国際会議
[1] Hideaki Hata, Mingyu Guo, and Ali Babar, "Understanding the Heterogeneity of Contributors in Bug Bounty Programs," In Proc. of 11th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2017), pages 223-228 November 2017.
[2] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi Matsumoto, "Introducing Dynamic Name Resolution Mechanism for Obfuscating System-Defined Names in Programs," In Proc. of the IASTED International Conference on Software Engineering (IASTED SE 2008), pages 125--130 February 2008.
[3] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi Matsumoto, "Design and Evaluation of Birthmarks for Detecting Theft of Java Programs," In Proc. IASTED International Conference on Software Engineering (IASTED SE 2004), pages 569--575 February 2004.
[4] Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Katsuro Inoue, and Koji Torii, "A Practical Method for Watermarking Java Programs," In The 24th Computer Software and Applications Conference (compsac2000), pages 191--197 October 2000.
[5] Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Katsuro Inoue, and Koji Torii, "Watermarking Java Programs," In Proc. International Symposium on Future Software Technology'99 (ISFST'99), pages 119--124 October 1999.
テクニカルレポート
[1] Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi Matsumoto, "Detecting the Theft of Programs Using Birthmarks," Information Science Technical Report, number NAIST-IS-TR2003014, Graduate School of Information Science, November 2003.