Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Yuki Unno"'
Publikováno v:
2023 IEEE 20th Consumer Communications & Networking Conference (CCNC).
Publikováno v:
Journal of Information Processing. 29:559-571
Autor:
Satoru Koda, Takanori Oikawa, Kazuyoshi Furukawa, Masahiko Murakami, Yuki Unno, Yusuke Kambara
Publikováno v:
COMPSAC
This paper presents an anomalous IP address detection algorithm for network traffic logs. It is based on word embedding techniques derived from natural language processing to extract the representative features of IP addresses. However, the features
Publikováno v:
Advances in Networked-based Information Systems ISBN: 9783030290283
NBiS
NBiS
WannaCry is a ransomware that cannot only encrypt the victim’s data but propagate laterally in the victim’s local network. We present the results of analysis of some samples of WannaCry and actual propagation behavior of WannaCry in intranet envi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fbecb2d8d47e29432466e7847e819d4e
https://doi.org/10.1007/978-3-030-29029-0_54
https://doi.org/10.1007/978-3-030-29029-0_54
Autor:
Masahiko Takenaka, Kazuyoshi Furukawa, Yuki Unno, Masanobu Morinaga, Tetsuya Izu, Takanori Oikawa
Publikováno v:
Advances in Network-Based Information Systems ISBN: 9783319655208
NBiS
NBiS
This paper introduces the high-speed forensics technology that promptly analyzes the damage after the targeted cyber attack had been detected and visualizes the whole picture of the attack by binding the communication packets and users’ logs.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ecd7c55b42282ef15cb82b36973c3e27
https://doi.org/10.1007/978-3-319-65521-5_85
https://doi.org/10.1007/978-3-319-65521-5_85
Publikováno v:
Journal of Advances in Computer Networks. 2:279-286
Publikováno v:
Journal of Japan Society of Civil Engineers, Ser. B1 (Hydraulic Engineering). 74:I_373-I_378
Publikováno v:
ICITST
The detection of APT has recently become an urgent problem needing to be resolved. Attackers use Remote Access Trojan/Remote Administration Tools (RATs), which often bypass general security measures, and the traditional detection techniques don't con
Publikováno v:
IM
In recent years, there exists stealthy brute force attacks that can avoid the security rules and detection by IPS (Intrusion Prevention System) and IDS (Intrusion Detection System). Attackers tend to arrange innumerable hosts and allocate them fewer
Publikováno v:
2015 10th International Conference for Internet Technology & Secured Transactions (ICITST); 1/1/2015, p320-320, 1p