Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Takeshi Yada"'
Publikováno v:
Medicine. 100(50)
Age-related narrowing of the visual field is observed in the elderly, which leads to reduced cognitive and psychomotor functions. The aim of the present cross-sectional study was to determine the influence of aging on the visual field for color visio
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots
Publikováno v:
Computers & Security. 69:155-173
Today, websites are exposed to various threats that exploit their vulnerabilities. A compromised website will be used as a stepping-stone and will serve attackers' evil purposes. For instance, URL redirection mechanisms have been widely used as a mea
Publikováno v:
IEICE Transactions on Information and Systems. :1714-1728
Publikováno v:
COMPSAC (1)
To expose more users to threats of drive-by download attacks, attackers compromise vulnerable websites discovered by search engines and redirect clients to malicious websites created with exploit kits. Security researchers and vendors have tried to p
Publikováno v:
COMPSAC (1)
Domain names and domain name system (DNS) have been used and abused for over 30 years since the 1980s. Although legitimate Internet users rely on domain names as their indispensable infrastructures for using the Internet, attackers use or abuse them
Publikováno v:
Research in Attacks, Intrusions, and Defenses ISBN: 9783319663319
RAID
RAID
Understanding how application programming interfaces (APIs) are used in a program plays an important role in malware analysis. This, however, has resulted in an endless battle between malware authors and malware analysts around the development of API
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b68faa5d0c5fe017b0b03bca933ca706
https://doi.org/10.1007/978-3-319-66332-6_10
https://doi.org/10.1007/978-3-319-66332-6_10
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319596075
SecureComm
SecureComm
Compromised websites that redirect users to malicious websites are often used by attackers to distribute malware. These attackers compromise popular websites and integrate them into a drive-by download attack scheme to lure unsuspecting users to mali
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::184ce4a5aba42cc15266e0dc2bdeb298
https://doi.org/10.1007/978-3-319-59608-2_25
https://doi.org/10.1007/978-3-319-59608-2_25
Publikováno v:
ACM Conference on Computer and Communications Security
Return-oriented programming (ROP) has been crucial for attackers to evade the security mechanisms of operating systems. It is currently used in malicious documents that exploit viewer applications and cause malware infection. For inspecting a large n
Autor:
Daiki Chiba, Takeshi Yagi, Tatsuya Mori, Takeshi Yada, Shigeki Goto, Mitsuaki Akiyama, Toshiki Shibahara
Publikováno v:
DSN
Cyber attackers abuse the domain name system (DNS) to mystify their attack ecosystems, they systematically generate a huge volume of distinct domain names to make it infeasible for blacklisting approaches to keep up with newly generated malicious dom
Publikováno v:
Radiation Measurements. 47:890-893
Radiation-induced free radicals in hydrated magnesium sulfate, which are thought to be present on the surface of Europa, one of the Jovian moons, have been studied by electron spin resonance (ESR). ESR signals of both atomic hydrogen (H·) at g = 2.0