Managing High Volume Data for Network Attack Detection Using Real-Time Flow Filtering
Ghosh, A., Gottlieb, Y. M., Naidu, A., Vashist, A., Poylisher, A., Kubota, A., Sawaya, Y., Yamada, A.
Published in China communications (01.03.2013)
Published in China communications (01.03.2013)
Get full text
Journal Article
Classification of Landing and Distribution Domains Using Whois' Text Mining
Tran Phuong Thao, Yamada, Akira, Murakami, Kosuke, Urakawa, Jumpei, Sawaya, Yukiko, Kubota, Ayumu
Published in 2017 IEEE Trustcom/BigDataSE/ICESS (01.08.2017)
Published in 2017 IEEE Trustcom/BigDataSE/ICESS (01.08.2017)
Get full text
Conference Proceeding
Designing Personalized OS Update Message based on Security Behavior Stage Model
Sano, Ayane, Sawaya, Yukiko, Yamada, Akira, Kubota, Ayumu, Isohara, Takamasa
Published in 2021 18th International Conference on Privacy, Security and Trust (PST) (13.12.2021)
Published in 2021 18th International Conference on Privacy, Security and Trust (PST) (13.12.2021)
Get full text
Conference Proceeding
网络攻击检测中基于RTFF的大容量数据管理
Abhrajit Ghosh, Yitzchak M.Gottlieb, Aditya Naidu, Akshay Vashist, Alexander Poylisher, Ayumu Kubota, Yukiko Sawaya, Akira Yamada
Published in 中国通信 (2013)
Get full text
Published in 中国通信 (2013)
Journal Article
Heat Element of Magnetic Hyperthermia in Mouse Melanoma Model
Maruyama, T., Sawaya, Y., Sato, F., Matsuki, H., Aiba, S., Ito, Y., Sato, T.
Published in IEEE transactions on magnetics (01.10.2006)
Published in IEEE transactions on magnetics (01.10.2006)
Get full text
Journal Article
Conference Proceeding
Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition
Thao, Tran Phuong, Sawaya, Yukiko, Nguyen-Son, Hoang-Quoc, Yamada, Akira, Kubota, Ayumu, Van Sang, Tran, Yamaguchi, Rie Shigetomi
Year of Publication 23.04.2019
Year of Publication 23.04.2019
Get full text
Journal Article
Examination of the exciting condition for the high-temperature magnetic hyperthermia
Sawaya, Y., Suzuki, N., Sato, F., Matsuki, H., Aiba, S., Sato, T.
Published in IEEE transactions on magnetics (01.10.2005)
Published in IEEE transactions on magnetics (01.10.2005)
Get full text
Journal Article
Conference Proceeding
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics
Sawaya, Y., Kubota, A., Miyake, Y.
Published in 2011 IEEE/IPSJ International Symposium on Applications and the Internet (01.07.2011)
Published in 2011 IEEE/IPSJ International Symposium on Applications and the Internet (01.07.2011)
Get full text
Conference Proceeding
System and method for creating BGP route-based network traffic profiles to detect spoofed traffic
GHOSH ABHRAJIT, VAIDYANATHAN RAVICHANDER, YAMADA AKIRA, SAWAYA YUKIKO, KUBOTA AYUMU
Year of Publication 20.01.2015
Get full text
Year of Publication 20.01.2015
Patent
On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic
Vaidyanathan, R., Ghosh, A., Sawaya, Y., Kubota, A.
Published in 2012 International Conference on Computing, Networking and Communications (ICNC) (01.01.2012)
Published in 2012 International Conference on Computing, Networking and Communications (ICNC) (01.01.2012)
Get full text
Conference Proceeding
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
GHOSH ABHRAJIT, YAMADA AKIRA, VASHIST AKSHAY, CHADHA RITU, SAWAYA YUKIKO, POYLISHER ALEXANDER, KUBOTA AYUMU
Year of Publication 05.07.2016
Get full text
Year of Publication 05.07.2016
Patent
CREATING BGP ROUTE-BASED NETWORK TRAFFIC PROFILES
GHOSH, ABHRAJIT, SAWAYA, YUKIKO, VAIDYANATHAN, RAVICHANDER, YAMADA, AKIRA, KUBOTA, AYUMU
Year of Publication 03.04.2014
Get full text
Year of Publication 03.04.2014
Patent
SYSTEM AND METHOD FOR SPAMMER HOST DETECTION FROM NETWORK FLOW DATA PROFILES
GHOSH, ABHRAJIT, SAWAYA, YUKIKO, GOTTLIEB, YITZCHAK, M, KUBOTA, AYUMU, VASHIST, AKSHAY
Year of Publication 23.03.2016
Get full text
Year of Publication 23.03.2016
Patent