural Information Processing - 18th International Conference, 2011
A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation.
Proceedings of the Security Technology, 2011
2010
Blink: Large-scale P2P network monitoring and visualization system using VM introspection.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis.
Proceedings of the Neural Information Processing. Models and Applications, 2010
Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning.
Proceedings of the Neural Information Processing. Models and Applications, 2010
2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server.
Proceedings of the 2009 International Conference on Complex, 2009
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module.
Proceedings of the Information Security and Cryptology, 2007
2006
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006
2005
Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2003
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy.
Proceedings of the Computer Network Security, 2003