EUNITY Cookie and GDPR policy

Our site saves cookies on your device in order to deliver better content.
You can disable the usage of cookies by changing the settings of your browser.
By browsing our website without changing the browser settings you grant us permission to store that information on your device. I Agree GDPR Policy

EUNITY EUNITY

Project Deliverables

  • Deliverable D2.1: Community engagement report. Icon pdf (290.4 KB)
  • Deliverable D2.3: Workshop 1 proceedings. Icon pdf (16.4 MB)
  • Deliverable D3.1: Preliminary version of the Cybersecurity Research Analysis Report for the two regions. Icon pdf (1.8 MB)
  • GDPR and Japanese Privacy Act: Comparative Overview of GDPR and Japanese Privacy Act based on Deliverable D3.1. Icon pdf (666.8 KB)
  • Deliverable D5.1: Website and collaboration tools. Icon pdf (1.4 MB)
  • Deliverable D5.3: Dissemination report year 1. Icon pdf (2.7 MB)

Publications in Conferences

Publications in Journals

  • Yuji Sekiya. The Detection Possibility of Cyber-threats using Big Data Analysis and Machine Learning. The 2017 International Data Mining and Cybersecuryty Workshop, November 2017 (invited talk)
  • Keiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi. Classification of URL bitstreams using Bag of Bytes. First International Workshop on Network Intelligence (NI2018), February 20-22, 2018 (Workshop)
  • Ryo Nakamura, Yuji Sekiya, Daisuke Miyamoto, Kazuya Okada, Tomohiro Ishihara. Malicious Host Detection by Imaging SYN Packets and A Neural Network. Proceedings of IEEE International Symposium on Networks, Computers and Commnications (ISNCC2018), Rome, Italy, June 2018 (Workshop)

Technical Reports

Articles

Posters, flyers and presentations