Hybrid Cloud and Security Research Group - Papers and Publications
Academic Papers and Publications
2022
- Application Integrity Protection on Kubernetes cluster based on Manifest Signature Verification
Ruriko Kudo, Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe
Journal of Information Processing, 2022, Volume 30, Pages 626-635
( IPSJ 論文誌「量子時代をみすえたコンピュータセキュリティ技術」特集 ) -
Enabling Kubernetes Resource Integrity Protection with Policy
(ポリシーによる Kubernetes リソースのインテグリティ保護 の実現)
Ruriko Kudo, Hirokuni Kitahara, Yuji Watanabe
Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO 2022)
2021
-
Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe
Special issue of "Computer Security Technologies for Realizing Society 5.0"
( IPSJ 論文誌「Society 5.0を実現するコンピュータセキュリティ技術」特集 ) - Integrity Protection for Kubernetes Resource Based on Digital Signature
Ruriko Kudo, Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe
IEEE International Conference on Cloud Computing (IEEE CLOUD 2021) - Konveyor Move2Kube: Automated Replatforming of Applications to Kubernetes
Padmanabha V. Seshadri, Harikrishnan Balagopal, Pablo Loyola, Akash Nayak, Chander Govindarajan, Mudit Verma, Ashok Pon Kumar, Amith Singhee
IEEE International Conference on Cloud Computing (IEEE CLOUD 2021) -
Integrity Protection for Kubernetes Resource based on Manifest Signature Verification
(マニフェスト署名検証に基づくKubernetesリソースのインテグリティ保護 )
Ruriko Kudo, Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe
Computer Security Symposium (CSS 2021)
2020
-
Automating Domain Squatting Detection Using Representation Learning
Pablo Loyola, Kugamoorthy Gajananan, Hirokuni Kitahara, Yuji Watanabe, Fumiko Satoh
IEEE International Conference on Big Data (IEEE Big Data 2020) -
Highly-Scalable Container Integrity Monitoring for Large-Scale Kubernetes Cluster
Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe
IEEE International Conference on Big Data (IEEE Big Data 2020) -
Multi-factor-based Motion Detection for Server Rack Doors Left Open
Ruriko Kudo, Yasuharu Katsuno, Fumiko Satoh
IEEE International Conference on Services Computing (SCC 2020), pp. 457-459. - Blackbox Mutation Detection for Runtime Application Integrity on Kubernetes Cluster
(アプリケーションインテグリティのための Kubernetes クラスタにおけるブ ラックボックス型変更検出)
Hirokuni Kitahara, Yuji Watanabe
Symposium on Cryptography and Information Security (SCIS 2020)
2019
- Towards Federated Graph Learning for Collaborative Financial Crimes Detection
Toyotaro Suzumura, Yi Zhou, Natahalie Baracaldo, Guangnan Ye, Keith Houck, Ryo Kawahara, Ali Anwar, Lucia Larise Stavarache, Yuji Watanabe, Pablo Loyola, Daniel Klyashtorny, Heiko Ludwig, Kumar Bhaskaran
arXiv e-prints, arXiv:1909.12946 - An Edit-centric Approach for Wikipedia Article Quality Assessment
Edison Marrese-Taylor, Pablo Loyola, Yutaka Matsuo
Proceedings of the 5th Workshop on Noisy User-generated Text (W-NUT 2019), pp. 381-386.
2018
- Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning
Pablo Loyola, Kugamoorthy Gajananan, Yuji Watanabe, Fumiko Satoh
Proceedings of The 12th International Workshop on Semantic Evaluation, pp. 885-889. - Modeling Sentiment Polarity in Support Ticket Data for Predicting Cloud Service Subscription Renewal
Kugmoorthy Gajananan, Pablo Loyola, Yasuharu Katsuno, Asim Munawar, Trent Scott, Fumiko Satoh
IEEE International Conference on Services Computing (SCC 2018), pp. 49-56. [Best Paper Award] - Bug Localization by Learning to Rank and Represent Bug Inducing Changes
Pablo Loyola, Kugmoorthy Gajananan, Fumiko Satoh
International Conference on Information and Knowledge Management (CIKM), pp. 657-665. - A Unified Framework for Specifying Cost Models of IT Service Offerings
Kugamoorthy Gajananan, Aly Megahed, Shubhi Asthana and Taiga Nakamura
INFORMS International Conference Service Science (CSS), pp. 151-160. - Generative Model of Combosquatting Domain Names and Evaluation
(Combosquattingドメインネームの生成モデルとその評価)
Hirokuni Kitahara, Yuji Watanabe
Computer Security Symposium (CSS 2018) - ChatBot System for Vulnerability Detecting using Environmental Metrics
(環境情報を用いた脆弱性検出のチャットボット)
Alisa Arno, Ai Ishida, Ruriko Kudo, Yuji Watanabe
Computer Security Symposium (CSS 2018)
2017
- Leveraging the Serverless Architecture for Securing Linux Containers
Nilton Bila, Paolo Dettori, Ali Kanso, Yuji Watanabe, Alaa Youssef
IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 401-404. - A Method for Estimating Annual Cost Reduction of IT Service Deals
Kugamoorthy Gajananan, Aly Megahed, Shubhi Asthana, Valeria Becker, Taiga Nakamura, Mark Smith
IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), pp. 45-50. - A Method for Selecting Peer Deals in IT Service Contracts
Aly Megahed, Shubhi Asthana, Valeria Becker, Taiga Nakamura, Kugamoorthy Gajananan
IEEE International Conference on Artificial Intelligence and Mobile Services (AIMS), pp. 1-7. - A Cognitive Prioritization for Reports Generated in Resource Constrained Applications
Shubhi Asthana, Aly Megahed, Valeria Becker, Taiga Nakamura, Kugamoorthy Gajananan
IEEE International Conference on Services Computing (SCC), pp. 418-425. - Edge-side Security Event Management for Plug-and-Play IoT
Fumiko Satoh, Takuya Mishina, Naoto Sato, Yoichi Hatsutori
Symposium on Cryptography and Information Security (SCIS 2017) - クラウド上での安全なコンテナー活用にむけたセキュリティ分析の自動化
Yuji Watanabe, Ai Ishida
Symposium on Cryptography and Information Security (SCIS 2017)
2016
- Vibration-base Key Exchange among Multiple Smart Devices on the Desk
Alisa Arno, Kentaroh Toyoda, Yuji Watanabe, Iwao Sasase, P. Takis Mathiopoulos
Image Processing and Communications 21(2), 33-42. - Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud
Katsuno Yasuharu, Kundu Ashish, Das Koushik K, Takahashi Hitomi, Schloss Robert, Dey Prasenjit, Mohania Mukesh
IEEE 9th International Conference on Cloud Computing (CLOUD), pp. 359-366. - Optimizing Schedule for Parallel Software Deployments Based on Profiles of Network Activity and Installation Time in Cloud Environments
Hitomi Takahashi, Yasuharu Katsuno
IEEE 9th International Conference on Cloud Computing (CLOUD), pp. 742-749. - Top-Down Pricing of IT Services Deals with Recommendation for Missing Values of Historical and Market Data
Aly Megahed, Kugamoorthy Gajananan, Shubhi Asthana, Valeria Becker, Mark Smith, Taiga Nakamura
International Conference on Service-Oriented Computing, pp. 745-760. - A Top-Down Pricing Algorithm for IT Service Contracts Using Lower Level Service Data
Kugamoorthy Gajananan, Aly Megahed, Mari Abe, Taiga Nakamura, Mark Smith
IEEE International Conference on Services Computing (SCC), pp. 720-727. -
Threat Scenario Analysis of a SIEM System for IoT Devices
(IoT向けSIEMシステム設計のための脅威シナリオ検討)
Takuya Mishina, Kouichi Ono, Seiji Muntetoh, Naoto Sato, Yoichi Hatsutori, Fumiko Satoh
第73回CSEC研究発表会 -
Automated Vulnerability Evaluation System for Containers on Cloud
(クラウド上のコンテナサービスに対する パッケージ脆弱性自動評価システム)
Ai Ishida, Yuji Watanabe
Computer Security Symposium (CSS)
* Please refer the papers before 2015 in member's page.