Search Results - "Unno, Yuki"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    An Unsupervised Detection Approach for Location Attacks in Satellite-Based Navigation Data by Messous, Mohamed Ayoub, Ferreyra, Emmanuel, Ikwu, Eneyi Ruth, Unno, Yuki, Kojima, Hisashi

    “…Autonomous vehicles rely on environmental data from their in-built sensors. One critical piece of information is localization data from GPS signals…”
    Get full text
    Conference Proceeding
  2. 2

    Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding by Koda, Satoru, Kambara, Yusuke, Oikawa, Takanori, Furukawa, Kazuyoshi, Unno, Yuki, Murakami, Masahiko

    “…This paper presents an anomalous IP address detection algorithm for network traffic logs. It is based on word embedding techniques derived from natural…”
    Get full text
    Conference Proceeding
  3. 3

    RAT-based malicious activities detection on enterprise internal networks by Yamada, Masahiro, Morinaga, Masanobu, Unno, Yuki, Torii, Satoru, Takenaka, Masahiko

    “…The detection of APT has recently become an urgent problem needing to be resolved. Attackers use Remote Access Trojan/Remote Administration Tools (RATs), which…”
    Get full text
    Conference Proceeding
  4. 4

    TOPASE: Detection of brute force attacks used disciplined IPs from IDS log by Honda, Satomi, Unno, Yuki, Maruhashi, Koji, Takenaka, Masahiko, Torii, Satoru

    “…In recent years, there exists stealthy brute force attacks that can avoid the security rules and detection by IPS (Intrusion Prevention System) and IDS…”
    Get full text
    Conference Proceeding