EUNITY Cookie and GDPR policy

Our site saves cookies on your device in order to deliver better content.
You can disable the usage of cookies by changing the settings of your browser.
By browsing our website without changing the browser settings you grant us permission to store that information on your device. I Agree GDPR Policy

EUNITY EUNITY

プロジェクト成果物

  • 成果物 D2.1: Community engagement report. Icon pdf (290.4 KB)
  • 成果物 D2.2: Workshop 2 proceedings. Icon pdf (28.8 MB)
  • 成果物 D2.3: Workshop 1 proceedings. Icon pdf (16.4 MB)
  • 成果物 D3.1: Preliminary version of the Cybersecurity Research Analysis Report for the two regions.
    • GDPR and Japanese Privacy Act: Comparative Overview of GDPR and Japanese Privacy Act based on Deliverable D3.1.  Icon pdf (666.8 KB)
    • GDPR and Japanese Privacy Act(日本語版):EU 一般データ保護規則 (GDPR) と日本の個人情報保護法の比較概要  Icon (148.2 KB)
    • Legal and Policy Aspects: Chapter 1 takeaway of the Deliverable D3.1.  Icon pdf (368.8 KB)
    • Research and Innovation Aspects: Chapter 2 takeaway of the Deliverable D3.1. Icon pdf (222.0 KB)
    • Industry and Standardization Aspects: Chapter 3 takeaway of the Deliverable D3.1.  Icon pdf (232.9 KB)
  • EU一般データ保護規則および日本版保護法 (GDPR and Japanese Privacy Act) : Comparative Overview of GDPR and Japanese Privacy Act based on Deliverable D3.1. Icon pdf (666.8 KB)
  • 成果物 3.2: Revised version ‘Cyber-security Research Analysis Report’ for the two regions.
  • 成果物 4.1: Description of gaps and future challenges. Icon pdf (1.3 MB)
    • Quick summary on Cooperation Opportunities: takeaway of the Report4.1. Icon pdf (185.3 KB)
  • 成果物 D4.2: Strategic research and innovation agenda. Icon pdf (4.4 MB)
  • 成果物 D5.1: Website and collaboration tools. Icon pdf (1.4 MB)
  • 成果物 D5.3: Dissemination report year 1. Icon pdf (2.7 MB)
  • 成果物 D5.5: Dissemination report year 2. Icon pdf (3.9 MB)

国際会議

  • Yuji Sekiya. The Detection Possibility of Cyber-threats using Big Data Analysis and Machine Learning. The 2017 International Data Mining and Cybersecuryty Workshop, November 2017 (invited talk)
  • Keiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi. Classification of URL bitstreams using Bag of Bytes. First International Workshop on Network Intelligence (NI2018), February 20-22, 2018 (Workshop)
  • Ryo Nakamura, Yuji Sekiya, Daisuke Miyamoto, Kazuya Okada, Tomohiro Ishihara. Malicious Host Detection by Imaging SYN Packets and A Neural Network. Proceedings of IEEE International Symposium on Networks, Computers and Commnications (ISNCC2018), Rome, Italy, June 2018 (Workshop)

論文誌

テクニカルレポート

論説

ポスター・冊子