Search Results - "Hanaoka, Miyuki"

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    The role of unfolded protein response in differentiation of mammary epithelial cells by Tsuchiya, Megumi, Koizumi, Yumiko, Hayashi, Satoko, Hanaoka, Miyuki, Tokutake, Yukako, Yonekura, Shinichi

    “…The accumulation of misfolded proteins in the ER provokes ER stress by increasing the demand for energy, chaperones, and other proteins that are needed to fold…”
    Get full text
    Journal Article
  2. 2

    Treatment With Anti‐γ‐Glutamyl Transpeptidase Antibody Attenuates Osteolysis in Collagen‐Induced Arthritis Mice by Ishizuka, Yasuyuki, Moriwaki, Sawako, Kawahara‐Hanaoka, Miyuki, Uemura, Yasunori, Serizawa, Isao, Miyauchi, Mutsumi, Shibata, Shunichi, Kanaya, Toshimichi, Takata, Takashi, Taniguchi, Naoyuki, Niida, Shumpei

    Published in Journal of bone and mineral research (01-12-2007)
    “…The effectiveness of a new antibody treatment on arthritis‐associated osteolysis was studied by using CIA mice. GGT, a newly identified bone‐resorbing factor,…”
    Get full text
    Journal Article
  3. 3

    Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection by Kosuga, Yuji, Kono, Kenji, Hanaoka, Miyuki, Hishiyama, Miho, Takahama, Yu

    “…With the recent rapid increase in interactive Web applications that employ back-end database services, an SQL injection attack has become one of the most…”
    Get full text
    Conference Proceeding
  4. 4

    AspFuzz: A state-aware protocol fuzzer based on application-layer protocols by Kitagawa, T, Hanaoka, M, Kono, K

    “…In the face of constant malicious attacks to network-connected software systems, software vulnerabilities need to be discovered early in the development phase…”
    Get full text
    Conference Proceeding
  5. 5

    FlexBox: Sandboxing internet servers based on layer-7 contexts by Tanoue, A., Shimamura, M., Hanaoka, M., Kono, K.

    “…Internet servers are constantly exposed to malicious attacks launched remotely. Sandbox is a promising approach to reducing the damage caused by malicious…”
    Get full text
    Conference Proceeding
  6. 6

    An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection/Prevention Systems by Hanaoka, M., Kono, K., Shimamura, M., Yamaguchi, S.

    “…Exploiting layer/ context is an effective approach to improving the accuracy of detecting malicious messages in network intrusion detection/prevention systems…”
    Get full text
    Conference Proceeding
  7. 7

    Performance Improvement by Means of Collaboration between Network Intrusion Detection Systems by Hanaoka, M., Kono, K., Hirotsu, T.

    “…Because of today's increased traffic volume and sophisticated attacks, implementing a network intrusion detection/prevention system (NIDS/NIPS) with a single…”
    Get full text
    Conference Proceeding