{"id":6463,"date":"2018-09-26T22:32:51","date_gmt":"2018-09-26T22:32:51","guid":{"rendered":"https:\/\/msecproject.eu\/?page_id=6463"},"modified":"2021-10-21T15:24:16","modified_gmt":"2021-10-21T15:24:16","slug":"scientific-papers","status":"publish","type":"page","link":"https:\/\/msecproject.eu\/ja\/scientific-papers\/","title":{"rendered":"\u00e7\u00a7\u2018\u00e5\u00ad\u00a6\u00e6\u0192\u2026\u00e5\u00a0\u00b1\u00e8\u00aa\u0152"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<h3><strong>Access below. More scientific publications and details on scientific conferences coming soon.<\/strong><\/h3>\n<p>[\/vc_column_text][g5plus_space desktop=&#8221;90&#8243; tablet=&#8221;70&#8243; tablet_portrait=&#8221;60&#8243; mobile_landscape=&#8221;50&#8243; mobile=&#8221;40&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_tta_accordion][vc_tta_section title=&#8221;Identifying safety properties guaranteed in changed environment at runtime&#8220;&#8221; tab_id=&#8221;1568043814609-6dc2d392-8479&#8243;][vc_column_text]<strong>Aizawa, K. Tei and S. Honiden, <a href=\"https:\/\/ieeexplore.ieee.org\/document\/8460083\">&#8220;Identifying safety properties guaranteed in changed environment at runtime&#8221;<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">2018 IEEE International Conference on Agents (ICA), Singapore, 2018, pp. 75-80, doi: <\/span><span style=\"font-weight: 400;\">(28\/31-07-2018)<\/span><\/p>\n<p>September 2018[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Cleaning up the mess: from monitoring to discovery and notification of infected\/insecure IoT devices&#8221; tab_id=&#8221;1634826849694-395b77f3-b1e7&#8243;][vc_column_text]<strong>Katsunari Yoshioka <a href=\"https:\/\/project.inria.fr\/FranceJapanICST\/files\/2019\/04\/yoshioka-france-japan-20190424-toshare.pdf\">&#8220;Cleaning up the mess: from monitoring to discovery and notification of infected\/insecure IoT devices&#8221;<\/a>. <\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Keynote speach. 5th France-Japan Cybersecurity Workshop.<\/span><\/p>\n<p>April 24, 2019[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Modelling and Analysing Resilient Cyber-Physical Systems&#8221; tab_id=&#8221;1568043814610-f14afc81-a39c&#8221;][vc_column_text]<strong>Amel Bennaceur et al., &#8220;<a href=\"https:\/\/doi.org\/10.1109\/SEAMS.2019.00018\">Modelling and Analysing Resilient Cyber-Physical Systems<\/a>&#8221; <\/strong><\/p>\n<p><span style=\"font-weight: 400;\">2019 IEEE\/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), Montreal, QC, Canada, 2019, pp. 70-76.<\/span><\/p>\n<p>May 25, 2019[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;A Runtime Monitoring Framework to Enforce Invariants on Reinforcement Learning Agents Exploring Complex Environments&#8221; tab_id=&#8221;1568046730262-16d0eaae-1262&#8243;][vc_column_text]<span style=\"font-weight: 400;\"><strong>P. Mallozzi, E. Castellano, P. Pelliccione, G. Schneider and K. Tei, &#8220;<a href=\"http:\/\/10.1109\/RoSE.2019.00011\">A Runtime Monitoring Framework to Enforce Invariants on Reinforcement Learning Agents Exploring Complex Environments<\/a>,&#8221;<\/strong> <\/span><\/p>\n<p><span style=\"font-weight: 400;\">2019 IEEE\/ACM 2nd International Workshop on Robotics Software Engineering (RoSE), Montreal, QC, Canada, 2019, pp. 5-12.<\/span><\/p>\n<p>May 27, 2019<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Landscape of IoT Patterns&#8221; tab_id=&#8221;1568049696502-d80eb720-1edd&#8221;][vc_column_text]<span style=\"font-weight: 400;\"><strong>H. Washizaki et al., &#8220;<a href=\"http:\/\/10.1109\/SERP4IoT.2019.00017\">Landscape of IoT Patterns<\/a>&#8220;<\/strong> <\/span><\/p>\n<p><span style=\"font-weight: 400;\">2019 IEEE\/ACM 1st International Workshop on Software Engineering Research &amp; Practices for the Internet of Things (SERP4IoT), Montreal, QC, Canada, 2019, pp. 57-60, <\/span><\/p>\n<p>May 27, 2019[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Analysis space reduction with state merging for ensuring safety properties of self-adaptive systems&#8221; tab_id=&#8221;1568049699537-a21488c7-1c64&#8243;][vc_column_text]<strong>Kazuya Aizawa, Kenji Tei and Shinichi Honiden<\/strong>, <a href=\"http:\/\/www.smart-world.org\/2019\/atc\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\"><strong>Analysis space reduction with state merging for ensuring safety properties of self-adaptive systems<\/strong><\/span><\/a><\/p>\n<p>The 16th IEEE International Conference on Advanced &amp; Trusted Computing (ATC 2019)<\/p>\n<p>August 2019[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Situation-Aware Emotion Regulation of Conversational Agents with Kinetic Earables&#8221; tab_id=&#8221;1601541390058-16c87d8a-e483&#8243;][vc_column_text]<strong>Shin Katayama,<\/strong><span style=\"color: #0000ff;\"> <a class=\"external-link\" style=\"color: #0000ff;\" href=\"https:\/\/www.computer.org\/csdl\/proceedings-article\/acii\/2019\/08925449\/1fHGFcb5YZ2\" rel=\"nofollow\">\u00e2\u20ac\u0153Situation-Aware<\/a><\/span><strong><span style=\"color: #0000ff;\"><a class=\"external-link\" style=\"color: #0000ff;\" href=\"https:\/\/www.computer.org\/csdl\/proceedings-article\/acii\/2019\/08925449\/1fHGFcb5YZ2\" rel=\"nofollow\"> Emotion Regulation of Conversational Agents with Kinetic <\/a><a class=\"external-link\" style=\"color: #0000ff;\" href=\"https:\/\/www.computer.org\/csdl\/proceedings-article\/acii\/2019\/08925449\/1fHGFcb5YZ2\" rel=\"nofollow\">Earables<\/a><a class=\"external-link\" style=\"color: #0000ff;\" href=\"https:\/\/www.computer.org\/csdl\/proceedings-article\/acii\/2019\/08925449\/1fHGFcb5YZ2\" rel=\"nofollow\">\u00e2\u20ac\u009d<\/a><\/span><\/strong><\/p>\n<p>8th International Conference on Affective Computing and Intelligent Interaction (ACII), Cambridge, United Kingdom<\/p>\n<p>September 2019<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Minimising Makespan of Discrete Controllers: A Qualitative Approach&#8221; tab_id=&#8221;1601541692549-2c02b594-3b47&#8243;][vc_column_text]<strong>Castellano, E., Braberman, V., D&#8217;Ippolito, N., Uchitel, S., &amp; Tei, K. (2019). <a href=\"https:\/\/doi.org\/10.1109\/CDC40024.2019.9029766\"><strong>&#8220;Minimising Makespan of Discrete Controllers: A Qualitative Approach&#8221;.<\/strong> <\/a><\/strong><\/p>\n<p>In 2019 IEEE 58th Conference on Decision and Control<em>, CDC 2019 <\/em>(pp. 1068-1075), Institute of Electrical and Electronics Engineers Inc.<\/p>\n<p>December 2019[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;SmileCityReport: Emotion-aware Participatory Sensing for Smart Cities with Double-sided Photo Shooting&#8221; tab_id=&#8221;1601542125458-9a361f77-c3d8&#8243;][vc_column_text]<strong>Wataru Sasaki, Yusaku Eigen, Arturo Medela, Antonis Litke, Venessa Clemente Nunez, Tadashi Okoshi, Jin Nakazawa, <a href=\"https:\/\/doi.org\/10.1109\/PerComWorkshops48775.2020.9156159\">\u00e2\u20ac\u0153SmileCityReport: Emotion-aware Participatory Sensing for Smart Cities with Double-sided Photo Shooting<\/a><\/strong><\/p>\n<p>2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Online, virtual conference<\/p>\n<p>March 2020[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;QuietPlace: An Ultrasound-Based Proof of Location Protocol with Strong Identities&#8221; tab_id=&#8221;1601541977173-3ab35f89-ee2e&#8221;][vc_column_text]<strong>Kounas, D., Voutyras, O., Palaiokrassas, G., Litke, A., &amp; Varvarigou, T. (2020).<a href=\"https:\/\/doi.org\/10.3390\/asi3020019\"> QuietPlace: An Ultrasound-Based Proof of Location Protocol with Strong Identities<\/a><\/strong><\/p>\n<p>Applied System Innovation, 3(2), 19<\/p>\n<p>April 7, 2020[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;A Graph Model Based Blockchain Implementation for Increasing Performance and Security in Decentralized Ledger Systems&#8221; tab_id=&#8221;1601542081106-4b2f413e-15a6&#8243;][vc_column_text]<strong>Tsoulias K., Palaiokrassas G., Fragkos G., Litke A., Varvarigou T. (2020), <\/strong><strong><a href=\"https:\/\/doi.org\/10.1109\/ACCESS.2020.3006383\">A Graph Model Based Blockchain Implementation for Increasing Performance and Security in Decentralized Ledger Systems<\/a><\/strong><\/p>\n<p>IEEE Access, Volume 8<\/p>\n<p>July 1, 2020[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;ThingGate: A Gateway for Managing Traffic of Bare-metal IoT Honeypot&#8221; tab_id=&#8221;1601541885588-022dfe93-5e4a&#8221;][vc_column_text]<strong>Chun-Jung Wu1,Katsunari Yoshioka and Tsutomu Matsumoto.<a href=\"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/28\/0\/28_481\/_pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> &#8220;ThingGate: A Gateway for Managing Traffic of Bare-metal IoT Honeypot&#8221;<\/a><\/strong><\/p>\n<p>Journal of Information Processing Vol.28 481&#8217;492<\/p>\n<p>September, 2020[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Method of Applying Df-pn Algorithm to On-the-fly Controller Synthesis&#8221; tab_id=&#8221;1634828411644-d4c34b91-e5ef&#8221;][vc_column_text]<strong>K. Kuwana, K. Tei, Y. Fukazawa and S. Honiden, <a href=\"http:\/\/10.1109\/AIKE48582.2020.00033\">&#8220;Method of Applying Df-pn Algorithm to On-the-fly Controller Synthesis,&#8221; <\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), 2020, pp. 168-173,<\/span><\/p>\n<p>December 2020[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Identifying achievable goals for adaptive replanning against runtime environment change&#8221; tab_id=&#8221;1634828662296-7657df86-c203&#8243;][vc_column_text]<strong>Jialong Li, Kenji Tei and Shinichi Honiden, <a href=\"https:\/\/link.springer.com\/chapter\/10.1007%2F978-3-030-71187-0_87\">\u00e2\u20ac\u0153Identifying achievable goals for adaptive replanning against runtime environment change\u00e2\u20ac\u009d<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The 20th International Conference on Intelligent Systems Design and Applications (ISDA), <\/span><\/p>\n<p>December 2020[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Efficient Difference Analysis Algorithm for Runtime Requirement Degradation under System Functional Fault&#8221; tab_id=&#8221;1634828527512-27b38648-23ae&#8221;][vc_column_text]<span style=\"font-weight: 400;\"><strong>J. Li, K. Aizawa, K. Tei and S. Honiden, <\/strong><a href=\"http:\/\/10.1109\/EUC50751.2020.00012\"><strong>&#8220;Efficient Difference Analysis Algorithm for Runtime Requirement Degradation under System Functional Fault,&#8221;<\/strong> <\/a><\/span><\/p>\n<p><span style=\"font-weight: 400;\">2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC), 2020, pp. 33-40.<\/span><\/p>\n<p>January 2021[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Research on security technology effective for smart city society and demonstration in real cities in Japan and Europe-Introduction of Japan-Europe joint research and development project M-Sec&#8221; tab_id=&#8221;1609932813444-4a731d83-946a&#8221;][vc_column_text]<strong>Keiko Dogushi and Vanessa Clemente Nunez,<a href=\"\/Users\/NadineTeles\/Downloads\/2021_01-14_Spot_SmartCitySecurity.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> &#8220;Research on security technology effective for smart city society and demonstration in real cities in Japan and Europe-Introduction of Japan-Europe joint research and development project &#8220;M-Sec&#8221;<\/a><\/strong><\/p>\n<p>Journal of the ITU Association of Japan, volume 51, n\u00ba1<\/p>\n<p>January 2021[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Self-adaptive Hydroponics Care System for Human-hydroponics Coexistence&#8221; tab_id=&#8221;1634828772275-920002a2-e5bc&#8221;][vc_column_text]<strong>Jialong Li, Zhenyu Mao, Zhen Cao, Kenji Tei, Shinichi Honiden, <a href=\"http:\/\/10.1109\/LifeTech52111.2021.9391909\">\u00e2\u20ac\u0153Self-adaptive Hydroponics Care System for Human-hydroponics Coexistence\u00e2\u20ac\u009d<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">2021 IEEE 3rd Global Conference on Life Sciences and Technologies, pp.204-206<\/span><\/p>\n<p>March 2021[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Differential Controller Synthesis at Runtime Using Changed Parts of Environment Model&#8221; tab_id=&#8221;1634828975120-59cb55de-8063&#8243;][vc_column_text]<strong>Takanori Hirano, Kenji Tei, Kazuya Aizawa and Shinichi Honiden, <a href=\"http:\/\/10.1109\/ICIEA52957.2021.9436711\">\u00e2\u20ac\u0153Differential Controller Synthesis at Runtime Using Changed Parts of Environment Model\u00e2\u20ac\u009d<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">2021 IEEE 8th International Conference on Industrial Engineering and Applications (ICIEA 2021), pp.91-100<\/span><\/p>\n<p>April 2021[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Reversing Smart Contracts with Ghidra (2021)&#8221; tab_id=&#8221;1625050635033-8eab4777-0909&#8243;][vc_column_text]<strong>A. De La Piedra Ghidra-EVM: <a href=\"https:\/\/www.blackhat.com\/asia-21\/arsenal\/schedule\/#ghidra-evm-reversing-smart-contracts-with-ghidra-22400\">Reversing Smart Contracts with Ghidra (2021)<\/a><\/strong><span style=\"font-weight: 400;\"><strong>,<\/strong> <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Black Hat Arsenal, (CEA) <\/span><\/p>\n<p><span style=\"font-weight: 400;\">May 7, 2021<\/span>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;SOXCollaborator: A Bridge System to Realize Open-Data Commerce by Collaborating with SOXFire and Blockchain Marketplace&#8221; tab_id=&#8221;1634829033892-3aafb222-5cae&#8221;][vc_column_text]<strong>Takafumi Kawasaki, Georgios Palaiokrassas, Akira Tsuge, Tadashi Okoshi, Antonis Litke, Jin Nakazawa. <a href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/ej\/?action=pages_view_main&amp;active_action=repository_view_main_item_detail&amp;item_id=212488&amp;item_no=1&amp;page_id=13&amp;block_id=8\">SOXCollaborator: A Bridge System to Realize Open-Data Commerce by Collaborating with SOXFire and B<\/a><a href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/ej\/?action=pages_view_main&amp;active_action=repository_view_main_item_detail&amp;item_id=212488&amp;item_no=1&amp;page_id=13&amp;block_id=8\">lockchain Marketplace<\/a><\/strong><span style=\"font-weight: 400;\"><strong>.<\/strong> <\/span><\/p>\n<p><span style=\"font-weight: 400;\">IPSJ &#8211; Information Processing Society of Japan. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">August 26, 2021<\/span>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device&#8221; tab_id=&#8221;1634829208460-11d00efd-1cb7&#8243;][vc_column_text]<span style=\"font-weight: 400;\"><strong>Bokhari, A., Inoue, Y., Kato, S., Yoshioka, K., and Matsumoto, T. <\/strong><a href=\"http:\/\/10.2197\/ipsjjip.29.572\"><strong>&#8220;Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device&#8221;.<\/strong> <\/a><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Journal of Information Processing, Vol.29, pp.572-580<\/span><\/p>\n<p>September 2021[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;A methodology for generating Systems Architectural Glimpse statements using the 5W1H maxim&#8221; tab_id=&#8221;1634829299244-d958356a-75c8&#8243;][vc_column_text]<strong>Orfeas Voutyras, Aamir H. Bokhari, Akira Tsuge, George Palaiokrassas, Takafumi Kawasaki, Xavier Cases Camats, Jin Nakazawa, Antonios Litke, Tadashi Okoshi, Theodora Varvarigou, <a href=\"https:\/\/www.mdpi.com\/journal\/computers\/special_issues\/edge_cloud_computing_IoT\">A methodology for generating Systems Architectural Glimpse statements using the 5W1H maxim, <\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">MDPI Computers: Edge and Cloud Computing in IoT<\/span><\/p>\n<p>September 2021[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Combining blockchains, smart contracts and complex sensors management platform for hyper-connected smart cities: an IoT data marketplace use case&#8221; tab_id=&#8221;1634829418662-fa3a32d4-fb9b&#8221;][vc_column_text]<strong>Georgios Palaiokrassas, Petros Skoufis, Orfefs Voutyras,  Takafumi Kawasaki, Mathieu Gallissot, Radhouene Azzabi, Akira Tsuge, Antonios Litke, Tadashi Okoshi, Jin Nakazawa, Theodora Varvarigou,<a href=\"https:\/\/www.mdpi.com\/journal\/computers\/special_issues\/edge_cloud_computing_IoT\"> &#8220;Combining blockchains, smart contracts and complex sensors management platform for hyper-connected smart cities: an IoT data marketplace use case&#8221;.<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">MDPI Computers: Edge and Cloud Computing in IoT<\/span><\/p>\n<p>September 2021[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;A Development Method for Safe Node-RED Systems using Discrete Controller Synthesis&#8221; tab_id=&#8221;1634829541732-00190f6d-f0fa&#8221;][vc_column_text]<strong>ICCS, KEIO, NII and YNU. \u00e2\u20ac\u0153<a href=\"http:\/\/nsclab.org\/ithings2021\/\">A Development Method for Safe Node-RED Systems using Discrete Controller Synthesis<\/a>&#8221; <\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Submitted paper to the <\/span><span style=\"font-weight: 400;\">IEEE iThings2021<\/span><\/p>\n<p>September6, 2021[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Access below. More scientific publications and details on scientific confe [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6973,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6463","page","type-page","status-publish","has-post-thumbnail","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"ja","enabled_languages":["gb","ja"],"languages":{"gb":{"title":true,"content":true,"excerpt":false},"ja":{"title":true,"content":false,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/pages\/6463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/comments?post=6463"}],"version-history":[{"count":1,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/pages\/6463\/revisions"}],"predecessor-version":[{"id":9312,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/pages\/6463\/revisions\/9312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/media\/6973"}],"wp:attachment":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/media?parent=6463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}