Papers - MONDEN Akito
-
進行中のプロジェクト計測とフィードバック実験に基づく計測データベース活用方式の提案 Reviewed
神谷芳樹, 菊池奈穂美, 松村知子, 大杉直樹, 門田暁人, 肥後芳樹, 井上克郎, 松本健一
情報処理学会ソフトウェアエンジニアリングシンポジウム200 2006.10
-
API呼び出しを用いた動的バースマーク Reviewed
Keiji Okamoto, Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto
電子情報通信学会論文誌D J89-D ( 8 ) 1751 - 1763 2006.8
-
情報漏えいのリスクと生産性を考慮したソフトウェアプロセスの開発者割当て探索 Reviewed
Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto
ソフトウェアシンポジウム2006 24 - 32 2006.7
-
Analyzing Individual Performance of Source Code Review Using Reviewers’ Eye Movement Reviewed
Hidetake Uwano, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto
Proceedings of Int'l Eye Tracking Research & Applications Symposium (ETRA 2006) 133 - 140 2006.3
-
A software protection method based on instruction camouflage Reviewed
Kanzaki, Y., Monden, A., Nakamura, M., Matsumoto, K.
Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi) 89 ( 1 ) 47 - 59 2006.1
-
Software Obfuscation from Crackers’ Viewpoint Reviewed
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto
Proc. IASTED International Conference on Advances in Computer Science and Technology (IASTED ACST 2006) 286 - 291 2006.1
-
Productivity analysis of Japanese enterprise software development projects Reviewed
Masateru Tsunoda, Akito Monden, Hiroshi Yadohisa, Nahomi Kikuchi, Ken-Ichi Matsumoto
Proceedings - International Conference on Software Engineering 14 - 17 2006
-
Quantitative Analysis of Information Leakage in Security-Sensitive Software Processes
Kanzaki Yuichiro, Igaki Hiroshi, Nakamura Masahide, Monden Akito, Matsumoto Ken-ichi
Information and Media Technologies 1 ( 1 ) 121 - 133 2006
-
Java Birthmarks -- Detecting the Software Theft Reviewed
Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto
IEICE Transactions on Information and Systems E88-D ( 9 ) 2148 - 2158 2005.9
-
Quantitative analysis of information leakage in security-sensitive software processes Reviewed
Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto
IPSJ Journal, Special Issue on Research on Computer Security Characterized in the Context of Social Responsibilities 46 ( 8 ) 2129 - 2141 2005.8
-
Software analysis by code clones in open source software Reviewed
Shinji Uchida, Akito Monden, Naoki Ohsugi, Toshihiro Kamiya, Ken Ichi Matsumoto, Hideo Kudo
Journal of Computer Information Systems 45 ( 3 ) 1 - 11 2005.3
-
Characterizing Dynamics of Information Leakage in Software Process Reviewed
Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto
Proc. 3rd Australasian Information Security Workshop (AISW2005) 44 145 - 151 2005.1
-
Tamper-resistant software system based on a finite state machine Reviewed
Akito Monden, Antoine Monsifrot, Clark Thomborson
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E88-A ( 1 ) 112 - 122 2005
-
マルチバージョン生成によるプログラムの解析防止 Reviewed
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto
ソフトウェア工学の基礎XI, 日本ソフトウェア科学会FOSE2004 157 - 160 2004.11
-
ソフトウェア実行時のAPI呼び出し履歴に基づく動的バースマークの提案 Reviewed
Keiji Okamoto, Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto
ソフトウェア工学の基礎XI, 日本ソフトウェア科学会FOSE2004 85 - 88 2004.11
-
Dynamic Software Birthmarks to Detect the Theft of Windows Applications Reviewed
Haruaki Tamada, Keiji Okamoto, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto
Proc. International Symposium on Future Software Technology 2004 (ISFST 2004) CDROM 2004.10
-
命令のカムフラージュによるソフトウェア保護方法 Reviewed
Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto
電子情報通信学会論文誌A J87-A ( 6 ) 755 - 767 2004.6
-
Design and evaluation of birthmarks for detecting theft of Java programs Reviewed
Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto
Proc. IASTED International Conference on Software Engineering (IASTED SE 2004) 569 - 575 2004.2
-
Effort estimation based on Collaborative Filtering Reviewed
N Ohsugi, M Tsunoda, A Monden, K Matsumoto
PRODUCT FOCUSED SOFTWARE PROCESS IMPROVEMENT 3009 274 - 286 2004
-
Exploiting self-modification mechanism for program protection Reviewed
Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto
Proc. 27th Computer Software and Applications Conference (compsac2003) 170 - 179 2003.11