2009 |
25 | EE | Toshihiro Yokoyama,
Miyuki Hanaoka,
Makoto Shimamura,
Kenji Kono:
Simplifying security policy descriptions for internet servers in secure operating systems.
SAC 2009: 326-333 |
24 | EE | Takahiro Shinagawa,
Hideki Eiraku,
Kouichi Tanimoto,
Kazumasa Omote,
Shoichi Hasegawa,
Takashi Horie,
Manabu Hirano,
Kenichi Kourai,
Yoshihiro Oyama,
Eiji Kawai,
Kenji Kono,
Shigeru Chiba,
Yasushi Shinjo,
Kazuhiko Kato:
BitVisor: a thin hypervisor for enforcing i/o device security.
VEE 2009: 121-130 |
2008 |
23 | EE | Yoshihisa Abe,
Hiroshi Yamada,
Kenji Kono:
Enforcing appropriate process execution for exploiting idle resources from outside operating systems.
EuroSys 2008: 27-40 |
22 | EE | A. Tanoue,
Makoto Shimamura,
Miyuki Hanaoka,
Kenji Kono:
FlexBox: Sandboxing internet servers based on layer-7 contexts.
ISCC 2008: 386-391 |
21 | EE | Makoto Shimamura,
Miyuki Hanaoka,
Kenji Kono:
Filtering False Positives Based on Server-Side Behaviors.
IEICE Transactions 91-D(2): 264-276 (2008) |
20 | EE | Akiyoshi Sugiki,
Kenji Kono,
Hideya Iwasaki:
Tuning mechanisms for two major parameters of Apache web servers.
Softw., Pract. Exper. 38(12): 1215-1240 (2008) |
2007 |
19 | EE | Yuji Kosuga,
Kenji Kono,
Miyuki Hanaoka,
Miho Hishiyama,
Yu Takahama:
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection.
ACSAC 2007: 107-117 |
18 | EE | Masato Asahara,
Akio Shimada,
Hiroshi Yamada,
Kenji Kono:
Finding candidate spots for replica servers based on demand fluctuation.
ICPADS 2007: 1-10 |
17 | EE | Miyuki Hanaoka,
Kenji Kono,
Makoto Shimamura,
Satoshi Yamaguchi:
An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection/Prevention Systems.
ISCC 2007: 79-86 |
16 | EE | Hiroshi Yamada,
Kenji Kono:
FoxyTechnique: tricking operating system policies with a virtual machine monitor.
VEE 2007: 55-64 |
15 | EE | Miyuki Hanaoka,
Makoto Shimamura,
Kenji Kono:
TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems.
IEICE Transactions 90-D(12): 2019-2032 (2007) |
2006 |
14 | EE | Makoto Shimamura,
Kenji Kono:
Using Attack Information to Reduce False Positives in Network IDS.
ISCC 2006: 386-393 |
13 | EE | Hiroshi Yamada,
Kenji Kono:
User-level disk-bandwidth control for resource-borrowing network applications.
NOMS 2006 |
12 | EE | Masakuni Agetsuma,
Kenji Kono,
Hideya Iwasaki,
Takashi Masuda:
Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation.
Systems and Computers in Japan 37(8): 24-37 (2006) |
2005 |
11 | EE | Akiyoshi Sugiki,
Kenji Kono,
Hideya Iwasaki:
A Practical Approach to Automatic Parameter-Tuning of Web Servers.
ASIAN 2005: 146-159 |
10 | EE | Masakuni Agetsuma,
Kenji Kono,
Hideya Iwasaki,
Takashi Masuda:
Exploiting mobile code for user-transparent distribution of application-level protocols.
Systems and Computers in Japan 36(1): 44-57 (2005) |
2004 |
9 | | Takahiro Shinagawa,
Kenji Kono:
Implementing a secure setuid program.
Parallel and Distributed Computing and Networks 2004: 301-309 |
2003 |
8 | EE | Masakuni Agetsuma,
Kenji Kono,
Hideya Iwasaki,
Takashi Masuda:
Self-configurable Mirror Servers for Automatic Adaptation to Service Demand Fluctuation.
ASIAN 2003: 18-32 |
7 | | Wataru Kaneko,
Kenji Kono,
Kentaro Shimizu:
Preemptive Resource Management: Defending against Resource Monopolizing DoS.
Applied Informatics 2003: 662-669 |
2002 |
6 | EE | Takahiro Shinagawa,
Kenji Kono,
Takashi Masuda:
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains.
ISSS 2002: 172-184 |
2001 |
5 | EE | Takeshi Morimoto,
Kenji Kono,
Ikuo Takeuchi:
YabAI: The First Rescue Simulation League Champion.
RoboCup 2001: 49-59 |
2000 |
4 | EE | Kenji Kono,
Takashi Masuda:
Efficient RMI: Dynamic Specialization of Object Serialization.
ICDCS 2000: 308-315 |
1999 |
3 | EE | Masahiko Takahashi,
Kenji Kono,
Takashi Masuda:
Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code.
ICDCS 1999: 64-73 |
1996 |
2 | EE | Kenji Kono,
Kazuhiko Kato,
Takashi Masuda:
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management.
ECOOP 1996: 295-315 |
1994 |
1 | | Kenji Kono,
Kazuhiko Kato,
Takashi Masuda:
Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers.
ICDCS 1994: 142-151 |