Project Reports
- Deliverable2.1: Community engagement report. pdf (290.4 KB)
- Deliverable2.2: Workshop 2 proceedings. pdf (28.8 MB)
- Deliverable2.3: Workshop 1 proceedings. pdf (16.4 MB)
- Deliverable3.1: Preliminary version of the Cybersecurity Research Analysis Report for the two regions.
- Quick summary of the GDPR and Japanese Privacy Act based on Report3.1: Comparative Overview of GDPR and Japanese Privacy Act . pdf (666.8 KB)
- Quick summary of the Legal and Policy Aspects: Chapter 1 takeaway of the Report3.1. pdf (368.8 KB)
- Quick summary of the Research and Innovation Aspects: Chapter 2 takeaway of the Report3.1. pdf (222.0 KB)
- Quick summary of the Industry and Standardization Aspects: Chapter 3 takeaway of the Report3.1. pdf (232.9 KB)
- Deliverable3.2: Revised version ‘Cyber-security Research Analysis Report’ for the two regions.
- Takeaway from Draft Report32 on industry aspects. pdf (263.6 KB)
- Takeaway from Draft Report32 on legal aspects. pdf (183.9 KB)
- Takeaway from Draft Report32 on research aspects. pdf (281.6 KB)
- Deliverable4.1: Description of gaps and future challenges.
pdf (1.3 MB)
- Quick summary on Cooperation Opportunities: takeaway of the Report4.1. pdf (185.3 KB)
- Deliverable4.2: Strategic research and innovation agenda. pdf (4.4 MB)
- Deliverable5.1: Website and collaboration tools.
pdf (1.4 MB)
- Dissemination handbook. pdf (113.4 KB)
- Deliverable5.3: Dissemination report year 1. pdf (2.7 MB)
- Deliverable5.5: Dissemination report year 2. pdf (3.9 MB)
Publications in Conferences / Books
- Yuji Sekiya. The Detection Possibility of Cyber-threats using Big Data Analysis and Machine Learning. The 2017 International Data Mining and Cybersecuryty Workshop, November 2017 (invited talk)
- Keiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi. Classification of URL bitstreams using Bag of Bytes. First International Workshop on Network Intelligence (NI2018), February 20-22, 2018 (Workshop)
- Ryo Nakamura, Yuji Sekiya, Daisuke Miyamoto, Kazuya Okada, Tomohiro Ishihara. Malicious Host Detection by Imaging SYN Packets and A Neural Network. Proceedings of IEEE International Symposium on Networks, Computers and Commnications (ISNCC2018), Rome, Italy, June 2018 (Workshop)
- Fantin, Stefano; 2019. Fantin S., Japanese and EU Legal Frameworks on Data Protection and Cybersecurity: Asymmetries From a Comparative Perspective , IRC/ICCCIS 2019 : International Conference on Cyber Crime and Information Security - Tokyo (JP), 22-23/4/2019. IRC 2019 - International Research Conference Proceedings; 2019 Publisher: World Academy of Science, Engineering and Technology
- Fantin, Stefano; 2019. Fantin S., A Comparative Study Between Japan and the European Union on Software Vulnerability Public Policies, ICCCIS 2019 : International Conference on Cyber Crime and Information Security - Tokyo (JP), 22-23/4/2019. International Research Conference Proceedings 2019; 2019 Publisher: World Academy of Science, Engineering and Technology
- Felkner, A., Kadobayashi, Y., Janiszewski, M., Fantin, S., Ruiz, J.F., Kozakiewicz, A., Blanc, G., Cybersecurity Research Analysis Report for Europe and Japan, Publisher: Springer International Publishing 2021, DOI 10.1007/978-3-030-62312-8
Posters, flyers and presentations
- EUNITY dissemination material (used in RAID2018, NIS2018, European Researchers' Night 2018 and ECSM: European Cyber Security Month) pdf (1.4 MB)
- EUNITY R3.2 flyer. pdf (775.6 KB)
- EUNITY R4.1 leaflet. pdf (309.2 KB)
- EUNITY R4.2 "Cooperation Opportunities" leaflet. pdf (375.3 KB)