Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Yukiko Sawaya"'
Publikováno v:
Conference on Information Technology for Social Good.
Publikováno v:
2021 18th International Conference on Privacy, Security and Trust (PST).
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030750749
AINA (2)
AINA (2)
To protect computers from various types of cyberattack, users are required to learn appropriate security behaviors. Different persuasion techniques to encourage users to take security behaviors are required according to user attitude toward security.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2327268b90151c50c5fdea2443b24774
https://doi.org/10.1007/978-3-030-75075-6_45
https://doi.org/10.1007/978-3-030-75075-6_45
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783030410247
SECITC
SECITC
With the development of the Internet, web content is exponentially increasing. Along with this, web-based attacks such as drive-by download attacks and phishing have grown year on year. To prevent such attacks, URL blacklists are widely used. However
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c64a4336d7f19b313de3be314bdf5780
https://doi.org/10.1007/978-3-030-41025-4_5
https://doi.org/10.1007/978-3-030-41025-4_5
Autor:
Ayumu Kubota, Rie Shigetomi Yamaguchi, Hoang-Quoc Nguyen-Son, Akira Yamada, Tran Van Sang, Tran Phuong Thao, Yukiko Sawaya
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030578770
ACNS (2)
ACNS (2)
Homograph attack is a way that attackers deceive victims about which website domain name they are communicating with by exploiting the fact that many characters look alike. The attack becomes serious and is raising broad attention when recently many
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c96b78e8b2bd549da542b992d0f644be
https://doi.org/10.1007/978-3-030-57878-7_20
https://doi.org/10.1007/978-3-030-57878-7_20
Autor:
Hoang-Quoc Nguyen-Son, Yukiko Sawaya, Kazumasa Omote, Ayumu Kubota, Tran Phuong Thao, Akira Yamada
Publikováno v:
ICT Systems Security and Privacy Protection ISBN: 9783030223113
SEC
SEC
Visual homograph attack is a way that the attackers deceive victims about what domain they are communicating with by exploiting the fact that many characters look alike. The attack is growing into a serious problem and raising broad attention in real
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::92222d953422f49570c6e550c5fc82ce
https://doi.org/10.1007/978-3-030-22312-0_1
https://doi.org/10.1007/978-3-030-22312-0_1
Publikováno v:
TrustCom/BigDataSE/ICESS
Detection of drive-by-download attack has gained a focus in security research since the attack has turned into the most popular and serious threat to web infrastructure. The attack exploits vulnerabilities in web browsers and their extensions for unn
Publikováno v:
CHI
Computer security tools usually provide universal solutions without taking user characteristics (origin, income level, ...) into account. In this paper, we test the validity of using such universal security defenses, with a particular focus on cultur
Autor:
Yitzchak M. Gottlieb, Aditya Naidu, Yukiko Sawaya, Ayumu Kubota, Abhrajit Ghosh, A. Yamada, Akshay Vashist, Alexander Poylisher
Publikováno v:
China Communications. 10:56-66
In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to high volume data feeds that are com
Autor:
Fumihiro Sato, Hidetoshi Matsuki, Yukiko Sawaya, Tadakuni Sato, S. Aiba, Takeshi Maruyama, Yumiko Ito
Publikováno v:
Thermal Medicine. 22:159-165